Search Results - "Tomoishi, Masahiko"

Refine Results
  1. 1

    Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Cybersecurity threats from malware attacks has become one of the most serious issues in the Internet nowadays. Most types of malware, after intruding an…”
    Get full text
    Conference Proceeding
  2. 2

    A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems by Jin, Yong, Tomoishi, Masahiko

    “…Authentication and authorization are essential functionalities in Internet of Things (IoT) systems in the areas of device monitoring, access control, data…”
    Get full text
    Conference Proceeding
  3. 3

    Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Email is one of the important and indispensable Internet services, but in the meanwhile, the spread of emailderived phishing URLs has been one of the critical…”
    Get full text
    Conference Proceeding
  4. 4

    A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes by Jin, Yong, Tomoishi, Masahiko

    “…End-to-end key exchange for the subsequent secret sharing and secure communication between two remote parties has been an important issue due to the threats of…”
    Get full text
    Conference Proceeding
  5. 5

    Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System by Jin, Yong, Tomoishi, Masahiko

    “…Nowadays mobile devices have become the majority terminals used by people for social activities so that carrying business data and private information in them…”
    Get full text
    Conference Proceeding
  6. 6

    A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress by Jin, Yong, Tomoishi, Masahiko, Matsuura, Satoshi

    “…DNS based domain name resolution has been known as one of the most fundamental Internet services. In the meanwhile, DNS cache poisoning attacks also have…”
    Get full text
    Conference Proceeding
  7. 7

    A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Email based Uniform Resource Locator (URL) distribution is one of the popular ways for starting phishing attacks. Conventional anti-phishing solutions rely on…”
    Get full text
    Conference Proceeding
  8. 8

    Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification by Jin, Yong, Tomoishi, Masahiko, Matsuura, Satoshi

    “…Authoritative DNS server hijacking has been a critical threat which can be hardly prevented by DNSSEC. In this work, we propose a machine learning based…”
    Get full text
    Conference Proceeding
  9. 9

    Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers by Jin, Yong, Iguchi, Kazuya, Yamai, Nariyoshi, Tomoishi, Masahiko

    “…Domain Name System Security Extensions (DNSSEC) is an effective solution for mitigating DNS cache poisoning attacks but it also has many issues on real…”
    Get full text
    Conference Proceeding
  10. 10

    A Lightweight and Secure IoT Remote Monitoring Mechanism Using DNS with Privacy Preservation by Jin, Yong, Tomoishi, Masahiko, Fujikawa, Kenji, Kafle, Ved P.

    “…IoT remote control is faced with scalability, secure communication and privacy preservation issues and conventional solutions (HTTPS) have disclosed poor…”
    Get full text
    Conference Proceeding
  11. 11

    A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…DNSSEC has been proposed to provide data origin authentication and data integrity between recursive DNS server and authoritative zone server. Although DNSSEC…”
    Get full text
    Conference Proceeding
  12. 12

    A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature by Jin, Yong, Kakoi, Kunitaka, Yamai, Nariyoshi, Kitagawa, Naoya, Tomoishi, Masahiko

    “…Malware has become one of the most critical targets of network security solutions nowadays. Many types of malware receive further instructions from the C&C…”
    Get full text
    Conference Proceeding
  13. 13

    A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS by Yong Jin, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Many reports predicted that the number of connected IoT (Internet of Things) devices will reach to billions in the next several years, accordingly, how to…”
    Get full text
    Conference Proceeding
  14. 14

    Efficient detection of suspicious DNS traffic by resolver separation per application program by Yong Jin, Kakoi, Kunitaka, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…With the development of ICT (Information and Communication Technology), computer and the Internet have become indispensable for people's social activities…”
    Get full text
    Conference Proceeding
  15. 15

    An In-depth Concealed File System with GPS Authentication Adaptable for Multiple Locations by Yong Jin, Tomoishi, Masahiko, Matsuura, Satoshi

    “…Security threats from cyber attacks never stop threatening human's social activities. Even though, carrying mobile devices with confidential data is still…”
    Get full text
    Conference Proceeding
  16. 16

    Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection by Yong Jin, Tomoishi, Masahiko, Matsuura, Satoshi

    “…VPN (Virtual Private Network) technology is well used for remote access to the internal server in order to mitigate intrusion attacks and data breaches. In the…”
    Get full text
    Conference Proceeding
  17. 17

    An advanced client based DNSSEC validation and preliminary evaluations toward realization by Yong Jin, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…DNSSEC (Domain Name System Security Extensions) is designed to provide security functions for the current DNS protocol. However, DNSSEC yet has low deployment…”
    Get full text
    Conference Proceeding
  18. 18

    Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information by Yong Jin, Tomoishi, Masahiko, Matsuura, Satoshi

    “…The Internet Security Threat Report by Symantec announced that the number of data breaches increased 23 percent in 2014 and the causes by theft or loss of…”
    Get full text
    Conference Proceeding Journal Article
  19. 19

    A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks by Jin, Yong, Tomoishi, Masahiko, Matsuura, Satoshi, Kitaguchi, Yoshiaki

    “…The threats of destructive ransomware keep increasing and current security facilities (firewall, IDS/IPS, etc.) and backup systems cannot effectively protect…”
    Get full text
    Conference Proceeding
  20. 20

    Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading by Kakoi, Kunitaka, Yong Jin, Yamai, Nariyoshi, Kitagawa, Naoya, Tomoishi, Masahiko

    “…Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided…”
    Get full text
    Conference Proceeding