Search Results - "Iida, Katsuyoshi"

Refine Results
  1. 1

    Malicious DNS Tunnel Tool Recognition using Persistent DoH Traffic Analysis by Mitsuhashi, Rikima, Jin, Yong, Iida, Katsuyoshi, Shinagawa, Takahiro, Takai, Yoshiaki

    “…DNS over HTTPS (DoH) protocol can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS traffic…”
    Get full text
    Journal Article
  2. 2

    Analysis of fog model considering computing and communication latency in 5G cellular networks by Intharawijitr, Krittin, Iida, Katsuyoshi, Koga, Hiroyuki

    “…Challenging 5G requirements have been proposed to enable the provision of more satisfactory services to users. One of the most critical 5G enhancements is…”
    Get full text
    Conference Proceeding
  3. 3

    Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis by Mitsuhashi, Rikima, Jin, Yong, Iida, Katsuyoshi, Shinagawa, Takahiro, Takai, Yoshiaki

    “…Encrypted domain name resolution can reduce the risk of privacy leakage for Internet users, but it may also prevent network administrators from detecting…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5

    Detection and Blocking of Anomaly DNS Traffic by Analyzing Achieved NS Record History by Ichise, Hikaru, Jin, Yong, Iida, Katsuyoshi, Takai, Yoshiaki

    “…DNS (Domain Name System)-based name resolution service is one of the most fundamental Internet services for the Internet users and application service…”
    Get full text
    Conference Proceeding
  6. 6

    Practical Enhancement and Evaluation of a Low-Latency Network Model Using Mobile Edge Computing by Intharawijitr, Krittin, Iida, Katsuyoshi, Koga, Hiroyuki, Yamaoka, Katsunori

    “…Most of latency-sensitive mobile applications require computational resources provided through a cloud computing service. The problem of relying on cloud…”
    Get full text
    Conference Proceeding
  7. 7

    A bandwidth allocation scheme to meet flow requirements in mobile edge computing by Ito, Yusuke, Koga, Hiroyuki, Iida, Katsuyoshi

    “…Cloud computing has enabled users to enjoy various Internet services provided by data centers through a wide variety of access networks and communication…”
    Get full text
    Conference Proceeding
  8. 8

    ResilientFlow: Deployments of distributed control channel maintenance modules to recover SDN from unexpected failures by Watanabe, Takuma, Omizo, Takuya, Akiyama, Toyokazu, Iida, Katsuyoshi

    “…To protect SDN-enabled networks under large-scale, unexpected link failures, we propose ResilientFlow that deploys distributed modules called Control Channel…”
    Get full text
    Conference Proceeding
  9. 9

    A bandwidth reallocation scheme to improve fairness and link utilization in data center networks by Ito, Yusuke, Koga, Hiroyuki, Iida, Katsuyoshi

    “…Users can now connect to the Internet through a wide variety of access networks and communication terminals. This has brought a great demand for cloud…”
    Get full text
    Conference Proceeding
  10. 10

    Design of Detecting Botnet Communication by Monitoring Direct Outbound DNS Queries by Yong Jin, Ichise, Hikaru, Iida, Katsuyoshi

    “…Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet…”
    Get full text
    Conference Proceeding
  11. 11

    SAPS: Software Defined Network Aware Pub/Sub -- A Design of the Hybrid Architecture Utilizing Distributed and Centralized Multicast by Akiyama, Toyokazu, Kawai, Yukiko, Teranishi, Yuuichi, Banno, Ryohei, Iida, Katsuyoshi

    “…Pub/Sub communication model becomes a basis of various applications, e.g. IoT/M2M, SNS. These application domains require new properties of the Pub/Sub…”
    Get full text
    Conference Proceeding Journal Article
  12. 12

    Better network latency with end-to-end header compression in SDN architecture by Jivorasetkul, Supalerk, Shimamura, Masayoshi, Iida, Katsuyoshi

    “…A small link bandwidth can lead to insufficient capacity and delay problems. Header compression can reduce the amount of packet header to make link utilization…”
    Get full text
    Conference Proceeding
  13. 13

    Design and Implementation of Inter-ISP Virtual Backbone Infrastructure to Meet Various QoS Requirements by Omizo, Takuya, Masui, Kenji, Iida, Katsuyoshi

    “…The variety of Quality of Service (QoS) requirements from applications is increasing and overlay networks are spreading widely. Because of this, a means of…”
    Get full text
    Conference Proceeding
  14. 14

    System investigation of a gateway implementing subflow control policies using a multipath TCP proxy by Okada, Yu, Shimamura, Masayoshi, Iida, Katsuyoshi

    “…To provide better performance for different applications, multiple ISP subscriptions will be helpful. However, the existing gateways for multiple ISP…”
    Get full text
    Conference Proceeding Journal Article
  15. 15

    Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications by Ichise, Hikaru, Yong Jin, Iida, Katsuyoshi

    “…Recent reports on Internet security have indicated that the DNS (Domain Name System) protocol is being used for botnet communication in various botnets; in…”
    Get full text
    Conference Proceeding Journal Article
  16. 16

    Policy-based Detection and Blocking System against Abnormal Applications by Analyzing DNS Traffic by Ichise, Hikaru, Jin, Yong, Iida, Katsuyoshi

    “…Bot-infected computers, which are compounded by botnet communication, conduct botnet-based cyber attacks using various application protocols. When using…”
    Get full text
    Conference Proceeding
  17. 17

    A proposal of DoH-based domain name resolution architecture including authoritative DNS servers by Sunahara, Satoru, Jin, Yong, Iida, Katsuyoshi

    “…In addition to cache poisoning attacks, the privacy leakage has become a critical issue in DNS nowadays. Especially, the communication between the DNS…”
    Get full text
    Conference Proceeding
  18. 18

    Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture by Sunahara, Satoru, Jin, Yong, Iida, Katsuyoshi, Yamai, Nariyoshi, Takai, Yoshiaki

    “…Currently, efforts to protect privacy information through encrypted DNS communications are becoming increasingly active. The encryption of DNS, standardized by…”
    Get full text
    Conference Proceeding
  19. 19

    Initial CWND determination method for fast startup TCP algorithms by Kodama, Shohei, Shimamura, Masayoshi, Iida, Katsuyoshi

    “…Since the TCP transmission rate is low during the startup phase, the QoS of various applications is seriously degraded. To improve the TCP transmission rate in…”
    Get full text
    Conference Proceeding
  20. 20

    Message from SEPT 2017 Organizing Committee by Iida, Katsuyoshi, Zulkernine, Mohammad

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding