Updated on 2025/12/26

写真a

 
Tsunoda Hiroshi
 
Organization
- - Professor
External link

Degree

  • - ( Tohoku University )

Research Interests

  • ヒストグラム

  • シグネチャ

  • 相関係数発生確率行列

  • ホスト単位観測

  • サービス劣化攻撃

  • サービス劣化型攻撃

  • Security management

  • ネットワークセキュリティ

  • 相互監視

  • 異常検知

  • 順位相関係数

  • 逆探知

  • 識別子

  • 衛星利用ネットワーク

  • センサネットワーク

  • 不正アクセス

  • IP

  • セキュアネットワーク

  • パルス型DoS攻撃

  • エミュレーション

  • TCP

  • intranet

  • Traffic monitoring

  • Network management

Research Areas

  • Informatics / Information security

  • Informatics / Computer system

  • Informatics / Information network

Education

  • Tohoku University   Graduate School of Information Sciences

    - 2005

      More details

  • Tohoku University   Graduate School of Information Sciences

    - 2002

      More details

  • Tohoku University   Faculty of Engineering   Department of Information Engineering

    - 2000

      More details

  • Matsue National College of Technology   Department of Information Engineering

    1993 - 1998

      More details

Research History

  • Tohoku Institute of Technology   Faculty of Engineering   Professor

    2022.4

      More details

  • Tohoku Institute of Technology   Department of Information and Communication Engineering   Professor

    2022.4

      More details

  • Tohoku University   Graduate School of Information Sciences   Part-time Lecturer

    2018

      More details

  • University of Malaga, Spain   Network, Information and Computer Security Lab   Visiting Researcher

    2017.4 - 2017.12

      More details

  • Tohoku University   Graduate School of Information Sciences   Part-time Lecturer

    2015 - 2017

      More details

  • Tohoku Institute of Technology   Department of Information and Communication Engineering, Faculty of Engineering   Associate Professor

    2014.4 - 2022.3

      More details

  • Tohoku Institute of Technology   Faculty of Engineering   Lecturer

    2008.4 - 2014.3

      More details

  • Tohoku Institute of Technology   Department of Information and Communication Engineering   Lecturer

    2008.4 - 2014.3

      More details

  • Tohoku University   Graduate School of Information Sciences   Assistant Professor

    2007.4 - 2008.3

      More details

  • Tohoku University   Graduate School of Information Sciences   Assistant Professor

    2007.4 - 2008.3

      More details

  • Tohoku University   Graduate School of Information Sciences   Research Assistant

    2005.4 - 2007.3

      More details

▼display all

Professional Memberships

  • INFORMATION PROCESSING SOCIETY OF JAPAN

      More details

  • IEEE

      More details

  • THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS.

      More details

Committee Memberships

  • 仙台CTF推進プロジェクト   運営委員  

    2024.4   

      More details

    Committee type:Other

    researchmap

  • 宮城県地域人材育成IT部会   委員  

    2018.7 - 2021.3   

      More details

    Committee type:Municipal

    researchmap

  • 一般社団法人 宮城県情報サービス産業協会 「伊達なICT-WORK せんだい・みやぎ」大学等連携会議   委員  

    2018.5   

      More details

    Committee type:Other

    researchmap

  • 電子情報通信学会   通信方式研究会 専門委員  

    2016.5 - 2022.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 コミュニケーションシステム研究会   専門委員  

    2016.5 - 2022.4   

      More details

    Committee type:Academic society

    2020年度までは通信方式研究会

    researchmap

Job Achievement

  • 就職委員会 委員長

    2024.4

  • 基盤ネットワークシステム更改WG メンバー

    2022.6 - 2024.3

  • 就職委員会 副委員長

    2022.5 - 2024.3

  • 情報サービスセンター運営委員会 委員

    2022.4 - 2024.3

  • 就職委員会

    2021.4

  • ISO推進リーダー

    2015.4 - 2016.3

  • 基盤ネットワークシステム更改WG

    2014.4 - 2015.3

  • 減災行動・体制検討WG

    2012.7 - 2017.3

  • 基盤ネットワークシステム更改WG

    2012.4 - 2013.8

  • 大学施設整備検討WG

    2012.4 - 2013.3

  • 広報委員会との連絡調整WG

    2009.4 - 2021.3

  • 学科入試広報委員会

    2008.4

▼display all

Papers

  • An eBPF-based packet capture system with embedded application metadata for network forensics Invited Reviewed International journal

    Masaya Okabe, Hiroshi Tsunoda

    International Journal of Networking and Computing   15 ( 2 )   2025.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Characterizing Internet-Wide Research Scanning in Darknet Traffic Through Comparative Analysis of Detection Methods Reviewed

    Takuma Shikanai and Hiroshi Tsunoda

    2025 10th International Conference on Business and Industrial Research (ICBIR)   - - -   2025.5

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • An eBPF-based packet capture system with embedded application metadata for network forensics Reviewed International journal

    Masaya Okabe and Hiroshi Tsunoda

    2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW)   350 - 354   2024.11

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    In network forensics, identifying applications involved in packet transmission and reception is crucial for reconstructing the chain of events in security incidents. However, since captured packets do not contain information about specific applications, investigators must rely on other information like log data for identification, which decreases the efficiency and accuracy of the forensic process. This paper proposes a new system that uses extended Berkeley Packet Filter (eBPF) to embed application metadata directly into the packet capture files. To demonstrate the feasibility of this concept, we implemented a prototype of the proposed system. The system associates each packet with the corresponding application name, process ID, and user ID, storing this metadata alongside packet data in the PCAPNG format. An experimental evaluation comparing the system's performance to a conventional packet capture tool revealed challenges, such as packet loss due to buffer overwriting and increased resource consumption. Despite these limitations, the system is expected to reduce analysis time and improve accuracy in network forensics by eliminating the need to reference log data. Future improvements will focus on optimizing resource usage and enhancing the system stability.

    DOI: 10.1109/CANDARW64572.2024.00065

    researchmap

  • Designing a System to Facilitate Cyber Patrolling: Leveraging Machine Learning and Push-based Distribution Reviewed

    Miyu Yokoyama, Hiroshi Tsunoda

    65 ( 5 )   914 - 926   2024.5

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Finding Slow Scanners via Long and Short-Term Traffic Comparison Reviewed

    2024   91 - 92   2024.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Push-Based Information Distribution System for Efficient Cyber Patrolling Reviewed

    Miyu Yokoyama, Hiroshi Tsunoda

    2023 8th International Conference on Business and Industrial Research (ICBIR)   651 - 656   2023.5

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • SNS上のサイバーパトロール活動を効率化するシンプルなGUIアプリケーションの開発 Reviewed

    横山 未有,角田 裕

    東北工業大学紀要 理工学編・人文社会科学編   ( 43 )   27 - 33   2023.3

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper (bulletin of university, research institution)  

    researchmap

  • ホストの通信行動履歴の把握を目的としたトラフィック観測・分析技術の基礎研究 Reviewed

    角田 裕,岡部 将也

    東北工業大学地域連携センター・研究支援センター紀要   35 ( 1 )   27 - 32   2023.1

     More details

    Authorship:Lead author, Corresponding author   Language:Japanese   Publishing type:Research paper (bulletin of university, research institution)  

    researchmap

  • - Reviewed

    34 ( 1 )   33 - 38   2021.11

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Research paper (bulletin of university, research institution)  

    researchmap

  • Security and Privacy Awareness: for Software Creators and Users. Reviewed

    Glenn Mansfield Keeni, Hiroshi Tsunoda

    IEEE 10th International Conference on Awareness Science and Technology(iCAST)   1 - 4   2019

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICAwST.2019.8923148

    researchmap

  • L2L3 VPN Multicast MIB. Reviewed

    Zhaohui Zhang, Hiroshi Tsunoda

    RFC   8502   1 - 20   2018.12

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.17487/RFC8502

    researchmap

  • BGP/MPLS Layer 3 VPN Multicast Management Information Base. Reviewed

    Hiroshi Tsunoda

    RFC   8503   1 - 57   2018.12

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.17487/RFC8503

    researchmap

  • Using normalized entropy to compare traffic differences in stable and unstable time slots Reviewed

    Napaphat Vichaidis, Hiroshi Tsunoda

    Proceedings of 2018 5th International Conference on Business and Industrial Research (ICBIR)   21 - 24   2018.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICBIR.2018.8391159

    researchmap

  • Event detection in traffic observed by internet threat monitoring system by focusing occurrence probability matrices of correlation coefficient Reviewed

    Hiroshi Tsunoda, Kohei Mayama, Glenn Masnfield Keeni

    Proceedings of 018 5th International Conference on Business and Industrial Research (ICBIR)   25 - 28   2018.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICBIR.2018.8391160

    researchmap

  • - Reviewed

    30 ( 1 )   8 - 17   2018.3

     More details

    Authorship:Lead author   Language:Japanese  

    researchmap

  • Feasibility of Societal Model for Securing Internet of Things. Reviewed

    Hiroshi Tsunoda, Rodrigo Roman, Javier López 0001, Glenn Mansfield Keeni

    TIIS   12 ( 8 )   3567 - 3588   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3837/tiis.2018.08.003

    researchmap

  • Analyzing darknet TCP traffic stability at different timescales. Reviewed

    Napaphat Vichaidis, Hiroshi Tsunoda, Glenn Mansfield Keeni

    2018 International Conference on Information Networking, ICOIN 2018, Chiang Mai, Thailand, January 10-12, 2018   128 - 133   2018

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICOIN.2018.8343098

    researchmap

  • Feasibility of societal model for securing Internet of Things. Reviewed

    Hiroshi Tsunoda, Glenn Mansfield Keeni

    13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017   541 - 546   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/IWCMC.2017.7986343

    researchmap

  • Focus on the number of TopN source hosts groups in TCP traffic seen in a local Darknet

    Vichaidis Napaphat, Tsunoda Hiroshi, Mansfield Keeni Glenn

    Tohoku-Section Joint Convention Record of Institutes of Electrical and Information Engineers, Japan   2017   148 - 148   2017

     More details

    Language:Japanese   Publisher:Organizing Committee of Tohoku-Section Joint Convention of Institutes of Electrical and Information Engineers, Japan  

    DOI: 10.11528/tsjc.2017.0_148

    CiNii Research

    researchmap

  • - Reviewed

    2016.5

     More details

    Language:Japanese  

    researchmap

  • Analyzing ICMP Traffic Seen in a Local Darknet

    Vichaidis Napaphat

    Tohoku-Section Joint Convention Record of Institutes of Electrical and Information Engineers, Japan   2016   28 - 28   2016

     More details

    Language:Japanese   Publisher:Organizing Committee of Tohoku-Section Joint Convention of Institutes of Electrical and Information Engineers, Japan  

    DOI: 10.11528/tsjc.2016.0_28

    CiNii Research

    researchmap

  • Managing syslog. Reviewed

    Hiroshi Tsunoda, Glenn Mansfield Keeni

    The 16th Asia-Pacific Network Operations and Management Symposium, APNOMS 2014, Hsinchu, Taiwan, September 17-19, 2014   1 - 4   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/APNOMS.2014.6996575

    researchmap

  • Focus on accuracy and consistency of advanced applications for monitoring the future Internet. Reviewed

    Hiroshi Tsunoda, Glenn Mansfield Keeni

    2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014   1 - 4   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/NOMS.2014.6838382

    researchmap

  • Detecting Active Devices in Intranets Using Existing Network Management Information Reviewed

    Hiroshi Tsunoda, Masahiro Matsuda, Yuusuke Syouji, Kohei. Ohta, Glenn Mansfield Keeni

    International Journal of Energy, Information and Communications   4 ( 2 )   21 - 40   2013.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • G-MIB: Green-oriented Management Information Base and its standardization in IETF. Reviewed

    Satoru Izumi, Naoki Nakamura, Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Takuo Suganuma, Glenn Mansfield Keeni, Norio Shiratori

    Proceedings of The 2nd IEEE Global Conference on Consumer Electronics (GCCE 2013)   21 - 22   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/GCCE.2013.6664801

    researchmap

  • Estimating Device Activities Using Network-based Information in the Intrane Reviewed

    Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Glenn Mansfield Keeni

    Proceedings of the 1st International Workshop on Smart Technologies for Energy, Information and Communication   2012.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • - Reviewed

    p.95-96   2012.3

     More details

    Language:Japanese  

    researchmap

  • Security by simple network traffic monitoring. Reviewed

    Hiroshi Tsunoda, Glenn Mansfield Keeni

    5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012   201 - 204   2012

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/2388576.2388608

    researchmap

  • A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy. Reviewed

    Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji, Yoshiaki Nemoto

    J. Information Security   3 ( 1 )   18 - 24   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.4236/jis.2012.31003

    researchmap

  • イントラネットにおけるユーザ端末の無駄な稼働の調査

    庄子 祐亮, 角田 裕, 松田 勝敬

    電気関係学会東北支部連合大会講演論文集   2012   168 - 168   2012

     More details

    Language:Japanese   Publisher:電気関係学会東北支部連合大会実行委員会  

    DOI: 10.11528/tsjc.2012.0_168

    CiNii Research

    researchmap

  • Network Application Identification Based on Communication Characteristics of Application Messages Reviewed

    Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, Yoshiaki Nemoto, Kazuyuki Tanaka

    Journal of Communication and Computer   8 ( 2 )   111 - 119   2011.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Development of a WLAN based monitoring system for group activity measurement in real-time. Reviewed

    Hiroshi Tsunoda, Hidehisa Nakayama, Kohei Ohta, Akihiro Suzuki, Hiroki Nishiyama 0001, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto

    Journal of Communications and Networks   13 ( 2 )   86 - 94   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/JCN.2011.6157407

    researchmap

  • Wireless telemedicine services over integrated IEEE 802.11/WLAN and IEEE 802.16/WiMAX networks. Reviewed

    Yan Zhang 0008, Nirwan Ansari, Hiroshi Tsunoda

    IEEE Wireless Commun.   17 ( 1 )   30 - 36   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/MWC.2010.5416347

    CiNii Research

    researchmap

  • Network application identification based on communication characteristics of application messages

    Yuji Waizumi, Yuya Tsukabe, Hiroshi Tsunoda, Yoshiaki Nemoto

    World Academy of Science, Engineering and Technology   36   756 - 761   2009.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages. Reviewed

    Hiroshi Tsunoda, Takafumi Maruyama, Kohei Ohta, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto

    7th Annual Conference on Communication Networks and Services Research(CNSR)   158 - 165   2009

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/CNSR.2009.33

    researchmap

  • Mobility Management Scheme with Geographical and Orbital Information for Walker Delta IP/LEO Satellite Networks

    TSUNODA Hiroshi, OHTA Kohei, NEMOTO Yoshiaki

    The IEICE transactions on communications B   91 ( 12 )   1600 - 1610   2008.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Network Application Identification Using Transition Pattern of Payload Length. Reviewed

    Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto

    WCNC 2008(WCNC)   2633 - 2638   2008

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/WCNC.2008.462

    researchmap

  • Ultra-Mobile Echo Network in Health Care System. Reviewed

    Yoshifumi Saijo, Takahiro Iwamoto, Kazuto Kobayashi, Satoshi Yamaguchi, Hiroshi Tsunoda, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto

    Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems(CBMS)   164 - 166   2008

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/CBMS.2008.23

    researchmap

  • A Reliable Network Identification Method Based on Transition Pattern of Payload Length. Reviewed

    Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto

    Proceedings of the Global Communications Conference(GLOBECOM)   1915 - 1919   2008

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/GLOCOM.2008.ECP.370

    researchmap

  • Improving the Efficiency of DoS Traceback Based on the Enhanced ITrace-CP Method for Mobile Environment Invited Reviewed

    Hiroshi Tsunoda, Thishi Tochiori, Yuji Waizumi, Nei Kato, Yoshiaki Nemoto

    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3   647 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CHINACOM.2008.4685116

    Web of Science

    researchmap

  • Detecting DRDoS attacks by a simple response packet confirmation mechanism. Reviewed

    Hiroshi Tsunoda, Kohei Ohta, Atsunori Yamamoto, Nirwan Ansari, Yuji Waizumi, Yoshiaki Nemoto

    Computer Communications   31 ( 14 )   3299 - 3306   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.comcom.2008.05.033

    researchmap

  • Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition. Reviewed

    Hiroshi Tsunoda, Kenjirou Arai, Yuji Waizumi, Nirwan Ansari, Yoshiaki Nemoto

    Proceedings of IEEE International Conference on Communications(ICC)   1670 - 1674   2008

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICC.2008.322

    researchmap

  • Improving DDoS Traceback Accuracy by Filtering Traffic Pattern Based on Lower Bounds of Traffic Volume

    TSUNODA Hiroshi, UTSUMI Hironori, WAIZUMI Yuji, NEMOTO Yoshiaki

    The IEICE transactions on communications B   90 ( 10 )   969 - 979   2007.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • A Network-Status Evaluation Method Using Occurence Probability Matrices of Correlation Coefficients

    WAIZUMI Yuji, HIROSE Jun'ichi, TSUNODA Hiroshi, NEMOTO Yoshiaki

    The IEICE transactions on communications B   90 ( 7 )   660 - 669   2007.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Collaborative DoS Traceback Technology for Intranet Security Systems Reviewed

    TSUNODA HIROSHI, OHTA KOHEI, TANAKA SHINICHI, WAIZUMI YUJI, KATO NEI, KEENI GLENN MANSFIELD, NEMOTO YOSHIAKI

    IPSJ journal   48 ( 2 )   733 - 742   2007.2

     More details

    Authorship:Lead author, Corresponding author   Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    DoS attacks pose a serious threat to the integrity of the Internet. Many countermeasures against DoS attacks have been proposed, among which traceback is a promising countermeasure. However, it is necessary to facilitate a collaborative mechanism among multiple networks in order to locate an attacker in practical situations. To develop such an effective mechanism, relevant entities from the academia, industry, and government should collaborate. As the first step towards fulfill this vision, we consider one of the important network management issues, i.e., DoS traceback, and develop a collaborative DoS traceback technology for an intranet security system via industry-university cooperation.

    CiNii Research

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00010057/

  • Collaborative DoS Traceback Technology for Intranet Security Systems(Fundamentals of Networks/Internet,<Special Issue>Industry-University Cooperative Research) Reviewed

    TSUNODA HIROSHI, OHTA KOHEI, TANAKA SHINICHI, WAIZUMI YUJI, KATO NEI, KEENI GLENN MANSFIELD, NEMOTO YOSHIAKI

    IPSJ Journal   48 ( 2 )   733 - 742   2007.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    DoS attacks pose a serious threat to the integrity of the Internet. Many countermeasures against DoS attacks have been proposed, among which traceback is a promising countermeasure. However, it is necessary to facilitate a collaborative mechanism among multiple networks in order to locate an attacker in practical situations. To develop such an effective mechanism, relevant entities from the academia, industry, and government should collaborate. As the first step towards fulfill this vision, we consider one of the important network management issues, i.e., DoS traceback, and develop a collab...

    CiNii Research

    researchmap

  • A Low Cost Worm Detection Technique based on Flow Payload Similarity Reviewed

    International Conference on Web Information Systems and Technologies   2007

     More details

  • Performance evaluation of SCTP with adaptive multistreaming over LEO satellite networks Reviewed

    Hiroshi Tsunoda, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto

    2007 INTERNATIONAL WORKSHOP ON SATELLITE AND SPACE COMMUNICATIONS, IWSSC '07, CONFERENCE PROCEEDINGS   150 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Distributed Early Worm Detection Based on Payload Histograms. Reviewed

    Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirwan Ansari, Yoshiaki Nemoto

    Proceedings of IEEE International Conference on Communications(ICC)   1404 - 1408   2007

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICC.2007.236

    researchmap

  • An Adaptive Stream Allocation Method for Improving SCTP Performance over LEO Satellite Networks Reviewed

    25th AIAA International Communications Satellite Systems Conference (ICSSC2007)   2007

     More details

  • Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks Reviewed

    Hiroshi Tsunoda, Umith Dharmaratn, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto

    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/GLOCOM.2006.526

    Web of Science

    researchmap

  • A simple response packet confirmation method for DRDoS detection Reviewed

    H Tsunoda, Y Nemoto, K Ohta, A Yamamoto

    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3   U1557 - U1561   2006

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Geographical and orbital information based mobility management to overcome last-hop ambiguity over IP/LEO satellite networks Reviewed

    Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto

    IEEE International Conference on Communications   4   1849 - 1854   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICC.2006.254989

    Scopus

    researchmap

  • Pulsing Denial-of-Service Attacks Tolerant Sack-based TCP with Adaptive Bandwidth Estimation Mechanism Reviewed

    Hiroshi Tsunoda, Kenjirou Arai, Nei Kato, Yoshiaki Nemoto

    WSEAS Transactions on Information Science & Applications   6 ( 3 )   1130 - 1137   2006

     More details

    Language:English  

    researchmap

  • Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks Reviewed

    Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto

    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12   1849 - 1854   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICC.2006.254989

    Web of Science

    researchmap

  • A New Mechanism for Improving Robustness of TCP against Pulsing Denial-of-Service Attacks Reviewed

    Proceedings of the 5th WSEAS International Conference on Applied Computer Science (ACOS'06),   2006

     More details

    Authorship:Lead author, Corresponding author  

    researchmap

  • Avoiding TCP false retransmission in LEO satellite network using TTL information Reviewed

    H Tsunoda, K Ohta, N Kato, Y Nemoto

    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS   88 ( 1 )   64 - 71   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/ecja.10205

    Web of Science

    researchmap

  • A technique of adaptive bandwidth estimation for SACK-based TCP over wireless networks Reviewed

    T Sasaki, H Tsunoda, K Ohta, N Kato, Y Nemoto

    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS   88 ( 11 )   32 - 43   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/ecja.20215

    Web of Science

    researchmap

  • Differencing worm flows and normal flows for automatic generation of worm signatures Reviewed

    K Simkhada, H Tsunoda, Y Waizumi, Y Nemoto

    ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS   680 - 685   2005

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ISM.2005.49

    Web of Science

    researchmap

  • A Technique of Adaptive Bandwidth Estimation for SACK Based TCP over Wireless Networks

    SASAKI Takayuki, TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    The Transactions of the Institute of Electronics, Information and Communication Engineers B   87 ( 10 )   1657 - 1667   2004.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • A satellite selection method for Walker Delta LEO satellite networks Reviewed

    U Dharmaratna, H Tsunoda, N Kato, Y Nemoto

    IEICE TRANSACTIONS ON COMMUNICATIONS   E87B ( 8 )   2124 - 2131   2004.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Supporting IP/LEO satellite networks by handover-independent IP mobility management Reviewed

    H Tsunoda, K Ohta, N Kato, Y Nemoto

    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS   22 ( 2 )   300 - 307   2004.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/JSAC.2003.819977

    Web of Science

    CiNii Research

    researchmap

  • Improving TCP Performance Using Observed Hop Count Over LEO Satellite Networks Reviewed

    21st AIAA International Communications Satellite System Conference   2004

     More details

  • Shortening of Triangle Route in non-Mobile IP Node mixed Network Reviewed

    Tomoaki Sasaki, Hiroshi Tsunoda, Nei Kato, Yoshiaki Nemoto

    FIT2003: The 2nd. Forum on Information Technology (Japanese Edition)   2003.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    researchmap

  • Avoiding TCP's False Retransmission in LEO Satellite Network Using TTLInformation

    TSUNODA Hiroshi, OHTA Kohei, KATO nei, NEMOTO Yoshiaki

    The IEICE transactions on communications B   86 ( 8 )   1570 - 1577   2003.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Mobility management for IP/LEO satellite networks using geographical location Reviewed

    H Tsunoda, K Ohta, N Kato, Y Nemoto

    IEICE TRANSACTIONS ON COMMUNICATIONS   E86B ( 2 )   490 - 497   2003.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

▼display all

MISC

  • Study on Connectivity Testing over Wireless Links in a Redistribution System of Early Warning Information

    117 ( 206 )   1 - 5   2017.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Societal model for Internet of Things : the requirements (通信方式)

    角田 裕, キニグレンマンスフィールド

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 232 )   51 - 55   2016.9

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Research

    researchmap

  • B-7-35 Survey of URL Similarities among Analogous Malicious Contents Group

    Konno Yuuya, Tsunoda Hiroshi

    Proceedings of the IEICE General Conference   2016 ( 2 )   168 - 168   2016.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-20 Dominant Traffic Characteristic Analysis by Focusing on Variance of Distributions in Number of Packets

    KANAI Toui, TSUNODA Hiroshi, KEENI Glenn Mansfield

    Proceedings of the IEICE General Conference   2016 ( 2 )   153 - 153   2016.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Analyzing ARP traffic for Intranet management

    28 ( 1 )   1 - 9   2015.12

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • B-7-14 Analyzing the stability of darknet traffic by focusing source IP address and source port

    KANAI Toui, TSUNODA Hiroshi, KEENI Glenn Mansfield

    Proceedings of the Society Conference of IEICE   2015 ( 2 )   85 - 85   2015.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • BS-4-1 IoT and related security considerations : logging and its issues

    TSUNODA Hiroshi, NAKAYAMA Hidehisa, KEENI Glenn Mansfield

    Proceedings of the Society Conference of IEICE   2015 ( 2 )   "S - 12"-"S-13"   2015.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Categorizing networked devices by focusing volume of ARP requests

    27 ( 1 )   97 - 103   2015.3

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Monitoring syslog

    TSUNODA Hiroshi, KEENI Glenn Mansfield

    IEICE technical report. Communication systems   114 ( 208 )   51 - 54   2014.9

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Log messages are generated by operating systems and applications. These messages contain important information about the health and operation of the system. The messages are also of great significance for security management, audit-checks, and forensics in an intranet. So, a logging system that originates, relays, collects and archives log messages, must be monitored and managed just like all other components of the ICT infrastructure, to ensure that it is operating normally i.e., the logs are being collected and archived as desired. In the Internet, some progress has been made towards the standardization of the syslog protocol but, to date, the management aspect of syslog has been neglected, for all practical purposes. In this paper, we focus the monitoring aspect of syslog applications. Some implementation of syslog applications have the functionality to generate statistics regarding the number of log messages. Such statistics is vital information to understand the operational status of syslog applications. In order to realize remote monitoring of those statistics, we discuss the design of Management Information Base and demonstrate prototype implementation of the MIB.

    CiNii Research

    researchmap

  • Development of a Networked Power Control Device Using a Microcomputer Board

    MATSUDA MASAHIRO, TSUNODA HIROSHI

    東北工業大学紀要 1 理工学編   ( 34 )   57 - 63   2014.3

     More details

  • ネットワークの省電力化と簡易電力測定装置の開発

    松田勝敬, 角田裕

    第76回全国大会講演論文集   2014 ( 1 )   41 - 42   2014.3

     More details

    Language:Japanese  

    昨今ネットワーク機器を始めとした情報システムの省電力化の要求が強まっている。我々は,キャンパスネットワークについて,設計時からの省電力化について研究を行っている。 そのなかで,ネットワーク機器などの個々の消費電力の測定や電源制御が重要であることがわかった。しかし,既存の電力測定システムではコストや測定精度の面で,問題があることがわかった。また,エッジスイッチなどのネットワーク機器の電源を個別に制御することで,省電力効果が向上できることも明らかになった。 そこで,組込み機器を用いて,ネットワーク経由で電力測定と電源制御などができる機器を開発し,コストや機能の面での検討を含めて検証を行った。

    CiNii Research

    researchmap

  • ネットワークの省電力化と簡易電力測定装置の開発

    松田勝敬, 角田裕

    情報処理学会全国大会講演論文集   76th ( 3 )   3.41-3.42   2014.3

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 情報処理演習室における学生用端末の無駄な稼働の抑制

    庄子祐亮, 角田裕, 松田勝敬

    電子情報通信学会大会講演論文集(CD-ROM)   2014 ( 2 )   ROMBUNNO.B-7-41 - 216   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    J-GLOBAL

    researchmap

  • Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems(1)Project Vision and Overview

    SHIRATORI Norio, NAKAMURA Naoki, IZUMI Satoru, TSUNODA Hiroshi, MATSUDA Masahiro, OHTA Kohei, ISHIGAKI Masahiro, INABA Tsutomu, OGASAWARA Takashi, SUGANUMA Takuo, MANSFIELD KEENI Glenn

    IEICE technical report. Information networks   113 ( 363 )   19 - 24   2013.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We have been promoted research and development under the support of the Green ICT Innovation Promotion (PREDICT) of Ministry of Internal Affairs and Communications for the duration of 2011 to 2014. This paper reports vision and achievement of our project. In this project, we propose a Green-oriented Network Management Framework to realize an energy-saving network system without using power consumption monitoring devices such as a power meter. To realize it, we develop visualization of waste and autonomy of waste reduction. We also aim to standard G-MIB in IETF. We have participated IETF meeting 5 times to discuss our G-MIB since 2012.

    CiNii Research

    J-GLOBAL

    researchmap

  • Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems(2)Estimation of Power Consumption based on Network Information and International Standardization of G-MIB

    IZUMI Satoru, NAKAMURA Naoki, TSUNODA Hiroshi, MATSUDA Masahiro, OHTA Kohei, SUGANUMA Takuo, MANSFIELD KEENI Glenn, SHIRATORI Norio

    IEICE technical report. Information networks   113 ( 363 )   25 - 30   2013.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we propose an estimation method of power consumptions based on network information to realize energy-saving of network systems without using a smart meter. We also propose a Green-oriented Management Information Base (G-MIB) to monitor the network device status and aim it for standardization in IETF. We have participated IETF Meeting 5 times to present and discuss our G-MIB.

    CiNii Research

    J-GLOBAL

    researchmap

  • A method for estimating active period of networked devices using connection management techniques and its evaluation

    SHOJI YUSUKE, TSUNODA HIROSHI, MATSUDA MASAHIRO

    電子情報通信学会技術研究報告   113 ( 207(CS2013 28-40) )   55 - 60   2013.9

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • ネットワークの高速化と省電力効果への影響

    松田勝敬, 角田裕

    電子情報通信学会大会講演論文集(CD-ROM)   2013 ( 2 )   ROMBUNNO.B-7-14 - 111   2013.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    J-GLOBAL

    researchmap

  • L-007 Network Traffic Measurement : a closer look

    Tsunoda Hiroshi, Keeni Glenn Mansfield

    12 ( 4 )   207 - 208   2013.8

     More details

    Language:English   Publisher:Forum on Information Technology  

    CiNii Research

    researchmap

  • ネットワーク接続管理技術を利用した機器の稼働時間推定手法

    庄子祐亮, 角田裕, 松田勝敬

    情報科学技術フォーラム講演論文集   12th ( 4 )   287 - 288   2013.8

     More details

    Language:Japanese   Publisher:Forum on Information Technology  

    CiNii Research

    J-GLOBAL

    researchmap

  • Replace of Tohoku Institute of Technology Campus Network

    MATSUDA MASAHIRO, SUZUKI KEN'ICHI, NAKAYAMA HIDEHISA, KONO KOICHI, TSUNODA HIROSHI, KUDO EISUKE

    東北工業大学紀要 1 理工学編   ( 33 )   69 - 76   2013.3

     More details

  • NDP Spoofing for Traffic Monitoring in the IPv6 Intranet

    TSUNODA HIROSHI, AZUMI NOBUTAKA

    東北工業大学紀要 1 理工学編   ( 33 )   85 - 92   2013.3

     More details

  • イントラネットにおけるユーザ端末の無駄な稼働の抑制効果の検証

    庄子祐亮, 角田裕, 松田勝敬

    情報処理学会全国大会講演論文集   75th ( 3 )   3.15-3.16   2013.3

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 利用状況を考慮したスイッチ構成の省電力効果

    松田勝敬, 角田裕

    情報処理学会全国大会講演論文集   75th ( 3 )   3.63-3.64   2013.3

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 利用状況を考慮したスイッチ構成の省電力効果

    松田勝敬, 角田裕

    第75回全国大会講演論文集   2013 ( 1 )   63 - 64   2013.3

     More details

    Language:Japanese  

    ネットワーク機器について,稼動時の消費電力の低減や使用していないポートの機能停止などで省電力化が図られている。 これまでの研究から,大学などの学内ネットワークは,常に稼働している機器,断続的に稼働する機器,昼間の業務時間のみ稼働する機器などが接続されていることがわかった。また,スイッチの配置の工夫により,これらの機器の接続先をある程度まとめることができることがわかった。 そこで,夜間利用されていない機器を集めて接続したスイッチについて,夜間機器自体の電源を落とすことにより省電力化を図る方法を提案した。今回は,小規模な実験用ネットワークを構成し,実機でその効果を検討する。

    CiNii Research

    researchmap

  • イントラネットにおけるユーザ端末の無駄な稼働の抑制効果の検証

    庄子祐亮, 角田裕, 松田勝敬

    第75回全国大会講演論文集   2013 ( 1 )   15 - 16   2013.3

     More details

    Language:Japanese  

    イントラネットの省電力化は重要な課題となっており,機器の稼働時の消費電力を低減するなど様々なアプローチがなされている.一方で,これまでの研究から,イントラネットのユーザ端末が電源のみ投入され実際にはログオンされずに長時間放置されている「無駄な稼働」の存在がわかっている.そこで,本研究では,ログオン画面でのみ起動するスクリーンセーバにより,一定時間未ログオンの端末を自動的にシャットダウンをすることにより無駄な稼働の抑制を試み,それによる消費電力を削減に与える効果を検証する.

    CiNii Research

    researchmap

  • B-7-49 Power-Saving Effect of the Edge Switch Configuration Based on Port Usage

    Matsuda Masahiro, Tsunoda Hiroshi

    Proceedings of the Society Conference of IEICE   2012 ( 2 )   128 - 128   2012.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-70 NDP Spoofing for Traffic Monitoring in the IPv6 Intranet

    Azumi Nobutaka, Tsunoda Hiroshi

    Proceedings of the IEICE General Conference   2012 ( 2 )   231 - 231   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • 学内ネットワークの省電力化のための機器利用状況モニタリング

    松田勝敬, 角田裕

    第74回全国大会講演論文集   2012 ( 1 )   471 - 472   2012.3

     More details

    Language:Japanese  

    現在本学では,学内ネットワークの基盤ネットワークシステムの更改を検討している。新システムでは,電力消費の可視化の機能の実装や,無駄な機器の削減などを行い,省電力化を進める計画である。省電力化に向けた基礎データとして,現在の学内LANに設置されている情報センター管理のネットワーク機器について,ポートごとのUP/DOWN情報を定期的に取得した。そして,この情報を元にポートの利用状況を可視化することで,実稼動中の学内LANの機器の動作状況を把握し,利用されていない,または利用が少ない機器の洗い出しを行った。これらの結果による,省電力化やネットワークシステムの再設計の検討について報告する。

    CiNii Research

    researchmap

  • 学内ネットワークの省電力化のための機器利用状況モニタリング

    松田勝敬, 角田裕

    情報処理学会全国大会講演論文集   74th ( 4 )   4.471-4.472   2012.3

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Analyzing Terminal Operation Status Based on the Connection History

    TSUNODA Hiroshi, MATSUDA Masahiro, OHTA Kohei, KEENI Glenn Mansfield

    IEICE technical report. Information networks   111 ( 469 )   97 - 102   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    For a long time, global warming has become an international concern and reducing power consumption is strongly required for reducing CO2. In addition, power shortages caused by the Great East Japan Earthquake need prompt actions for cutting power consumption. The power consumption by the Internet is one of key issues because it is estimated that the traffic volume of the Internet keeps increasing and power consumption of routers is considered to become a serious problem. For reducing the power consumption, we must fully understand the network components, topologies, and activities of every component in order to find out the cause of wasted power consumption. For removing the cause of the wasted power consumption, we need to control network components. This paper describes that network management technologies will play an important role for such purpose. As a first step, we propose to use the configuration management information, connection history of terminals in intranets, for estimating the activities of terminals. Then we show that the cause of wasted power consumption can be figured out by using the estimated terminal activities.

    CiNii Research

    researchmap

  • Development of Configuration Management Application of Network Logging System using SNMP

    Eos   24 ( 1 )   49 - 56   2012.2

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • SNMPによるネットワークロギングシステムの構成管理アプリケーションの開発研究

    角田裕, 太田耕平, KEENI Glenn Mansfield

    東北工業大学新技術創造研究センター紀要   24 ( 1 )   49-56   2012.2

     More details

    Language:Japanese   Publishing type:Rapid communication, short report, research note, etc. (bulletin of university, research institution)  

    J-GLOBAL

    researchmap

  • IPv6におけるイントラネットの端末検知に関する検討

    安住信貴, 角田裕

    電気関係学会東北支部連合大会講演論文集   2011   88 - 88   2011.8

     More details

  • Development and Operation of the Network for Research with WAN Connection

    MATSUDA MASAHIRO, SUZUKI KEN'ICHI, NAKAYAMA HIDEHISA, KAWANO KOICHI, TSUNODA HIROSHI

    東北工業大学紀要 1 理工学編   ( 31 )   67-76 - 76   2011.3

     More details

  • イントラネット管理ソフトウェアのライフサイクル管理に関する研究〜組込み機器におけるVPN通信の性能評価〜

    角田裕, 安住信貴

    東北工業大学新技術創造研究センター紀要   23 ( 1 )   69-72   2011.2

     More details

    Language:Japanese   Publishing type:Rapid communication, short report, research note, etc. (bulletin of university, research institution)  

    J-GLOBAL

    researchmap

  • Research on life-cycle management of intranet management software: performance evaluation for VPN communication using embedded systems

    Eos   23 ( 1 )   69 - 72   2011.2

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • An Image Transfer System using Multiple Cellular Phone Lines

    WAIZUMI Yuji, ABE Kouich, MIYAUCHI Kaoru, NISHIYAMA Hiroki, TSUNODA Hiroshi, NAKAYAMA Hidehisa, KITAMURA Takuya, NEMOTO Yoshiaki, KATO Nei

    IEICE technical report   110 ( 20 )   41 - 46   2010.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A Image communication system using multiple cellular phone lines was developed. The communication system is designed to be able to increase its communication band dynamically by joining available deveices which are connecting phone line. To avoid its communication performance decrement, the system restrains the use of acknowlegedment, and adopts multiplex packet transmission. The communication performance and considerations will be reported though the communication experiment using multiple cellular phone lines.

    CiNii Research

    researchmap

  • Evaluation of detection system for degradation of service attacks in real network environments

    Eos   22 ( 1 )   1 - 10   2009.12

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Network Application Identification based on Characteristics of Message Transmission

    WAIZUMI Yuji, TSUKABE Yuya, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   109 ( 190 )   13 - 18   2009.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary to do so. Leakages of information, which are caused by malicious accesses for P2P netwroks, has become new social issues. To prevent information leakage, it is necessary to detect and block traffics of P2P software. Since some P2P softwares can spoof port numbers, it is difficult to detec the traffics sent from P2P softwares by using port numbers. It is more difficult to devise effective countermeasures for detecting the software because their protocol are not public. In this report, we propose an identification method of network application using response time for each application message and the number of packets to transmit a message.

    CiNii Research

    researchmap

  • Efficient Log Transfer based on Priority Queuing and Message Aggregation for Logging over Wireless Networks

    TSUNODA Hiroshi, MASHIMO Kohei, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   109 ( 190 )   19 - 24   2009.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. Mobile terminals introduce a new issue due to their mobility and wireless links those are attached and detached by moving, it leads degradation of reliability in the daily use of the logging system. Although current syslog protocol which uses UDP as an underlying transport protocol is widely used for network logging, it does not meet this requirement. In order to provide the reliability of network logging, TCP is widely used as the underlying transport protocol of syslog protocol instead of UDP. However, TCP gives adverse affect to the timeliness for important messages and the disconnection of wireless links promotes this problem. In this paper, we propose an efficient log transfer mechanism based on priority queuing and message aggregation technique for reliable logging over wireless networks.

    CiNii Research

    researchmap

  • L-018 Configuration Management for Network Logging System Using SNMP

    Tsunoda Hiroshi, Ohta Kohei, Keeni Glenn Mansfield, Waizumi Yuji, Nemoto Yoshiaki

    8 ( 4 )   171 - 172   2009.8

     More details

    Language:Japanese   Publisher:Forum on Information Technology  

    CiNii Research

    researchmap

  • Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization

    NAKAYAMA Hidehisa, TSUNODA Hiroshi, OHTA Kohei, SUZUKI Akihiro, NISHIYAMA Hiroki, NAGATOMI Ryoichi, HASHIMOTO Kazuo, WAIZUMI Yuji, KEENI Glenn MANSFIELD, NEMOTO Yoshiaki, KATO Nei

    IEICE technical report   109 ( 4 )   1 - 6   2009.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Priority-based adaptive transmission control for efficient log transfer

    TSUNODA Hiroshi, MARUYAMA Takafumi, ABE Satoru, OHTA Kohei, WAIZUMI Yuji, MANSFIELD KEENI Glenn, NEMOTO Yoshiaki

    IEICE technical report   107 ( 526 )   27 - 32   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for network logging does not meet this requirement. A new syslog protocol is being standardized at the IETF. But this protocol will only supplement the current syslog protocol. The above mentioned requirement of reliable delivery is not addressed. In this paper, we examine the issues and requirements of network logging based on experiments in a real network environment and propose an efficient log transfer method for a next-generation network logging system.

    CiNii Research

    researchmap

  • Priority-based Adaptive Transmission Control for Efficient Log Transfer

    TSUNODA Hiroshi, MARUYAMA Takafumi, ABE Satoru, OHTA Kohei, WAIZUMI Yuji, MANSFIELD KEENI Glenn, NEMOTO Yoshiaki

    IEICE technical report   107 ( 530 )   27 - 32   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for network logging does not meet this requirement. A new syslog protocol is being standardized at the IETF. But this protocol will only supplement the current syslog protocol. The above mentioned requirement of reliable delivery is not addressed. In this paper, we examine the issues and requirements of network logging based on experiments in a real network environment and propose an efficient log transfer method for a next-generation network logging system.

    CiNii Research

    researchmap

  • Priority-based adaptive transmission control for efficient log transfer

    TSUNODA Hiroshi, MARUYAMA Takafumi, ABE Satoru, OHTA Kohei, WAIZUMI Yuji, MANSFIELD KEENI Glenn, NEMOTO Yoshiaki

    IEICE technical report   107 ( 528 )   27 - 32   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for network logging does not meet this requirement. A new syslog protocol is being standardized at the IETF. But this protocol will only supplement the current syslog protocol. The above mentioned requirement of reliable delivery is not addressed. In this paper, we examine the issues and requirements of network logging based on experiments in a real network environment and propose an efficient log transfer method for a next-generation network logging system.

    CiNii Research

    researchmap

  • Generating appropriate templates for efficient application identification

    FUNAKI Akihito, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 526 )   39 - 44   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, damages of information leakage caused by illegal use of network applications have been reported. To prevent these damages, a network administrator has identified application and blocked the traffic generated by such application based on TCP port number. Since applications that misrepresent TCP port number have increased, much research attention have been focused on application identification methods utilizing statistical information of network traffic. Although we have proposed a method for identifying application based on similarity of packet payloads during start-up phase of the communication, the method was not efficient for normal traffic. In this paper, we propose a method for generating appropriate templates for efficient application identification. Through the experiments in real network environment, we evaluate that the proposed method can reduce the processing cost while keeping enough identification accuracy.

    CiNii Research

    researchmap

  • Generating appropriate templates for efficient application identification

    FUNAKI Akihito, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 528 )   39 - 44   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, damages of information leakage caused by illegal use of network applications have been reported. To prevent these damages, a network administrator has identified application and blocked the traffic generated by such application based on TCP port number. Since applications that misrepresent TCP port number have increased, much research attention have been focused on application identification methods utilizing statistical information of network traffic. Although we have proposed a method for identifying application based on similarity of packet payloads during start-up phase of the communication, the method was not efficient for normal traffic. In this paper, we propose a method for generating appropriate templates for efficient application identification. Through the experiments in real network environment, we evaluate that the proposed method can reduce the processing cost while keeping enough identification accuracy.

    CiNii Research

    researchmap

  • Generating Appropriate Templates for Efficient Application Identification

    FUNAKI Akihito, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 530 )   39 - 44   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, damages of information leakage caused by illegal use of network applications have been reported. To prevent these damages, a network administrator has identified application and blocked the traffic generated by such application based on TCP port number. Since applications that misrepresent TCP port number have increased, much research attention have been focused on application identification methods utilizing statistical information of network traffic. Although we have proposed a method for identifying application based on similarity of packet payloads during start-up phase of the communication, the method was not efficient for normal traffic. In this paper, we propose a method for generating appropriate templates for efficient application identification. Through the experiments in real network environment, we evaluate that the proposed method can reduce the processing cost while keeping enough identification accuracy.

    CiNii Research

    researchmap

  • B-7-14 Applying Network Anomaly Detection Using Histograms of Correlation Coefficients for Host-based Traffic

    Misugi Daisuke, Waizumi Yuji, Tsunoda Hiroshi, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2008 ( 2 )   91 - 91   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-28 Prioritized Retransmission for Efficient and Reliable Log Transfer

    Maruyama Takafumi, Tsunoda Hiroshi, Ohta Kohei, Waizumi Yuji, KEENI Glenn Mansfield, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2008 ( 2 )   105 - 105   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-23 Allocating Detector Function in Wireless Sersor Network

    Abe Haruhiko, Tsunoda Hiroshi, Waizumi Yuji, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2008 ( 2 )   100 - 100   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients

    MEGURO Hiroaki, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 378 )   97 - 102   2007.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    For taking effective countermeasures against network anomaly events, the classification of detected anomaly events is required. Although the conventional detection method using correlation coefficient histogram can detect the time of occurrence of anomaly events and identify the type of anomalous packets, it is impossible to automatically classify events. In this paper, we define observation features and propose to expand the conventional method by using correlation coefficient value and its probability distribution for the classification of anomaly events. Through experiments using traffic datasets, we show the possibility of classifying network anomaly events.

    CiNii Research

    researchmap

  • Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads

    SUZUKI Youhei, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 378 )   91 - 96   2007.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we have proposed the detection method based on not the common character strings but the similarity analysis of packet and flow payloads. Although the packet-wise analysis enables us to accurately detect worms, the high calculation cost of the analysis needs to be solved. In this paper, we propose an efficient signature generation method for reducing the cost of packet-wise analysis. In addition, we design the multi-stage worm detection system combining the flow-wise and packet-wise analysis for efficiently detecting worms.

    CiNii Research

    researchmap

  • An Evaluation of Transition Pattern of Payload Legnth for Network Application Identification

    YAGI Shinnosuke, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 313 )   1 - 6   2007.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, increasing of information leakages caused by illegal use of network applications have been reported. To prevent the occurrence of such incidents, a network administrator should block the traffic exchanged by unauthorized applications by checking incoming and outgoing traffic of his network We have proposed a method for application identification based on transition pattern of payload length. However, that method needs reference vectors of each application for identification. Thus, it cannot identify applications whose reference vectors do not exist. In this paper, to tackle this problem, we propose a method to classify flows of these applications as "Unknown". The proposed method classify flows of these applications by setting threshold of the distance between a vector of the monitored flow and the nearest reference vector. The proposed method can also classify misidentified flows, which is misidentified to another application as "Unknown". In addtion, we evaluate three clustering algorithms: oLVQ1, K-means, and hierarchical clustering and compare their identification performance to find the appropriate clustering algolithm for the proposed method.

    CiNii Research

    researchmap

  • A Network Application Identification Method Using Similarity of Packet Payloads

    FUNAKI Akihito, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 223 )   15 - 20   2007.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, damages of information leakage caused by illegal use of network applications have been reported. To prevent these damages, a network administrator should check incoming and outgoing traffic of his network for blocking the traffic generated by such applications. Therefore, we need a method which quickly identify application without using TCP port numbers, which are easily spoofed. In this paper, we propose a method for identifying application based on similarity of packet payloads during start-up phase of the communication. The proposed method uses a 256 dimensions vector based on the appearance frequencies of 256 character codes. Through experiments using real network traffic, we show efficiency of the proposed method. In addition, we evaluate the technique which can reduce the processing cost with enough identification accuracy.

    CiNii Research

    researchmap

  • Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks

    TSUNODA Hiroshi, OLBERT Ake, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   107 ( 223 )   9 - 14   2007.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Sensor networks are expected to be the solution to many applications, such as measuring volcanic activity and monitoring environment pollutants. Such applications do not work well if transmission of sensing data is blocked by malicious nodes. Therefore, we need to detect and eliminate malicious nodes in a sensor network. In this paper, we propose an algorithm to select which sensor nodes should activate their detector agent to be able to have full coverage of all packets in the sensor network.

    CiNii Research

    researchmap

  • An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients

    MEGURO Hiroaki, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 223 )   21 - 26   2007.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, a network anomaly detection method focusing correlation coefficients between traffic features has been proposed. This conventional method uses occurrence probability matrices of correlation coefficients for detecting anomalies and identifying anomalous traffic features. However, the conventional method fails to detect anomalous events in the case that the variation of correlation coefficient value is large in normal conditions. For detecting such events, we propose the modification of the conventional method to evaluate the anomalous increase of correlation coefficients value. Through experiments using real traffic data, we show the effectiveness of the proposed method.

    CiNii Research

    researchmap

  • B-7-39 An Enhancement of Network Anomaly Detection Method Using Histograms of Correlation Coefficients

    Meguro Hiroaki, Waizumi Yuji, Tsunoda Hiroshi, Nemoto Yoshiaki

    Proceedings of the Society Conference of IEICE   2007 ( 2 )   99 - 99   2007.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-42 A Network Application Identification Method Using Similarity of Data Components in Packet Payloads

    Funaki Akihito, Waizumi Yuji, Tsunoda Hiroshi, Nemoto Yoshiaki

    Proceedings of the Society Conference of IEICE   2007 ( 2 )   102 - 102   2007.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Classifying Network Applications Using Transition Pattern of Payload-length

    YAGI Shinnosuke, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    45 ( 38 )   83 - 88   2007.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Recently, information leakage caused by illegal use of network applications(e.g. P2P application) has become a new social issue. To prevent information leakage, early detection and blocking of the traffic exchanged by such applications is strongly required. In this paper, we propose a method for discriminating application of monitored traffic based on the transition pattern of payload-length during start-up phase of the communication. The proposed method does not need port numbers, which are easily spoofed, and can quickly discriminate applications compared with the conventional methods using traffic statistics. Through experiments using real network traffic, we show that the proposed method can quickly and accurately discriminate applications including the P2P application.

    CiNii Research

    researchmap

  • Classifying Network Applications Using Transition Pattern of Payload-length

    YAGI Shinnosuke, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 30 )   83 - 88   2007.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, information leakage caused by illegal use of network applications(e.g. P2P application) has become a new social issue. To prevent information leakage, early detection and blocking of the traffic exchanged by such applications is strongly required. In this paper, we propose a method for discriminating application of monitored traffic based on the transition pattern of payload-length during start-up phase of the communication. The proposed method does not need port numbers, which are easily spoofed, and can quickly discriminate applications compared with the conventional methods using traffic statistics. Through experiments using real network traffic, we show that the proposed method can quickly and accurately discriminate applications including the P2P application.

    CiNii Research

    researchmap

  • Detecting Causal Hosts of Anomalous Traffic using Difference of Anomaly Score

    WAIZUMI Yuji, SAGA Hideki, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   107 ( 18 )   37 - 42   2007.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We propose a method to specify hosts which send anomalous pakects when a notwork anomaly is detected. Our proposed method supposes an anomaly detection technoque based time slot observation. In many cases, the time slot base observation will not extract information to discriminate each host which send packets in each slot. It is difficult to detect true anomalous hosts from multiple hosts sending packets which are the same kind of packets detected as anomaly. Our proposed method reconstructs traffic dump data by eliminating packets of each host which is a candidate of anomalous host, and recalculates an Anomaly Score using ther reconstructed dump data. The proposed method detect true anomalous host based on the recalculated Anomaly Score.

    CiNii Research

    researchmap

  • Transmission Control in Transport Protocols for Mitigating Effects of Pulsing Denial of Service Attacks

    TSUNODA Hiroshi, ARAI Kenjirou, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   107 ( 18 )   43 - 48   2007.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Pulsing Denial-of-Service (DoS) attacks, which can significantly degrade the communication quality (e.g. throughput) of legitimate TCP flows in a stealthy manner, are new serious threat in the Internet. Pulsing DoS attacks The attacker send periodic short bursts of traffic (i.e. pulses) to cause packet losses of TCP flows. To mitigate the effect of this attacks, randomizing retransmission timeout value of TCP is useful. However, such randomizing can degrade the communication quality in the normal situation. In this paper, we propse to change the retransmission timeout value only when the attacks are detected at an intermediate routers. In the proposed method, intermediate routers notice the existence of attacks in a manner similar to Explicit Congestion Notification (ECN). In addition, we also discuss the effect of the attack on SCTP.

    CiNii Research

    researchmap

  • A-21-31 A Study of Fairness in Data Collection over Wireless Sensor Networks

    Abe Satoru, Tsunoda Hiroshi, Waizumi Yuji, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2007 ( 0 )   422 - 422   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-69 Identifying Hosts Possible for Network Anomalies by Changing Anomaly Score

    Saga Hideki, Waizumi Yuji, Tsunoda Hiroshi, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2007 ( 2 )   159 - 159   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-123 An Extended Hash-based Traceback for Tracing Reflection DDoS Attacks

    Sato Yoshinobu, Ohmori Takao, Tsunoda Hiroshi, Ohta Kohei, Glenn Mansfield Keeni, Kato Nei, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2007 ( 2 )   213 - 213   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-70 Network Anomaly Detection Based on Anomaly Duration

    Meguro Hiroaki, Waizumi Yuji, Tsunoda Hiroshi, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2007 ( 2 )   160 - 160   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-68 A Identification Method of Network Applications Based on Transition Pattern of Size of Packet

    Funaki Akihito, Tsunoda Hiroshi, Waizumi Yuji, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2007 ( 2 )   158 - 158   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-25 Detecting Worms based on Packet Payload Similarity

    Suzuki Youhei, Waizumi Yuji, Tsunoda Hiroshi, Nemoto Yoshiaki

    Proceedings of the Society Conference of IEICE   2007 ( 2 )   85 - 85   2007

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes

    ARAI Kenjiro, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    IPSJ SIG Notes   55 ( 132 )   83 - 88   2006.12

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave concern to networks. The fact that they generate less traffic than traditional flood-based attacks makes PDoS detection more difficult. Although most of the conventional PDoS detection schemes observe the periodical pattern of the pulse trains, attackers can easily evade the detection system by merely controlling the timing of pulse transmission. The bandwidth usage-based detection scheme, which the authors previously proposed, is robust to the control of attack traffic by attackers. However, the conventional method needs high observation cost because the flow-based traffic analysis is required for reducing false positives. In this paper, we propose a new bandwidth usage-based detection method taking into account the burstiness of traffic which is the principal feature of PDoS attacks. The proposed method can drastically decrease the number of false positives without complicated flow-based traffic analysis. Since the proposed method monitors only aggregated flows, the observation cost is also reduced as compared with the conventional method. Through various simulations, we demonstrate the effectiveness of the proposed method.

    CiNii Research

    researchmap

  • Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes

    ARAI Kenjiro, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    55   83 - 88   2006.12

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes

    ARAI Kenjiro, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   106 ( 424 )   25 - 30   2006.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave concern to networks. The fact that they generate less traffic than traditional flood-based attacks makes PDoS detection more difficult. Although most of the conventional PDoS detection schemes observe the periodical pattern of the pulse trains, attackers can easily evade the detection system by merely controlling the timing of pulse transmission. The bandwidth usage-based detection scheme, which the authors previously proposed, is robust to the control of attack traffic by attackers. However, the conventional method needs high observation cost because the flow-based traffic analysis is required for reducing false positives. In this paper, we propose a new bandwidth usage-based detection method taking into account the burstiness of traffic which is the principal feature of PDoS attacks. The proposed method can drastically decrease the number of false positives without complicated flow-based traffic analysis. Since the proposed method monitors only aggregated flows, the observation cost is also reduced as compared with the conventional method. Through various simulations, we demonstrate the effectiveness of the proposed method.

    CiNii Research

    researchmap

  • Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes

    ARAI Kenjiro, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   106 ( 422 )   25 - 30   2006.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave concern to networks. The fact that they generate less traffic than traditional flood-based attacks makes PDoS detection more difficult. Although most of the conventional PDoS detection schemes observe the periodical pattern of the pulse trains, attackers can easily evade the detection system by merely controlling the timing of pulse transmission. The bandwidth usage-based detection scheme, which the authors previously proposed, is robust to the control of attack traffic by attackers. However, the conventional method needs high observation cost because the flow-based traffic analysis is required for reducing false positives. In this paper, we propose a new bandwidth usage-based detection method taking into account the burstiness of traffic which is the principal feature of PDoS attacks. The proposed method can drastically decrease the number of false positives without complicated flow-based traffic analysis. Since the proposed method monitors only aggregated flows, the observation cost is also reduced as compared with the conventional method. Through various simulations, we demonstrate the effectiveness of the proposed method.

    CiNii Research

    researchmap

  • Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes

    ARAI Kenjiro, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    30 ( 67 )   25 - 30   2006.12

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Using Multiple Normal states for Network Anomaly Detection

    HIRAMATSU Naotoshi, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   106 ( 238 )   61 - 66   2006.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Network anomaly detection requires modeling the normal state of the network. When the observation quantities of networks are the mixtures of multiple correlations, correlations between the observed quantities cannot be approximated with a single model. This retards the system's ability in correctly detecting anomaly. In this paper, we propose a novel clustering technique which defines multiple normal states of network by assigning data with different correlations to different clusters. Furthermore, based on the data distribution of the multiple clusters, we also propose a scheme to select both kinds of models - models that use correlations and models that do not. Hence, we succesfully formulate a scheme to dynamically select the model that is most suitable to the prevailing network state. We evaluate the ability the proposed clustering scheme and the model selection scheme in detecting anomalous events and present the results.

    CiNii Research

    researchmap

  • Increasing Efficiency of DoS-Attack Traceback over Mobile Networks

    TOCHIORI Taishi, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   106 ( 238 )   79 - 84   2006.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Denial of Service (DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rapidly over a few years, are vulnerable to DoS attacks. In mobile networks, the fact that attackers have the mobility privilage makes the traceback difficult. In this paper we propose a novel and efficient technique to trace the attack route before the attacker enters another network. The proposed scheme uses Time To Live (TTL) values of packets and is capable of tracing the attacker in a short time. Simulation experiments show that the proposed scheme is more efficient in tracing attackers in a mobile environment than conventional approaches.

    CiNii Research

    researchmap

  • Detecting Pulsing Denial-of-Service Attacks by Using Bandwidth Usage Condition

    ARAI Kenjiro, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   106 ( 238 )   73 - 78   2006.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave concern to networks. The fact that they generate less traffic than traditional flood-based attacks makes PDoS detection more difficult. Most of the conventional PDoS detection schemes observe the periodical pattern of the pulse trains. Thus, attackers can easily escape the detection system by merely controlling the timing of pulse transmission. In addition, if the attack traffic does not path through the observation point of victim network, it is impossible to detect PDoS with conventional PDoS detection schemes. In this paper, we propose a novel and robust PDoS detection scheme. The proposed scheme grasps the bandwidth usage condition from network traffic and make use of the fact that TCP is designed to achieve the maximum bandwidth utilization to distinguish between the congestion due to normal traffic and the congestion due to PDoS. Simulation experiments show that the proposed scheme is effective and robust in detecting PDoS.

    CiNii Research

    researchmap

  • B-7-32 Ensuring Interoperability of Traffic Patterns for Wide Area Collaborative DoS Traceback

    Ohmori Takao, Sato Yoshinobu, Tsunoda Hiroshi, Ohta Kohei, Keeni Glenn Mansfield, Kato Nei, Nemoto Yoshiaki

    Proceedings of the Society Conference of IEICE   2006 ( 2 )   92 - 92   2006.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • B-7-31 Detecting Pulsing Denial-of-Service Attacks Based on Link Utilization Rate

    Arai Kenjiro, Tsunoda Hiroshi, Waizumi Yuji, Nemoto Yoshiaki

    Proceedings of the Society Conference of IEICE   2006 ( 2 )   91 - 91   2006.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • A Low Cost Worm Detection Technique based on Flow Payload Clustering

    SUZUKI Youhei, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   106 ( 238 )   67 - 72   2006.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, damages of information systems by worms have been reported at the global level. To control these damages, some automatic signature genenation techniques have been proposed. These techniques use as signature the set of common character strings in the payload of multiple worm flows of the same kind. But these techniques need multiple common character strings for each worm to achieve a high detection rate. Calculation cost is a serious issue for these techniques. In this paper, we propose a novel scheme that does not use common character strings. The proposed scheme uses a 256 dimensions vector based on the appearance frequencies of 256 character codes. This vector is used as a mean to detect worms with low cost. In addition, we construct a cheap worm detection system by using the proposed method as the first stage analysis of conventional Intrusion Detection System (IDS). We evaluate the proposed scheme through experiments and present its performance.

    CiNii Research

    researchmap

  • A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads

    TSUNODA Hiroshi, WAIZUMI Yuji, SEKIBE Zheng, NEMOTO Yoshiaki

    106 ( 153 )   17 - 22   2006.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads

    TSUNODA Hiroshi, WAIZUMI Yuji, SEKIBE Zheng, NEMOTO Yoshiaki

    IEICE technical report   106 ( 153 )   17 - 22   2006.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Security management is a core issue in the current Internet, and illegal accesses is a serious problem in security management. Among various types of illegal accesses, damage caused by Internet worms has become a social problems. For avoiding and mitigating the damage from worms, early detection and appropriate responses depending on the type of worms are required. Although signature-based intrusion detection systems (IDSs) are useful countermeasures for worms, classification result of detected worms may differ for different among IDSs, because signatures are criteria on distinction of the worm type. This can incur confusion on appropriate responses for worms. In this paper, we presents a worm classification system based on the common pieces included in the payload of the same type of worms.

    CiNii Research

    researchmap

  • A State Evaluation Method of Network Traffic using Histograms of Correlation Coefficients

    WAIZUMI Yuji, HIROSE Jun'ichi, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   106 ( 41 )   33 - 36   2006.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We propose a network traffic modeling method using a histogram of the probabilities of of occurrence of correlation coefficients which are calculated using a pair of observed values of network traffic, and propose a state evaluation method of network traffic using a matrix of the probabilities. This report show that some characteristic matrices can be generated correspond to malicious accesses and types of application, and a prospect of anomaly detection based on the matrix.

    CiNii Research

    researchmap

  • B-7-113 TTL-based Probability Adjustment for Generating DoS Traceback Message

    Tochiori Taishi, Tsunoda Hiroshi, Waizumi Yuji, Nemoto Yoshiaki

    Proceedings of the IEICE General Conference   2006 ( 2 )   209 - 209   2006.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • A Network State Evaluation Method Based on Correlation between Types of Packets

    HIROSE Junichi, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   105 ( 405 )   5 - 8   2005.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In a network anomaly detection it is necessary to evaluate quantitatively network state. For example, as TCP SYN packets and TCP FIN packets almost have relation one to one in the network traffic, correlations exist. In this paper we propose to define network state by observing sorts of traffics and calculating correlation coefficients between types of packets each time. We think appearance of correlations which would not appear normaly presents anomaly state in the network. Through experiments using real network traffic data we report about the results.

    CiNii Research

    researchmap

  • Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for Improving DDoS Traceback Accuracy

    UTSUMI Hironori, TSUNODA Hiroshi, WAIZUMI Yuji, NEMOTO Yoshiaki

    IEICE technical report   105 ( 405 )   1 - 4   2005.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    For Traffic pattern based traceback techniques, non-DoS traffic included in DoS traffic becomes a source of noise which results in the reduction of traceback accuracy. During the Flooding DoS attack, lower bounds of traffic volume of links on a attack path is larger than the rate of attack traffic during the attack. In this paper, we propose a traffic pattern filtering method based on lower bounds of traffic volume for improving DDoS traceback accuracy and using original patterns and filtered patterns for traceback. We evaluate the traceback accuracy of the proposed method by the simulation using traffic obtained from a real network.

    CiNii Research

    researchmap

  • A Network Anomaly Detection based on Multi-Stage Traffic Analysis

    TSUJI Masashi, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report   105 ( 405 )   9 - 12   2005.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Owing to the excessive amount of damage they are causing, epidemic worms have become a social problem. Recent researches have pointed out that epidemic worms propagate similar payloads. The authors have shown in previous researches that it is possible to evaluate similarities between these payloads by a 256 dimensions vector based on histograms of the appearance frequencies of 256 character codes. We have confirmed this through our earlier researches. However, this method, if applied to flows from only one network, is prone to false positives in cases such as normal emails that are sent through mailing lists. To overcome such problems, we propose a new scheme which checks for any similarity between flows detected at several IDSs in a distributed environment. The proposed scheme is based on the fact that normal payloads propagating from different networks are different, whereas in case of epidemic worms similar payloads are generated from several networks. Through experiments using real network traffic that contains worms, we present the effectiveness of the proposed scheme.

    CiNii Research

    researchmap

  • A Network Anomaly Detection based on Multi-Stage Traffic Analysis

    TSUJI Masashi, WAIZUMI Yuji, TSUNODA Hiroshi, NEMOTO Yoshiaki

    IEICE technical report. Information networks   105 ( 279 )   67 - 72   2005.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The explosive growth of the Internet has increasingly given rise to better sophisticated and larger number of intrusions. Hence, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasingly being felt. Even in anomaly-based detections, it is possible to observe traffic by several approaches. Among them, flow-based detection which uses a series of packets exchanges between two terminals as a unit of observation has an advantage of being able to detect anomaly that is present only in some specific sessions. However, in large-scale networks where a large number of communication takes place, analyzing every flow is not practical. In this paper, we propose an anomaly detection method which is based on multi stage traffic analysis. The proposed method analyzes traffic in slots of fixed length and narrows down the number of flows which need to be subjected to detection. Through experiments using datasets, we present the effectiveness of the proposed method.

    CiNii Research

    researchmap

  • B-7-1 A DoS Traceback Technique Based on Lower Bounds of Traffic Volume

    Utsumi Hironori, Tsunoda Hiroshi, Waizumi Yuji, Nemoto Yoshiaki

    Proceedings of the Society Conference of IEICE   2005 ( 2 )   128 - 128   2005.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • A Flow Reduction Method for Anomaly Detection based on Multi-Stage Traffic Analysis

    Masashi TSUJI, Yuji WAIZUMI, Hiroshi TSUNODA, Yoshiaki NEMOTO

    in Proc. of 21th Annual Computer Security Application Conference (ACSAC)   2005

     More details

  • Detecting DRDoS Attacks with Bidirectional Packet Confirmation

    YAMAMOTO Atsunori, OHTA Kohei, TSUNODA Hiroshi, KATO Nei, NEMOTO Yoshiaki

    IEICE technical report. Information networks   104 ( 275 )   7 - 12   2004.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from legitimate hosts in reply to the attacker's request packet. Since the number of attack packetsis large, the recognition of attack is simple. However in a DoS situation mspecting all the packets in detail is not. realistic, therefore identification and filtering of attack packets are challenging tasks. In this paper, a method for detecting DRDoS attacks, based on verification of response packets with bidirectional packet confirmation, is proposed. The proposed method makes detection system scalable by generating response packet candidates at the time of sending the request packet in advance. We evaluate the detection performance and scalability of this method through some experiments.

    CiNii Research

    researchmap

  • Detecting DRDoS Attacks with Bidirectional Packet Confirmation

    YAMAMOTO Atsunori, OHTA Kohei, TSUNODA Hiroshi, KATO Nei, NEMOTO Yoshiaki

    IEICE technical report. Communication systems   104 ( 277 )   7 - 12   2004.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from legitimate hosts in reply to the attacker's request packet. Since the number of attack packetsis large, the recognition of attack is simple. However in a DoS situation mspecting all the packets in detail is not. realistic, therefore identification and filtering of attack packets are challenging tasks. In this paper, a method for detecting DRDoS attacks, based on verification of response packets with bidirectional packet confirmation, is proposed. The proposed method makes detection system scalable by generating response packet candidates at the time of sending the request packet in advance. We evaluate the detection performance and scalability of this method through some experiments.

    CiNii Research

    researchmap

  • Detecting DRDoS Attacks with Bidirectional Packet Confirmation

    YAMAMOTO Atsunori, OHTA Kohei, TSUNODA Hiroshi, KATO Nei, NEMOTO Yoshiaki

    IEICE technical report   104 ( 273 )   7 - 12   2004.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from legitimate hosts in reply to the attacker's request packet. Since the number of attack packetsis large, the recognition of attack is simple. However in a DoS situation mspecting all the packets in detail is not. realistic, therefore identification and filtering of attack packets are challenging tasks. In this paper, a method for detecting DRDoS attacks, based on verification of response packets with bidirectional packet confirmation, is proposed. The proposed method makes detection system scalable by generating response packet candidates at the time of sending the request packet in advance. We evaluate the detection performance and scalability of this method through some experiments.

    CiNii Research

    researchmap

  • SB-4-2 Analyzing the stability of traffic for illegal access and fault detection

    OHTA Kohei, MANSFIELD KEENI Glenn, TSUNODA Hiroshi, FUJII Akihiro, ISHIGAKI Masahiro, KATO Nei

    Proceedings of the IEICE General Conference   2004 ( 2 )   "S - 29"-"S-30"   2004

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Research

    researchmap

  • A Proposal for Service Satellite Selection over LEO Satellite Networks Using Geographical Location Information

    DHARMARATNA Umith, TSUNODA Hiroshi, KATO Nei, NEMOTO Yoshiaki

    Technical report of IEICE. SAT   103 ( 386 )   7 - 12   2003.10

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Since LEO(Low Earth Orbit) satellites move relative to Earth, handovers are required from time to time. Some LEO satellite networks have satellites orbiting in two different direction. One from north to south and one from south to north. Communication between satellites orbiting in different directions can take place only through the polar region. Therefore when terminals are connected to satellites orbiting in different directions propagation delay is longer than when they are connected to satellites orbiting in the same direction. Usually two satellites can be seen by a ground terminal, o...

    CiNii Research

    researchmap

  • A Proposal for Service Satellite Selection over LEO Satellite Networks Using Geographical Location Information (2003 Joint Conference on Satellite Communications(JC-SAT 2003))

    DHARMARATNA Umith, TSUNODA Hiroshi, KATO Nei, NEMOTO Yoshiaki

    Technical report of IEICE. SAT   103 ( 386 )   7 - 12   2003.10

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Since LEO(Low Earth Orbit) satellites move relative to Earth, handovers are required from time to time. Some LEO satellite networks have satellites orbiting in two different direction. One from north to south and one from south to north. Communication between satellites orbiting in different directions can take place only through the polar region. Therefore when terminals are connected to satellites orbiting in different directions propagation delay is longer than when they are connected to satellites orbiting in the same direction. Usually two satellites can be seen by a ground terminal, one satellite orbiting in each direction. Conventional service satellite selection method, select the satellite which has the highest angle of elevation to handover a terminal, which can result in two communicating terminal getting connected to satellites orbiting in different directions. In the case of handover between satellites orbiting in different directions the degradation of communication quality is higher due to the drastic change in delay. In this paper we propose a satellite selection method to connect communicating terminals to satellites orbiting in the same direction, using geographical location information of the communicating terminals. We show through simulation that the proposed method reduce the delay and jitter, number of hops required for communication as well as congestion in polar region links.

    CiNii Research

    researchmap

  • Mobility Management for IP/LEO Satellite Network using Geographical Location Information

    TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    IEICE technical report. Communication systems   102 ( 101 )   27 - 32   2002.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Mobility management is one of the problems on LEO (Low Earth Orbit) IP satellite network. In mobility management, a binding between unique name of a node and position in a network of the node is needed. In IP network, binding update is required when handover is occured, because IP address which indicates the position in a network of the node changes with handover. In LEO satellite network, however concentrated handover are caused by fast movement of satellites. So, existing mobility management schemes are not suitable for LEO network, because control traffic when binding update also occurs intensively. In this paper, we propose new mobility management scheme that separates binding update from handover by using geographical information of the node. And then we evaluate proposed scheme and show the validity.

    CiNii Research

    researchmap

  • Mobility Management for IP/LEO Satellite Network using Geographical Location Information

    TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    Technical report of IEICE. OCS   102 ( 103 )   27 - 32   2002.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Mobility management is one of the problems on LEO (Low Earth Orbit) IP satellite network. In mobility management, a binding between unique name of a node and position in a network of the node is needed. In IP network, binding update is required when handover is occured, because IP address which indicates the position in a network of the node changes with handover. In LEO satellite network, however concentrated handover are caused by fast movement of satellites. So, existing mobility management schemes are not suitable for LEO network, because control traffic when binding update also occurs intensively. In this paper, we propose new mobility management scheme that separates binding update from handover by using geographical information of the node. And then we evaluate proposed scheme and show the validity.

    CiNii Research

    researchmap

  • LEO衛星IPネットワークにおける移動管理に関する一考察

    角田裕

    Mar 2002. 電子情報通信学会2002年総合大会   2002

  • A proposal of TCP congestion control for LEO Satellite Network taking into account handover problem

    TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    Technical report of IEICE. SAT   100 ( 484 )   81 - 86   2000.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, much research attention has been focused on LEO satellite networks connected to ISL(Inter Satellite Link).A global network, covering the whole earth, can be developed if wireless and wired networks are seamlessly by TCP/IP protocol.However, being originally designed for wired networks, the implementation of TCP/IP on LEO satellite networks may give rise to some difficulties, such as dynamic propagation delay caused by handover and re-routing.In this paper, we propose enhanced TCP congestion control mechanism for LEO satellite network.Our proposal aims to attenuate handover problem with the use of IP header's TTL field.Our simulation results show how effective our mechanism is avoiding unnecessary fast retransmit and decreasing congestion.

    CiNii Research

    researchmap

  • A Proposal of Using TTL information for TCP/IP in LEO(Low Earth Orbit) Satellite Network

    TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    IEICE technical report. Antennas and propagation   100 ( 219 )   33 - 38   2000.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, attention to LEO(Low Earth Orbit)satellite network which is connected to ISL(Inter Satellite Link)is being increased. Building global network which covers the whole earth is possible if seamless connection between present ground network and LEO satellite network by using TCP / IP is possible. However, TCP / IP is originally designed for ground network. Consequently, various problems are expected on LEO satellite network. In this paper, we examine TCP / IP communication which is applied to LEO satellite network. Through this, we clarified that unnecessary fast retransmission occurs by handover during communication. Furthermore, we propose how to control this unnecessary retransmission by adding few changes to the end terminal using TTL field of IP header. In addition, we evaluate proposed model by simulation. Finally, we show possiblity of congestion control by combining RTT measuring with TTL field information.

    CiNii Research

    researchmap

  • A Proposal of Using TTL information for TCP/IP in LEO(Low Earth Orbit) Satellite Network

    TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    IEICE technical report. Microwaves   100 ( 225 )   33 - 38   2000.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, attention to LEO(Low Earth Orbit) satellite network which is connected to ISL(Inter Satellite Link) is being increased. Building global network which covers the whole earth is possible if seamless connection between present ground network and LEO satellite network by using TCP/IP is possible. However, TCP/IP is originally designed for ground network. Consequently, various problems are expected on LEO satellite network. In this paper, we examine TCP/IP communication which is applied to LEO satellite network. Through this, we clarified that unnecessary fast retransmission occurs by handover during communiction. Furthermore, we propose how to control this unnecessary retransmission by adding few changes to the end terminal using TTL field of IP header. In addition, we evaluate proposed model by simulation. Finally, we show possiblity of congestion control by combining RTT measuring with TTL field information.

    CiNii Research

    researchmap

  • A Proposal of Using TTL information for TCP/IP in LEO(Low Earth Orbit) Satellite Network

    TSUNODA Hiroshi, OHTA Kohei, KATO Nei, NEMOTO Yoshiaki

    Technical report of IEICE. SAT   100 ( 222 )   33 - 38   2000.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, attention to LEO(Low Earth Orbit)satellite network which is connected to ISL(Inter Satellite Link)is being increased. Building global network which covers the whole earth is possible if seamless connection between present ground network and LEO satellite network by using TCP/IP is possible. However, TCP/IP is originally designed for ground network. Consequently, various problems are expected on LEO satellite network. In this paper, we examine TCP/IP communication which is applied to LEO satellite network. Through this, we clarified that unnecessary fast retransmission occurs by handover during communiction. Furthermore, we propose how to control this unnecessary retransmission by adding few changes to the end terminal using TTL field IP of header. In addition, we evaluate proposed model by simulation. Finally, we show possiblity of congestion control by combining RTT measuring with TTL field information.

    CiNii Research

    researchmap

▼display all

Presentations

  • LLMを活用した管理WebUIの分析によるデバイス識別システムの研究

    林崎 裕太,角田 裕

    情報処理学会第87回全国大会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • SNS 上の隠語検出におけるLLM の適用可能性

    佐次 寛昇,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • クイッシング対策機能を備えた QR コードリーダアプリの提案

    渡邉 晃矢,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • 調査目的スキャナの詳細分析に向けたネットワーク単位の細分化の検討

    鹿内 嵩天,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • コンテナを活用したサイバー防犯ボランティア支援システムの設計と実装

    嶋津 弘太郎,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • 解決元ドメイン名有効活用のための検索システムの提案

    武田 風雅,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • 安全かつ効率的なスミッシング報告活動のためのシステム開発

    遠藤 清志郎,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • 送信元国に着目したダークネットトラフィックの集計可視化システム

    工藤 壮留,角田 裕

    令和7年東北地区若手研究者研究発表会  2025.3 

     More details

    Event date: 2025.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:東北学院大学五橋キャンパス  

    researchmap

  • ゼロトラストを目指して:ドメイン情報に基づくトラフィックフローの監査

    田中 翔吾,角田 裕,キニ グレン マンスフィールド

    2024年度電気関係学会東北支部連合大会  2024.8 

     More details

    Event date: 2024.8

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ホームネットワーク管理のためのデバイス識別システムの検討

    林崎 裕太,角田 裕

    2024年度電気関係学会東北支部連合大会  2024.8 

     More details

    Event date: 2024.8

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • セキュリティ管理のための名前解決元ドメイン取得システムの検討

    武田 風雅,角田 裕

    2024年度電気関係学会東北支部連合大会  2024.8 

     More details

    Event date: 2024.8

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • eBPFを用いたアプリケーション別パケットキャプチャツールの試作と応用

    岡部 将也,角田 裕

    電子情報通信学会 情報通信マネジメント (ICM) 研究会  2024.5 

     More details

    Event date: 2024.5

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:とりぎん文化会館/オンライン  

    researchmap

  • SDNを用いたアプリケーション単位でのアクセス管理方式の一検討

    寺崎翔太,角田裕

    令和6年東北地区若手研究者研究発表会  2024.3 

     More details

    Event date: 2024.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:日本大学工学部  

    researchmap

  • GPT3.5とMininetを組み合わせたファイアウォールルール学習教材

    大橋貴之,角田裕

    令和6年東北地区若手研究者研究発表会  2024.3 

     More details

    Event date: 2024.3

    Language:Japanese   Presentation type:Poster presentation  

    Venue:日本大学工学部  

    researchmap

  • 調査目的スキャンの分別によるダークネットトラフィックの量的変化の確認

    鹿内嵩天,角田裕

    令和6年東北地区若手研究者研究発表会  2024.3 

     More details

    Event date: 2024.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:日本大学工学部  

    researchmap

  • eBPFによる送信パケット監視に適したフックポイントの調査

    岡部 将也,角田 裕

    電子情報通信学会 情報通信マネジメント (ICM) 研究会  2023.11 

     More details

    Event date: 2023.11

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:愛媛県男女共同参画センター  

    researchmap

  • eBPFによる送信パケット監視に利用可能なフックポイントの調査

    岡部 将也,角田 裕

    2023年電子情報通信学会ソサイエティ大会  2023.9 

     More details

    Event date: 2023.9

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:名古屋大学 東山キャンパス  

    researchmap

  • MUDの概念を応用した汎用デバイスの管理に向けた一検討

    岡部将也,角田裕

    2023年電子情報通信学会総合大会  2023.3 

     More details

    Event date: 2023.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • プッシュ型配信を活用したサイバーパトロール活動促進システムの検討

    横山 未有,角田 裕

    第21回情報科学技術フォーラム(FIT2022)  2022.9 

     More details

    Event date: 2022.9

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ホストの通信行動把握を支援する通信フロー情報の可視化システム

    岡部 将也,角田 裕

    2022年度電気関係学会東北支部連合大会  2022.8 

     More details

    Event date: 2022.8

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Instagramを対象としたサイバーパトロールの効率化手法の検討

    横山 未有,角田 裕

    情報処理学会第84回全国大会  2022.3 

     More details

    Event date: 2022.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • サイバー防犯ボランティアの通報活動を効率化するシンプルなGUIアプリケーション

    横山 未有,角田 裕

    2021年度電気関係学会東北支部連合大会  2021.8 

     More details

    Event date: 2021.8

    Language:Japanese  

    researchmap

  • 汎用デバイスの厳格なアクセス制御のための通信ポリシーの定義手法の検討

    岡部 将也,角田 裕

    令和5年東北地区若手研究者研究発表会  2023.3 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • DNS による名前解決を伴わない通信の観測と分析

    伊藤博人,角田裕

    令和5年東北地区若手研究者研究発表会  2023.3 

     More details

    Language:Japanese   Presentation type:Poster presentation  

    researchmap

  • 機械学習とプッシュ型配信を活用したサイバーパトロール活動促進システムの開発

    横山 未有,角田 裕

    情報処理学会 第164回情報システムと社会環境研究発表会  2023.6 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • -

    2011.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.10 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.10 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2011.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.12 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.12 

     More details

    Language:Japanese  

    researchmap

  • -

    2013.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2012.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2012.8 

     More details

    Language:Japanese  

    researchmap

  • -

    2012.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2011.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2011.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2011.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2012.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2012.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2011.8 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2019.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2019.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

  • IPv6イントラネットにおける未使用IPアドレス宛パケットの観測

    本多善貴,角田裕

    令和3年東北地区若手研究者研究発表  2021.2 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • イントラネットにおけるホスト単位の通信監視の試行

    樽川正勝,角田裕

    令和3年東北地区若手研究者研究発表会  2021.2 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

  • サイバーパトロールへのOCR技術活用に関する検討

    横山 未有,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • ダークウェブの安全かつ効率的な調査に関する検討

    小山 雄吾,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • Dockerを用いたDRDoS攻撃演習システムの開発

    郷内 烈,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • 教育者向けの実践的なセキュリティe-Learning教材の開発

    髙橋 諒,角田 裕

    令和4年東北地区若手研究者発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • ホストの通信行動の把握を目指したフローの観測と分析に関する検討

    武山 哲弥,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • BLEビーコンと連携した提示情報の制御アプリの開発

    新田 直人,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.8 

     More details

    Language:Japanese  

    researchmap

  • -

    2016.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2018.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2018.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2018.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2017.8 

     More details

    Language:Japanese  

    researchmap

  • -

    2019.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2018.11 

     More details

    Language:Japanese  

    researchmap

  • -

    2018.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2018.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2019.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.10 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.8 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.8 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2014.11 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.9 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2015.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

  • ホストの通信行動の把握を目指した対外通信の観測と分析に関する検討

    坂本 匠,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • ダークネット観測レポート自動生成システムの機能強化

    久米田 悠晶,角田 裕

    令和4年東北地区若手研究者研究発表会  2022.2 

     More details

    Language:Japanese  

    researchmap

  • プレゼント企画ツイートに着目した偽アカウントの収集

    鈴木健流,角田裕

    令和5年東北地区若手研究者研究発表会  2023.3 

     More details

    Language:Japanese   Presentation type:Poster presentation  

    researchmap

  • PyAutoGUIを活用したSNSの有害投稿通報アプリの開発

    松尾龍之介,角田裕

    令和5年東北地区若手研究者研究発表会  2023.3 

     More details

    Language:Japanese   Presentation type:Poster presentation  

    researchmap

  • サイバーパトロール活動効率化へ向けた機械学習による投稿の有害判定モデルの開発

    横山 未有,角田 裕

    情報処理学会 第162回情報システムと社会環境研究発表会  2022.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • NetFlow データの可視化によるホストの通信行動の把握

    及川健浩,角田裕

    令和5年東北地区若手研究者研究発表会  2023.3 

     More details

    Language:Japanese   Presentation type:Poster presentation  

    researchmap

  • コマンド選択式によるARPキャッシュポイズニングの演習システム

    大友涼真,角田裕

    令和5年東北地区若手研究者研究発表会  2023.3 

     More details

    Language:Japanese   Presentation type:Poster presentation  

    researchmap

  • -

    2019.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2019.3 

     More details

    Language:Japanese  

    researchmap

  • -

    2020.3 

     More details

    Language:Japanese  

    researchmap

▼display all

Industrial property rights

  • 利用対象情報管理装置及び利用対象情報管理方法ならびにそのプログラム

    佐藤 良信, 大森 孝雄, 角田 裕, 和泉 勇治, 加藤 寧, 根元 義章, 太田 耕平, キニ グレン, マンスフィールド

     More details

    Applicant:東日本電信電話株式会社, 国立大学法人東北大学, 株式会社サイバー・ソリューションズ

    Application no:特願2007-165987  Date applied:2007.6

    Announcement no:特開2008-269544  Date announced:2008.11

    J-GLOBAL

    researchmap

  • 利用対象情報管理装置及び利用対象情報管理方法ならびにそのプログラム

    佐藤 良信, 大森 孝雄, 角田 裕, 和泉 勇治, 加藤 寧, 根元 義章, 太田 耕平, キニ グレン, マンスフィールド

     More details

    Applicant:東日本電信電話株式会社, 国立大学法人東北大学, 株式会社サイバー・ソリューションズ

    Application no:特願2007-084572  Date applied:2007.3

    Announcement no:特開2008-242959  Date announced:2008.10

    J-GLOBAL

    researchmap

  • ネットワーク異常検知方法およびネットワーク異常検知システム

    嵯峨 秀樹, 和泉 勇治, 角田 裕, 根元 義章

     More details

    Applicant:国立大学法人東北大学

    Application no:特願2007-054898  Date applied:2007.3

    Announcement no:特開2008-219525  Date announced:2008.9

    J-GLOBAL

    researchmap

  • サービス提供可否判定システム、サービス提供装置、サービス提供方法、ならびにそのプログラム

    佐藤 良信, 大森 孝雄, 角田 裕, 和泉 勇治, 加藤 寧, 根元 義章, 太田 耕平, キニ グレン, マンスフィールド

     More details

    Applicant:東日本電信電話株式会社, 国立大学法人東北大学, 株式会社サイバー・ソリューションズ

    Application no:特願2007-042270  Date applied:2007.2

    Announcement no:特開2008-206041  Date announced:2008.9

    J-GLOBAL

    researchmap

  • ネットワーク異常検知方法およびネットワーク異常検知システム

    和泉 勇治, 角田 裕, 根元 義章

     More details

    Applicant:国立大学法人東北大学

    Application no:特願2007-544150  Date applied:2006.11

    Patent/Registration no:特許第4677569号  Date issued:2011.2

    J-GLOBAL

    researchmap

  • ネットワーク異常検知方法およびネットワーク異常検知システム

    和泉 勇治, 角田 裕, 根元 義章

     More details

    Applicant:国立大学法人東北大学

    Application no:JP2006322236  Date applied:2006.11

    Announcement no:WO2007-055222  Date announced:2007.5

    J-GLOBAL

    researchmap

  • 拡散型不正アクセス検出方法および拡散型不正アクセス検出システム

    和泉 勇治, 角田 裕, 根元 義章

     More details

    Applicant:国立大学法人東北大学

    Application no:特願2005-258812  Date applied:2005.9

    Announcement no:特開2007-074339  Date announced:2007.3

    J-GLOBAL

    researchmap

  • 不正アクセス追跡方法および不正アクセス追跡システム

    和泉 勇治, 角田 裕, 根元 義章

     More details

    Applicant:国立大学法人東北大学

    Application no:特願2005-257789  Date applied:2005.9

    Announcement no:特開2007-074219  Date announced:2007.3

    J-GLOBAL

    researchmap

  • 異常パケット種別特定方法および異常パケット種別特定システム

    和泉 勇治, 角田 裕, 根元 義章

     More details

    Applicant:国立大学法人東北大学

    Application no:特願2005-242479  Date applied:2005.8

    Announcement no:特開2007-060233  Date announced:2007.3

    J-GLOBAL

    researchmap

▼display all

Awards

  • Senior Member

    2024.12   IEEE   Senior Member

    Hiroshi Tsunoda

     More details

  • Outstanding Paper Award

    2018.5   2018 5th International Conference on Business and Industrial Research (ICBIR)   Using normalized entropy to compare traffic differences in stable and unstable time slots

    Napaphat Vichaidis, Hiroshi Tsunoda

     More details

  • The 2nd IEEE Global Conference on Consumer Electronics (GCCE 2013) 3rd Prize Excellent Paper Award

    2013.10   IEEE  

    Satoru Izumi, Naoki Nakamura, Hiroshi Tsunoda, Masahiro Matsuda, Kohei Ohta, Takuo Suganuma, Glenn M. Keeni, Norio Shiratori

     More details

    Award type:Award from international society, conference, symposium, etc. 

    researchmap

  • 研究奨励賞

    2012.3   財団法人トーキン科学技術振興財団  

    角田裕

     More details

    Award type:Award from publisher, newspaper, foundation, etc. 

    researchmap

  • 研究奨励賞

    2010.10   財団法人 石田(實)記念財団  

    角田裕

     More details

    Award type:Award from publisher, newspaper, foundation, etc. 

    researchmap

  • テレコミュニケーションマネージメント研究賞

    2008.3   電子情報通信学会テレコミュニケーションマネージメント研究会   ネットワークアプリケーション弁別のためのペイロード長の遷移パタンの評価方式に関する一検討

    八木真之介, 和泉勇治, 角田裕, 根元義章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

    researchmap

  • International Satellite Communication System Conference (ICSSC2007) Excellent Paper Award

    2007.4   AIAA  

     More details

    Award type:Award from international society, conference, symposium, etc. 

    researchmap

▼display all

Research Projects

  • アプリケーション毎の利用情報記述に基づいた細粒度ネットワークアクセス制御技術

    2025.4 - 2027.3

    日本学術振興会  科学研究費助成事業  基盤(C)

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Direct Cost: \3600000 )

    researchmap

  • サイバーパトロール活動促進システムの拡張と機能強化

    2023.5 - 2024.3

    東北工業大学  令和5年度学内公募研究  地域連携型型

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Direct Cost: \650000 )

    researchmap

  • サイバーボランティアの効率化と活性化のためのシステム開発

    2022.5 - 2023.3

    東北工業大学  令和4年度学内公募研究  地域連携型型

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Direct Cost: \500000 )

    researchmap

  • イントラネットの安全を支える柔軟かつきめ細やかなアクセス制御の実現に関する研究

    2022.4 - 2024.3

    公益財団法人 高橋産業経済研究財団  研究助成 

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\3200000

    researchmap

  • ホストの通信行動履歴の把握を目的としたトラフィック観測・分析技術の基礎研究

    2021.6 - 2022.3

    東北工業大学  令和3年度学内公募研究  萌芽型

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Direct Cost: \500000 )

    researchmap

  • 効率的なフォレンジクスのための非ユーザ主導型通信の観測と分析

    2020.6 - 2021.3

    東北工業大学  令和2年度学内公募研究  萌芽型

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Direct Cost: \1000000 )

    researchmap

  • 中小企業におけるイントラネットの仮想化を見据えたセキュリティソリューションの開発

    2019.7 - 2020.2

    KCみやぎ推進ネットワーク  KCみやぎ産学共同研究会(実行・成長型) 

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\484000

    中小企業におけるイントラネットの仮想化を見据えたセキュリティソリューションの開発

    researchmap

  • Design and development of the network architecture for detecting anomalies in network logging system

    Grant number:26330110  2014 - 2016

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Tsunoda Hiroshi

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\4680000 ( Direct Cost: \3600000 、 Indirect Cost:\1080000 )

    Nowadays, log information plays a vital role in the network operation and security management area. Thus, this research tackled the development of the anomaly detection architecture and element technologies for a logging system. In this study, we presented that the prototype application for monitoring configuration information of logging applications in a network, analyzing monitored configuration and visualizing the results on network maps. The visualization will help network administrators to detect defects in their logging system easily. We also discussed the method to measure the number of log messages sent and received by a logging application by tracing some system calls called by the logging application. Besides, we designed the data model for monitoring the number of log messages for collecting that information efficiently.

    researchmap

  • Developing Network Emulator for Low Earth Orbit Satellite IP Networks and Experimentation of Communication Control Methods

    Grant number:22700081  2010 - 2012

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    TSUNODA Hiroshi

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\3900000 ( Direct Cost: \3000000 、 Indirect Cost:\900000 )

    Low earth orbit (LEO) satellite network has been expected to seamlessly connect and integrate to the existing IP networks. If such IP/LEO network is realized, users can move freely in the integrated networks and communicate with each other anywhere in the world. This research tackled to develop a network system for emulating IP/LEO satellite networks and proposed communication control methods in that environment.

    researchmap

  • Distributed Network anomaly Detection using Multiresolutional Observables

    Grant number:20300023  2008 - 2010

    Ministry of Education, Culture, Sports, Science and Technology  Grants-in-Aid for Scientific Research(基盤研究(B))  基盤研究(B)

    Yoshiaki NEMOTO, Yuji WAIZUMI, Hiroshi TSUNODA

      More details

    Authorship:Collaborating Investigator(s) (not designated on Grant-in-Aid)  Grant type:Competitive

    Grant amount:\8970000 ( Direct Cost: \6900000 、 Indirect Cost:\2070000 )

    A network anomaly detection system has been developed. This system can achieve high detection accuracy by using feature values extracted with plural algorithms from network flows of which packets are aggregated based on their IP addresses and port numbers. The system can higher detection rate with feature values collected from distributed observation points.

    researchmap

  • Research on the design of monitoring system of sensor nodes for secure sensor networks

    Grant number:20700055  2008 - 2009

    Ministry of Education, Culture, Sports, Science and Technology  Grants-in-Aid for Scientific Research(若手研究(B))  若手研究(B)

    Tsunoda Hiroshi

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\2990000 ( Direct Cost: \2300000 、 Indirect Cost:\690000 )

    A sensor network is a promising technology for collecting various physical data, and carry data are closely-attached to our real life. Therefore, security is a fundamental requirement in sensor networks. In this study, for constructing secure sensor networks, monitoring system for detecting suspicious sensor nodes, DoS traceback method, and log collection system are proposed.

    researchmap

  • Traceback System of Malicious Accesses of the Internet based on Similarity of Communication Data

    Grant number:18300017  2006 - 2007

    Ministry of Education, Culture, Sports, Science and Technology  Grants-in-Aid for Scientific Research(基盤研究(B))  基盤研究(B)

    Yoshiaki NEMOTO, Yuji WAIZUMI, Hiroshi TSUNODA

      More details

    Authorship:Collaborating Investigator(s) (not designated on Grant-in-Aid)  Grant type:Competitive

    Grant amount:\6920000 ( Direct Cost: \6200000 、 Indirect Cost:\720000 )

    We developed a traceback system of malicious accesses of the Internet base on the similarity of communication data of network flows. In order to protect privacy of communication, we proposed a new modeling method to evaluate the similarity of communication data. Our proposed modeling method express a network flow, which is a TCP connection, with a 256-dimensional vector which consists of the occurrence probabilities of 8-bit codes. Since this modeling method id irreversible data translation, the privacy of communication data can ne protected. By using this modeling, we can evaluate the similarities of communication flows. If we have a 256-dimensioncal vector extracted from a network worm flow, we can detect the same kind of worm flow by evaluating the similarity between the vector and vector of newly observed flow because the vector of a same kind of network worm is very similar each other. Consequently, we developed a high accurate modeling method to identify flows which have similar contents.We also developed a distributed worm detection system which can detect network worms of which the detection signatures have not generated. The proposed detection system has Global Detector and Local Detectors. If multiple similar flows are observed at a Local Detector in a short term, the Local Detector judges that this emergence of similar flows can be occurred by network worm activities, and send the mean 256-dimensional vector of the similar flows to the Global Detector. In order to detect malicious accesses occurrence, Global Detector evaluate the similarity among the vectors sent from the Local Detectors. If the manner, our proposed detection system can detect malicious network activities without signatures made in advance.Based on the similarities of vectors, a new traceback system which can discover the point of release of a new malicious access have been proposed. To find the point of release of a malicious access, the traceback system keeps three elements: detection time when a malicious flow was observed, src IP of the flow and the 256-dimensional vector of the flow. By communicating the three elements and evaluating the similarity, the traceback system can find the point of release of the malicious flow.

    researchmap

  • サービス劣化攻撃対策のための超高速ネットワーク対応型セキュリティシステム

    Grant number:18700050  2006 - 2007

    文部科学省  科学研究費補助金(若手研究(B))  若手研究(B)

    角田 裕

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\1900000 ( Direct Cost: \1900000 )

    本研究で対象とするサービス劣化(Degradation of Service: DeS)攻撃は、被害者が提供しているサービスを完全に妨害するのではなく、スループットなどのサービスの品質を必要最低限の攻撃トラヒックによって低下させることを狙う巧妙で対策が困難な攻撃である。インターネットが情報インフラとしての重要性を増していく中で、提供するサービスの劣化を招くDeS攻撃は新たな脅威であり対策手法の確立が急務である。また、その対策手法は、次世代の超高速ネットワークにも対応可能なものでなくてはならない。本研究では、サービス劣化攻撃の一種であるパルス型DeS攻撃を対象とし、超高速ネットワークにおいて攻撃を早期かつ高精度に検知可能な手法と、攻撃に対して頑健なトランスポートプロトコルの開発を目的とする。今年度は、前年度に得た「ランダムな間隔のパルスが攻撃として成立し得る」という新たな知見に基づき効果的な攻撃の検知手法の確立を進め、攻撃によって必ず発生する「パルス上のトラヒックの連続した到着」と「通常通信のトラヒック量の減少」という2つの事象に着目した検知手法を提案した。提案手法は従来手法のようにパルスの定期的な到着という前提を必要としないため、ランダムなパルスによる巧妙な攻撃も検出が可能であることをシミュレーションによる評価を通じ確認した。提案手法は、超高速ネットワークにおける運用を想定し、検知にプロトコル毎のパケット数という単純な情報のみを用いることで検知を行うルータの負荷の緩和を図っている。また、検知結果を末端のホストにフィードバックし、ホストがトランスポート層の制御パラメータを変更して攻撃に対する耐性を高める方式を開発した。本研究の成果は、電子情報通信学会の研究会などを通じて広く公表すると共に、IEEE ICC 2008における発表論文として採録が決定している。

    researchmap

▼display all

Textbooks and Teaching Materials

  • 情報通信工学実験III コンピュータネットワークテキスト

    2021

  • 情報通信工学実験I コンピュータリテラシーテキスト

    2021

Teaching Experience

  • Computer Network II

    2021.4 Institution:Tohoku Institute of Technology

     More details

  • Computer Network I

    2020.9 Institution:Tohoku Institute of Technology

     More details

  • Information and Communication Engineering Laboratory I

    2018.9 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

  • Internet and Its Security

    2015.10 - 2023.3 Institution:Tohoku University

     More details

    Level:Postgraduate 

    researchmap

  • Network Security Practicals

    2014.11 Institution:Tohoku University

     More details

    Level:Postgraduate 

    researchmap

  • Computer Mathematics

    2012.4 - 2021.9 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

  • Information Security

    2010.9 - 2012.3 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

  • Internet Engineering

    2010.4 Institution:Tohoku Institute of Technology

     More details

    Level:Postgraduate 

    researchmap

  • Information and Communication Engineering Laboratory III

    2009.9 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

  • Mathematics for Electrical Engineering III

    2008.9 - 2010.3 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

  • Networking Fundamentals

    2008.4 - 2021.9 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

  • Information Literacy

    2008.4 - 2011.8 Institution:Tohoku Institute of Technology

     More details

    Level:Undergraduate (specialized) 

    researchmap

▼display all

Social Activities

  • 情報処理推進機構 教育関係者等向けインターネット安全教室 福島会場 (オンライン開催 2020/12/24) ゲスト講師

    Role(s): Lecturer

    2020.12

     More details

    Audience: College students, Graduate students

    Type:Lecture

    researchmap

  • 情報処理推進機構 教育関係者等向けインターネット安全教室 仙台会場(オンライン開催 2020/07/12) ゲスト講師

    Role(s): Lecturer

    2020.7

     More details

    Audience: College students, Graduate students, Teachers, Guardians, General

    Type:Lecture

    researchmap

  • キョーユー株式会社・東北工業大学 連携企画セキュリティ強化に向けた社内研修会 講師

    Role(s): Lecturer

    2019.2

     More details

    Audience: Company

    Type:Seminar, workshop

    researchmap

  • 宮城県警察本部 サイバー犯罪対策課 サイバー犯罪対策テクニカルアドバイザー

    Role(s): Lecturer, Advisor

    2016.9

     More details

    Audience: Governmental agency

    researchmap

  • 情報処理推進機構 インターネット安全教室 仙台会場 運営委員

    Role(s): Organizing member

    2016.7 - 2023.3

     More details

    Audience: College students, Graduate students, Teachers, Guardians, General

    Type:Lecture

    researchmap

  • 株式会社サイバー・ソリューションズ主催セミナー「ネットワークを脅かす攻撃とセキュリティ -実例と対策-」 基調講演講師

    Role(s): Lecturer

    2014.7

     More details

    Audience: Company

    Type:Lecture

    researchmap

  • 宮城県警察大学生サイバーボランティア 世話人

    Role(s): Advisor

    2014.6

     More details

    Type:Other

    researchmap

  • 文部科学省 情報技術人材育成のための実践教育ネットワーク形成事業(情報セキュリティ分野)ネットワークセキュリティ製品企画・開発実践コース(インターンシップ) 指導助手

    Role(s): Lecturer

    2013.1 - 2016.12

     More details

    Audience: College students, Graduate students

    Type:Seminar, workshop

    researchmap

▼display all

Academic Activities

  • 2025 10th International Conference on Business and Industrial Research (ICBIR2025) TPC member International contribution

    Role(s): Peer review

    2025.1 - 2025.5

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 2025 17th International Conference on Knowledge and Smart Technology (KST) TPC member International contribution

    Role(s): Peer review

    2024.11 - 2025.3

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 20th International Workshop on Security and Trust Management (STM 2024) PC member International contribution

    Role(s): Peer review

    2024.5 - 2024.9

     More details

    Type:Academic society, research group, etc. 

    researchmap

  • The 21st International Joint Conference on Computer Science and Software Engineering (JCSSE 2024) TCP member International contribution

    Role(s): Peer review

    2024.4 - 2024.6

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 2024 9th International Conference on Business and Industrial Research (ICBIR2024) TPC member International contribution

    Role(s): Peer review

    2023.10 - 2024.5

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 2024 16th International Conference on Knowledge and Smart Technology (KST) TPC member International contribution

    Role(s): Peer review

    2023.9 - 2024.3

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 19th International Workshop on Security and Trust Management (STM 2023) PC member International contribution

    Role(s): Peer review

    2023.6 - 2023.9

     More details

    Type:Academic society, research group, etc. 

    researchmap

  • 2023 8th International Conference on Business and Industrial Research (ICBIR2023) TPC member International contribution

    Role(s): Panel moderator, session chair, etc., Peer review

    2022.11 - 2023.5

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • The 17th International Workshop on Security (IWSEC2022) Local Organizing Committee member International contribution

    Role(s): Planning, management, etc.

    2021.12 - 2022.9

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 2022 7th International Conference on Business and Industrial Research (ICBIR2022) International contribution

    Role(s): Peer review

    2021.9

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 17th International Workshop on Security and Trust Management (STM 2021) PC member International contribution

    Role(s): Peer review

    2021.3 - 2021.10

     More details

    Type:Academic society, research group, etc. 

    researchmap

  • The 16th International Workshop on Security (IWSEC2021) Local Organizing Committee member International contribution

    Role(s): Planning, management, etc.

    2020.10 - 2021.9

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • The 4th International Conference on Information Technology International Technical Program Supporting Committee member International contribution

    Role(s): Peer review

    2018.9 - 2019.10

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • IEEE Globecom2013 Wireless Networking Symposium TPC member International contribution

    Role(s): Peer review

    2012.9 - 2013.3

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • IEEE ICC2012 Wireless Networking Symposium TPC member International contribution

    Role(s): Peer review

    2012.7 - 2012.12

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • IEEE WCNC2013 Network Track TPC member International contribution

    Role(s): Peer review

    2012.6 - 2012.11

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • IEEE ComSoc Sendai Chapter Vice Chair

    2012.3

     More details

  • PIMRC2012 Mobile and Wireless Networks Track TPC member International contribution

    Role(s): Peer review

    2012.1 - 2012.5

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • IEEE ICC2012 Wireless Networking Symposium TPC member International contribution

    Role(s): Peer review

    2011.4 - 2011.11

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • IEEE ICC2011 Wireless Networking Symposium TPC member International contribution

    Role(s): Peer review

    2011.4 - 2011.11

     More details

    Type:Competition, symposium, etc. 

    researchmap

  • 電子情報通信学会 査読委員

    Role(s): Peer review

    2010.4

     More details

    Type:Peer review 

    researchmap

▼display all