Search Results - "Yamai, Nariyoshi"
-
1
WhiteRabbit: Scalable Software-Defined Network Data-Plane Verification Method Through Time Scheduling
Published in IEEE access (2019)“…Software-defined networks are vulnerable to attacks by compromised switches because commonly used programmable software switches are risky than traditional…”
Get full text
Journal Article -
2
A Traffic Distribution System Among Multiple Terminals Using MPTCP in Multihomed Network Environment
Published in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (01-07-2019)“…Mobile terminals usually have access to the Internet via a wireless station such as a Wi-Fi access point (AP). If the number of such terminals connected to the…”
Get full text
Conference Proceeding -
3
Alternating Primary Subflow in MPTCP by External Program without Kernel Modification
Published in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (01-07-2018)“…When users's terminals with multiple wireless network interfaces such as Wi-Fi and LTE have access to the Internet, traffic congestion often occurs since many…”
Get full text
Conference Proceeding -
4
Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network
Published in 2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (01-08-2019)“…Cybersecurity threats from malware attacks has become one of the most serious issues in the Internet nowadays. Most types of malware, after intruding an…”
Get full text
Conference Proceeding -
5
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination
Published in 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (01-07-2013)“…In recent years, many spam mails intending for ``One-click fraud" or ``Phishing" have been sent to many unspecified e-mail users. As one anti-spam technology,…”
Get full text
Conference Proceeding -
6
An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment
Published in 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (01-07-2013)“…Recently, the Internet is widely used as a social basis and is not only providing many kinds of services but also offering these at high speed with high…”
Get full text
Conference Proceeding -
7
Joint bandwidth scheduling and routing method for large file transfer with time constraint
Published in IEEE/IFIP Network Operations and Management Symposium (01-04-2016)“…In recent years, the number of requests to transfer large files via large high-speed computer networks has been increasing rapidly. Typically, these requests…”
Get full text
Conference Proceeding Journal Article -
8
DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering
Published in 2011 IEEE/IPSJ International Symposium on Applications and the Internet (01-07-2011)“…In recent years, spam mails intending for ``One-click fraud" or ``Phishing" have become increasing. As one anti-spam technology, DNSBL based on the URLs or…”
Get full text
Conference Proceeding -
9
Classroom support and system administration support for large-scale educational computer system
Published in Electronics & communications in Japan. Part 2, Electronics (01-09-2003)“…University and other educational computer systems may have several thousands to several tens of thousands of users, and several hundreds to several thousands…”
Get full text
Journal Article -
10
Communication Multiplexing of Server with QUIC and SDN in Multihomed Networks
Published in 2024 International Conference on Information Networking (ICOIN) (17-01-2024)“…When mobile devices equipped with multiple wireless network interfaces access the Internet through Wi-Fi, 4G, and 5G, external factors such as radio waves can…”
Get full text
Conference Proceeding -
11
BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems
Published in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01-06-2023)“…Enterprises have paid attention to consortium blockchains, in which multiple authorized organizations participate to form a consortium, in contrast to public…”
Get full text
Conference Proceeding -
12
Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert
Published in 2023 International Conference on Electronics, Information, and Communication (ICEIC) (05-02-2023)“…Email is one of the important and indispensable Internet services, but in the meanwhile, the spread of emailderived phishing URLs has been one of the critical…”
Get full text
Conference Proceeding -
13
Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture
Published in 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC) (02-07-2024)“…Currently, efforts to protect privacy information through encrypted DNS communications are becoming increasingly active. The encryption of DNS, standardized by…”
Get full text
Conference Proceeding -
14
Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead
Published in 2024 26th International Conference on Advanced Communications Technology (ICACT) (04-02-2024)“…An Intrusion Detection System (IDS) / Software Defined Networking (SDN) cooperative firewall system has attracted much attention recently because it has many…”
Get full text
Conference Proceeding -
15
Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers
Published in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01-06-2023)“…DNS over Transport Layer Security (DoT) has been standardized in the Domain Name System (DNS) to protect the confidentiality of communications between stub…”
Get full text
Conference Proceeding -
16
The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System
Published in 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C) (22-10-2023)“…This research introduces a method to reduce the mean time-to-respond of the Intrusion detection system (IDS) / software-defined network (SDN) cooperative…”
Get full text
Conference Proceeding -
17
A Cooperative Routing Method for Multiple Overlay Networks
Published in 2009 6th IEEE Consumer Communications and Networking Conference (01-01-2009)“…When multiple overlay networks are constructed over the same underlying IP network, overlay paths on different overlay networks may share some links on the IP…”
Get full text
Conference Proceeding -
18
OWASP IoT Top 10 based Attack Dataset for Machine Learning
Published in 2022 24th International Conference on Advanced Communication Technology (ICACT) (13-02-2022)“…Internet of Things (IoT) systems are highly susceptible to cyberattacks by nature with minimal security protections. Providing a massive attack surface for…”
Get full text
Conference Proceeding -
19
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Published in 2020 International Symposium on Networks, Computers and Communications (ISNCC) (20-10-2020)“…Email based Uniform Resource Locator (URL) distribution is one of the popular ways for starting phishing attacks. Conventional anti-phishing solutions rely on…”
Get full text
Conference Proceeding -
20
Quick Blocking Operation of Firewall System Cooperating with IDS and SDN
Published in 2022 24th International Conference on Advanced Communication Technology (ICACT) (13-02-2022)“…Firewalls, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) are normally used to filter anomaly traffic and prevent attacks from the…”
Get full text
Conference Proceeding