Search Results - "Yamai, Nariyoshi"

Refine Results
  1. 1

    WhiteRabbit: Scalable Software-Defined Network Data-Plane Verification Method Through Time Scheduling by Shimizu, Takahiro, Kitagawa, Naoya, Ohshima, Kohta, Yamai, Nariyoshi

    Published in IEEE access (2019)
    “…Software-defined networks are vulnerable to attacks by compromised switches because commonly used programmable software switches are risky than traditional…”
    Get full text
    Journal Article
  2. 2

    A Traffic Distribution System Among Multiple Terminals Using MPTCP in Multihomed Network Environment by Asakura, Ryuji, Horigome, Reido, Yamai, Nariyoshi, Kitagawa, Naoya, Ohzahata, Satoshi

    “…Mobile terminals usually have access to the Internet via a wireless station such as a Wi-Fi access point (AP). If the number of such terminals connected to the…”
    Get full text
    Conference Proceeding
  3. 3

    Alternating Primary Subflow in MPTCP by External Program without Kernel Modification by Horigome, Reido, Yamai, Nariyoshi, Kitagawa, Naoya, Ohzahata, Satoshi

    “…When users's terminals with multiple wireless network interfaces such as Wi-Fi and LTE have access to the Internet, traffic congestion often occurs since many…”
    Get full text
    Conference Proceeding
  4. 4

    Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Cybersecurity threats from malware attacks has become one of the most serious issues in the Internet nowadays. Most types of malware, after intruding an…”
    Get full text
    Conference Proceeding
  5. 5

    Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination by Matsuoka, Masayuki, Yamai, Nariyoshi, Okayama, Kiyohiko, Kawano, Keita, Nakamura, Motonori, Minda, Masato

    “…In recent years, many spam mails intending for ``One-click fraud" or ``Phishing" have been sent to many unspecified e-mail users. As one anti-spam technology,…”
    Get full text
    Conference Proceeding
  6. 6

    An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment by Yamaguchi, Takuya, Yong Jin, Yamai, Nariyoshi, Okayama, Kiyohiko, Okamoto, Koki, Nakamura, Motonori

    “…Recently, the Internet is widely used as a social basis and is not only providing many kinds of services but also offering these at high speed with high…”
    Get full text
    Conference Proceeding
  7. 7

    Joint bandwidth scheduling and routing method for large file transfer with time constraint by Aihara, Masahiko, Kono, Shiori, Kinoshita, Kazuhiko, Yamai, Nariyoshi, Watanabe, Takashi

    “…In recent years, the number of requests to transfer large files via large high-speed computer networks has been increasing rapidly. Typically, these requests…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering by Suwa, S., Yamai, N., Okayama, K., Nakamura, M.

    “…In recent years, spam mails intending for ``One-click fraud" or ``Phishing" have become increasing. As one anti-spam technology, DNSBL based on the URLs or…”
    Get full text
    Conference Proceeding
  9. 9

    Classroom support and system administration support for large-scale educational computer system by Saitoh, Akinori, Nishida, Tomohiro, Nakanishi, Michio, Yasutome, Seigo, Baba, Ken-ichi, Shigehiro, Yuji, Harada, Akira, Yamai, Nariyoshi, Matsuura, Toshio

    “…University and other educational computer systems may have several thousands to several tens of thousands of users, and several hundreds to several thousands…”
    Get full text
    Journal Article
  10. 10

    Communication Multiplexing of Server with QUIC and SDN in Multihomed Networks by Kawana, Tomoya, Nakagawa, Rei, Yamai, Nariyoshi

    “…When mobile devices equipped with multiple wireless network interfaces access the Internet through Wi-Fi, 4G, and 5G, external factors such as radio waves can…”
    Get full text
    Conference Proceeding
  11. 11

    BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems by Sato, Tatsuya, Shimosawa, Taku, Yamai, Nariyoshi

    “…Enterprises have paid attention to consortium blockchains, in which multiple authorized organizations participate to form a consortium, in contrast to public…”
    Get full text
    Conference Proceeding
  12. 12

    Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Email is one of the important and indispensable Internet services, but in the meanwhile, the spread of emailderived phishing URLs has been one of the critical…”
    Get full text
    Conference Proceeding
  13. 13

    Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture by Sunahara, Satoru, Jin, Yong, Iida, Katsuyoshi, Yamai, Nariyoshi, Takai, Yoshiaki

    “…Currently, efforts to protect privacy information through encrypted DNS communications are becoming increasingly active. The encryption of DNS, standardized by…”
    Get full text
    Conference Proceeding
  14. 14

    Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead by Takai, Akihiro, Katsura, Yusei, Yamai, Nariyoshi, Nakagawa, Rei, Visoottiviseth, Vasaka

    “…An Intrusion Detection System (IDS) / Software Defined Networking (SDN) cooperative firewall system has attracted much attention recently because it has many…”
    Get full text
    Conference Proceeding
  15. 15

    Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers by Yamai, Nariyoshi, Jin, Yong, Murakami, Toshio, Nakagawa, Rei

    “…DNS over Transport Layer Security (DoT) has been standardized in the Domain Name System (DNS) to protect the confidentiality of communications between stub…”
    Get full text
    Conference Proceeding
  16. 16

    The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System by Nimitkul, Perakorn, Takai, Akihiro, Yamai, Nariyoshi, Nakagawa, Rei, Teerakanok, Songpon

    “…This research introduces a method to reduce the mean time-to-respond of the Intrusion detection system (IDS) / software-defined network (SDN) cooperative…”
    Get full text
    Conference Proceeding
  17. 17

    A Cooperative Routing Method for Multiple Overlay Networks by Okada, H., Tran Nguyen Trung, Kinoshita, K., Murakami, K., Yamai, N.

    “…When multiple overlay networks are constructed over the same underlying IP network, overlay paths on different overlay networks may share some links on the IP…”
    Get full text
    Conference Proceeding
  18. 18

    OWASP IoT Top 10 based Attack Dataset for Machine Learning by Min, Nay Myat, Visoottiviseth, Vasaka, Teerakanok, Songpon, Yamai, Nariyoshi

    “…Internet of Things (IoT) systems are highly susceptible to cyberattacks by nature with minimal security protections. Providing a massive attack surface for…”
    Get full text
    Conference Proceeding
  19. 19

    A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone by Jin, Yong, Tomoishi, Masahiko, Yamai, Nariyoshi

    “…Email based Uniform Resource Locator (URL) distribution is one of the popular ways for starting phishing attacks. Conventional anti-phishing solutions rely on…”
    Get full text
    Conference Proceeding
  20. 20

    Quick Blocking Operation of Firewall System Cooperating with IDS and SDN by Katsura, Yusei, Sakarin, Pranpariya, Yamai, Nariyoshi, Kimiyama, Hiroyuki, Visoottiviseth, Vasaka

    “…Firewalls, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) are normally used to filter anomaly traffic and prevent attacks from the…”
    Get full text
    Conference Proceeding