Musashi Yasuo MUSASHI Yasuo

ID:9000006418411

Center for Multimedia and Information Technologies (CMIT), Kumamoto University (2011年 CiNii収録論文より)

Search authors sharing the same name

Articles:  1-8 of 8

  • Detection of DNS Cache Poisoning Attack in DNS Standard Resolution Traffic

    MUSASHI Yasuo , TAKEMORI Kazuya , KUBOTA Shinichiro , SUGITANI Kenichi

    We statistically investigated the total A resource record (RR) based DNS query request packet traffic from the Internet to the top domain DNS server in a university campus network through January 1st …

    IEICE technical report 111(30), 1-6, 2011-05-05

    References (11)

  • Entropy Study on A Resource Record DNS Query Traffic from the Campus Network

    TAKEMORI KAZUYA , KONG WEI JUAN , LUDENA ROMANA DENNIS ARTURO , KUBOTA SHINICHIRO , SUGITANI KENICHI , MUSASHI YASUO

    侵入遮断・検知システムにおいて、誤検知は完全にはなくすことができない。つまり、シグネチャマッチングにほんの少しの誤りが含まれていても、システム自身の検知率に関する性能の劣化はほとんど無い。ところが、この許容できる誤りを許すことで、シグネチャマッチングの速度に関する性能を大幅に引き上げられる可能性がある。本論文では、誤りの発生を許容する代わりに文字列探索を高速に行う手法を提案する。厳密な探索ではない …

    IEICE technical report 108(459), 101-106, 2009-02-26

    References (11)

  • Entropy Study on A Resource Record DNS Query Traffic from the Campus Network

    TAKEMORI KAZUYA , KONG WEI JUAN , LUDENA ROMANA DENNIS ARTURO , KUBOTA SHINICHIRO , SUGITANI KENICHI , MUSASHI YASUO

    侵入遮断・検知システムにおいて、誤検知は完全にはなくすことができない。つまり、シグネチャマッチングにほんの少しの誤りが含まれていても、システム自身の検知率に関する性能の劣化はほとんど無い。ところが、この許容できる誤りを許すことで、シグネチャマッチングの速度に関する性能を大幅に引き上げられる可能性がある。本論文では、誤りの発生を許容する代わりに文字列探索を高速に行う手法を提案する。厳密な探索ではない …

    IEICE technical report 108(460), 101-106, 2009-02-26

    References (11)

  • Entropy Study on A Resource Record DNS Query Traffic from the Campus Network

    TAKEMORI KAZUYA , KONG WEI JUAN , ROMANA DENNIS ARTURO LUDENA , KUBOTA SHINICHIRO , SUGITANI KENICHI , MUSASHI YASUO

    We investigated the source IP address (SIP)- and query keyword (QK)-based entropy changes in the A and PTR resource records (RRs) based DNS query traffic between the DNS clients and the campus DNS ser …

    IPSJ SIG Technical Reports 4, 101-106, 2009-02-26

    References (11)

  • DNS based Entropy and Forensic Analysis on the PCs for Learners in a University

    LUDENA ROMANA Dennis A. , KUBOTA Shinichiro , SUGITANI Kenichi , MUSASHI Yasuo

    We performed an entropy study on the DNS query traffic from the outside of a university campus network to the top domain DNS server when querying about reverse resolution on the PCs for learners throu …

    IEICE technical report 108(24), 103-108, 2008-05-01

    References (13)

  • DNS based Entropy and Forensic Analysis on the PCs for Learners in a University

    LUDENA ROMANA Dennis A. , KUBOTA Shinichiro , SUGITANI Kenichi , MUSASHI Yasuo

    We performed an entropy study on the DNS query traffic from the outside of a university campus network to the top domain DNS server when querying about reverse resolution on the PCs for learners throu …

    IPSJ SIG Technical Reports 1, 103-108, 2008-05-01

    References (13) Cited by (1)

  • Threats of Unusual DNS Query Traffic from NIS Clients

    LUDENA ROMANA Dennis A. , NAGATOMI Hirofumi , MUSASHI Yasuo , MATSUBA Ryuichi , SUGITANI Kenichi

    We statistically investigated on unusual DNS query traffic from the several Linux PC servers employing network information system(NIS) as their authentication in the campus network of a university. Th …

    情報処理学会研究報告. DSM, [分散システム/インターネット運用技術] 45, 95-98, 2007-05-10

    References (6)

  • Threats of Unusual DNS Query Traffic from NIS Clients

    LUDENA ROMANA Dennis A. , NAGATOMI Hirofumi , MUSASHI Yasuo , MATSUBA Ryuichi , SUGITANI Kenichi

    We statistically investigated on unusual DNS query traffic from the several Linux PC servers employing network information system(NIS) as their authentication in the campus network of a university. Th …

    IEICE technical report 107(30), 95-98, 2007-05-03

    References (6)

Page Top