Search Results - "Tomoishi, Masahiko"
-
1
Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network
Published in 2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (01-08-2019)“…Cybersecurity threats from malware attacks has become one of the most serious issues in the Internet nowadays. Most types of malware, after intruding an…”
Get full text
Conference Proceeding -
2
A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems
Published in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01-06-2023)“…Authentication and authorization are essential functionalities in Internet of Things (IoT) systems in the areas of device monitoring, access control, data…”
Get full text
Conference Proceeding -
3
Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert
Published in 2023 International Conference on Electronics, Information, and Communication (ICEIC) (05-02-2023)“…Email is one of the important and indispensable Internet services, but in the meanwhile, the spread of emailderived phishing URLs has been one of the critical…”
Get full text
Conference Proceeding -
4
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes
Published in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) (01-11-2019)“…End-to-end key exchange for the subsequent secret sharing and secure communication between two remote parties has been an important issue due to the threats of…”
Get full text
Conference Proceeding -
5
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Published in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (01-07-2019)“…Nowadays mobile devices have become the majority terminals used by people for social activities so that carrying business data and private information in them…”
Get full text
Conference Proceeding -
6
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Published in 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) (01-09-2019)“…DNS based domain name resolution has been known as one of the most fundamental Internet services. In the meanwhile, DNS cache poisoning attacks also have…”
Get full text
Conference Proceeding -
7
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Published in 2020 International Symposium on Networks, Computers and Communications (ISNCC) (20-10-2020)“…Email based Uniform Resource Locator (URL) distribution is one of the popular ways for starting phishing attacks. Conventional anti-phishing solutions rely on…”
Get full text
Conference Proceeding -
8
Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification
Published in 2019 IEEE International Conference on Big Data (Big Data) (01-12-2019)“…Authoritative DNS server hijacking has been a critical threat which can be hardly prevented by DNSSEC. In this work, we propose a machine learning based…”
Get full text
Conference Proceeding -
9
Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers
Published in 2022 24th International Conference on Advanced Communication Technology (ICACT) (13-02-2022)“…Domain Name System Security Extensions (DNSSEC) is an effective solution for mitigating DNS cache poisoning attacks but it also has many issues on real…”
Get full text
Conference Proceeding -
10
A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation
Published in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2019)“…IoT remote control is faced with scalability, secure communication and privacy preservation issues and conventional solutions (HTTPS) have disclosed poor…”
Get full text
Conference Proceeding -
11
A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation
Published in 2018 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2018)“…DNSSEC has been proposed to provide data origin authentication and data integrity between recursive DNS server and authoritative zone server. Although DNSSEC…”
Get full text
Conference Proceeding -
12
A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature
Published in 2018 International Conference on Cyberworlds (CW) (01-10-2018)“…Malware has become one of the most critical targets of network security solutions nowadays. Many types of malware receive further instructions from the C&C…”
Get full text
Conference Proceeding -
13
A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01-07-2017)“…Many reports predicted that the number of connected IoT (Internet of Things) devices will reach to billions in the next several years, accordingly, how to…”
Get full text
Conference Proceeding -
14
Efficient detection of suspicious DNS traffic by resolver separation per application program
Published in 2017 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2017)“…With the development of ICT (Information and Communication Technology), computer and the Internet have become indispensable for people's social activities…”
Get full text
Conference Proceeding -
15
An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01-07-2017)“…Security threats from cyber attacks never stop threatening human's social activities. Even though, carrying mobile devices with confidential data is still…”
Get full text
Conference Proceeding -
16
Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection
Published in 2016 25th International Conference on Computer Communication and Networks (ICCCN) (01-08-2016)“…VPN (Virtual Private Network) technology is well used for remote access to the internal server in order to mitigate intrusion attacks and data breaches. In the…”
Get full text
Conference Proceeding -
17
An advanced client based DNSSEC validation and preliminary evaluations toward realization
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2016)“…DNSSEC (Domain Name System Security Extensions) is designed to provide security functions for the current DNS protocol. However, DNSSEC yet has low deployment…”
Get full text
Conference Proceeding -
18
Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information
Published in 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (01-06-2016)“…The Internet Security Threat Report by Symantec announced that the number of data breaches increased 23 percent in 2014 and the causes by theft or loss of…”
Get full text
Conference Proceeding Journal Article -
19
A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks
Published in 2018 International Conference on Computing, Networking and Communications (ICNC) (01-03-2018)“…The threats of destructive ransomware keep increasing and current security facilities (firewall, IDS/IPS, etc.) and backup systems cannot effectively protect…”
Get full text
Conference Proceeding -
20
Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01-07-2017)“…Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided…”
Get full text
Conference Proceeding