Search Results - "Iida, Katsuyoshi"
-
1
Malicious DNS Tunnel Tool Recognition using Persistent DoH Traffic Analysis
Published in IEEE eTransactions on network and service management (01-06-2023)“…DNS over HTTPS (DoH) protocol can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS traffic…”
Get full text
Journal Article -
2
Analysis of fog model considering computing and communication latency in 5G cellular networks
Published in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) (01-03-2016)“…Challenging 5G requirements have been proposed to enable the provision of more satisfactory services to users. One of the most critical 5G enhancements is…”
Get full text
Conference Proceeding -
3
Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis
Published in 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC) (01-01-2023)“…Encrypted domain name resolution can reduce the risk of privacy leakage for Internet users, but it may also prevent network administrators from detecting…”
Get full text
Conference Proceeding -
4
Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses
Published in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01-08-2020)“…Cyberattacks by botnets keep on increasing. In this research, we aim to detect and block Domain Generation Algorithm (DGA)-based bot-infected computers by…”
Get full text
Conference Proceeding -
5
Detection and Blocking of Anomaly DNS Traffic by Analyzing Achieved NS Record History
Published in 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (01-11-2018)“…DNS (Domain Name System)-based name resolution service is one of the most fundamental Internet services for the Internet users and application service…”
Get full text
Conference Proceeding -
6
Practical Enhancement and Evaluation of a Low-Latency Network Model Using Mobile Edge Computing
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01-07-2017)“…Most of latency-sensitive mobile applications require computational resources provided through a cloud computing service. The problem of relying on cloud…”
Get full text
Conference Proceeding -
7
A bandwidth allocation scheme to meet flow requirements in mobile edge computing
Published in 2017 IEEE 6th International Conference on Cloud Networking (CloudNet) (01-09-2017)“…Cloud computing has enabled users to enjoy various Internet services provided by data centers through a wide variety of access networks and communication…”
Get full text
Conference Proceeding -
8
ResilientFlow: Deployments of distributed control channel maintenance modules to recover SDN from unexpected failures
Published in 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN) (01-03-2015)“…To protect SDN-enabled networks under large-scale, unexpected link failures, we propose ResilientFlow that deploys distributed modules called Control Channel…”
Get full text
Conference Proceeding -
9
A bandwidth reallocation scheme to improve fairness and link utilization in data center networks
Published in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) (01-03-2016)“…Users can now connect to the Internet through a wide variety of access networks and communication terminals. This has brought a great demand for cloud…”
Get full text
Conference Proceeding -
10
Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries
Published in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (01-11-2015)“…Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet…”
Get full text
Conference Proceeding -
11
SAPS: Software Defined Network Aware Pub/Sub -- A Design of the Hybrid Architecture Utilizing Distributed and Centralized Multicast
Published in 2015 IEEE 39th Annual Computer Software and Applications Conference (01-07-2015)“…Pub/Sub communication model becomes a basis of various applications, e.g. IoT/M2M, SNS. These application domains require new properties of the Pub/Sub…”
Get full text
Conference Proceeding Journal Article -
12
Better network latency with end-to-end header compression in SDN architecture
Published in 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (01-08-2013)“…A small link bandwidth can lead to insufficient capacity and delay problems. Header compression can reduce the amount of packet header to make link utilization…”
Get full text
Conference Proceeding -
13
Design and Implementation of Inter-ISP Virtual Backbone Infrastructure to Meet Various QoS Requirements
Published in 2011 IEEE/IPSJ International Symposium on Applications and the Internet (01-07-2011)“…The variety of Quality of Service (QoS) requirements from applications is increasing and overlay networks are spreading widely. Because of this, a means of…”
Get full text
Conference Proceeding -
14
System investigation of a gateway implementing subflow control policies using a multipath TCP proxy
Published in 2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (01-08-2015)“…To provide better performance for different applications, multiple ISP subscriptions will be helpful. However, the existing gateways for multiple ISP…”
Get full text
Conference Proceeding Journal Article -
15
Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications
Published in 2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (01-08-2015)“…Recent reports on Internet security have indicated that the DNS (Domain Name System) protocol is being used for botnet communication in various botnets; in…”
Get full text
Conference Proceeding Journal Article -
16
Policy-based Detection and Blocking System against Abnormal Applications by Analyzing DNS Traffic
Published in 2023 22nd International Symposium on Communications and Information Technologies (ISCIT) (16-10-2023)“…Bot-infected computers, which are compounded by botnet communication, conduct botnet-based cyber attacks using various application protocols. When using…”
Get full text
Conference Proceeding -
17
A proposal of DoH-based domain name resolution architecture including authoritative DNS servers
Published in 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC) (30-11-2022)“…In addition to cache poisoning attacks, the privacy leakage has become a critical issue in DNS nowadays. Especially, the communication between the DNS…”
Get full text
Conference Proceeding -
18
Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture
Published in 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC) (02-07-2024)“…Currently, efforts to protect privacy information through encrypted DNS communications are becoming increasingly active. The encryption of DNS, standardized by…”
Get full text
Conference Proceeding -
19
Initial CWND determination method for fast startup TCP algorithms
Published in 2011 IEEE Nineteenth IEEE International Workshop on Quality of Service (01-06-2011)“…Since the TCP transmission rate is low during the startup phase, the QoS of various applications is seriously degraded. To improve the TCP transmission rate in…”
Get full text
Conference Proceeding -
20
Message from SEPT 2017 Organizing Committee
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01-07-2017)“…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
Get full text
Conference Proceeding