Loading [MathJax]/extensions/MathZoom.js
Hirofumi Yamaki - IEEE Xplore Author Profile

Showing 1-21 of 21 results

Filter Results

Show

Results

Cyber attacks, (e.g., DDoS), on computers connected to the Internet occur everyday. A DDoS attack in 2016 that used “Mirai botnet” generated over 600 Gbit/s traffic, which was twice as that of last year. In view of this situation, we can no longer adequately protect our computers using current end-point security solutions and must therefore introduce a new method of protection that uses distribute...Show More
It has become common to access offshore cloud computers via the Internet. However, in some countries Governmental bodies suddenly block international communication channels. If involved in such blocking as called GS (Golden shield) in China, significant degradation of QoS occurs in accessing cloud/remote computers, Web conference pages, etc. To avoid such involvement and continue smooth access to ...Show More
It has become common to access cloud computers in other countries via the Internet. However, in some countries, many international communication channels are suddenly shut down by governmental bodies. This causes significant degradation of the Quality of Service (QoS) for accessing cloud computers, Web conferences, and so on. To cope with this, we propose a network virtualization method for intell...Show More
It is common to operate an IT system where client computers in offices in a country access cloud computers in another country via the Internet. However, in some countries including China, network communication is often shut down by governmental bodies, in addition to network outage caused by network attacks. In case of such intentional interruptions, users need countermeasures to avoid them. Here,...Show More
For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of a...Show More
This paper presents a novel technique to integrate multiple Wifi services into a single hardware access point. This is achieved by combining service advertisement mechanism defined in the IEEE 802.11u standard and dynamic VLAN assignment used in enterprise-level networks, both of which are for authentication techniques to achieve secure and flexible access to IP-based networks. Compared to virtual...Show More
It has become common to operate an IT system where client computers in offices in a country access cloud computers in another country via the Internet. On the other hand, in some countries including China, network communication is often shut down by governmental bodies, in addition to network outage caused by network attacks. In the presence of these intentional or deliberate interruptions, users ...Show More
Automated Trust Negotiation (ATN) is a mechanism to establish mutual trust between service providers and users in an open network environment like the Internet. In this paper, we propose Bidirectional Private Policy Matching based on Additively Homomorphic Encryption Systems(BPPM/AHES) as an ATN negotiation protocol where uni-directional private policy matching based on additively homomorphic encr...Show More
An EAP method, EAP-ATN, is proposed for controlling accesses to services provided to general public in open environments, such as public wireless LAN access services. Automated Trust Negotiation (ATN) is a framework where a service provider and a client collaboratively determine whether to trust each other by exchanging credentials. By performing ATN as an EAP method, flexible and secure usage of ...Show More
It is required in the first step of malware analysis to determine whether a given malware program is a variant of known ones. If it is surely not a variant, manual analysis against it is required. However, it is impossible to perform manual analysis, the cost of which is very high, over all the enormous number of newly found malware programs. An automatic and accurate malware program classificatio...Show More
In a open pervasive environment, we want to define trust model for many kinds of services. Thus, a mechanism which can create trust model for each service dynamically and use it securely is required. Automated Trust Negotiation (ATN) is a mechanism to establish mutual trust between service providers and users in an open network environment like the Internet. In this paper, we propose Bidirectional...Show More
The vastness of IPv6 address space and rapid spread of its deployment attract us to usage of IPv6 network. Various types of devices, including embedded systems, are ready to use IPv6 addresses and some of them have already been connected directly to the Internet. Such situation entices attackers to change their strategies and choose the embedded systems as their targets. We have to deploy various ...Show More
Intrusion Detection Systems (IDSs) play an important role detecting various kinds of attacks and defend our computer systems from them. There are basically two main types of detection techniques: signature-based and anomaly-based. A signature-based IDS cannot detect unknown attacks because a signature has not been written. To overcome this shortcoming, many researchers have been developing anomaly...Show More
Malicious software (Malware) in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security of network systems. Identification of malware variants provides great benefit in early detection. Taking into account that variants of malware families share similar functions reflecting its origin and purpose, we propose a method focusing on the features of functions th...Show More
To defend a network system from security risks, intrusion detection systems (IDSs) have been playing an important role in recent years. There are two types of detection algorithms of IDSs: misuse detection and anomaly detection. Because misuse detection is based on a signature which is created from the features of attack traffic by security experts, it can achieve accurate and stable detection. Ho...Show More
Intrusion detection systems (IDSs) play an important role to defend networks from cyber attacks. Among them, anomaly-based IDSs can detect unknown attacks like 0-day attacks that are hard to detect by using signature-based system. However, they have problems that their performance depends on a learning dataset. It is very hard to prepare an appropriate learning dataset in a static fashion, because...Show More
Multilingual expression services (MESs) are available in many multicultural fields, such as education, medical care, and disaster prevention. In Japan, for example, local governments and NPOs create parallel-texts and provide expression services in such fields. However, these services present a common difficulty: the lack of parallel-texts. Service-computing technology has the potential to allow t...Show More
The ubiquitous environment enables us to build systems that provide individual users with personalized navigation services in cities. In developing such a system, it is necessary to estimate the influence and the movement of its users and to get feedback. However, it is difficult to perform tests on such a system given the large number of human subjects involved and its scale, which matches that o...Show More
Making a truly useful massively multi-agent system is difficult since the actions of the full ensemble of agents cannot be controlled by designing just one agent. It is critical to control all the agents by using protocols that describe the interaction of agents and the environment in a top-down approach. We introduce a system that uses interaction protocol descriptions and has the capability of c...Show More
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users' preference. Though the protection of users' private preference and the efficient calculation are both important, these two requirements often contradict each other. By implementing QoS Market, a market-based network resource...Show More
We discuss two major tradeoffs, spatial and temporal tradeoffs, that appear when applying market-based computing to multimedia network applications. The former appears between computation and communication cost, depending on how agents are distributed over a network. The latter appears between reactiveness and correctness of a result, depending on how the network environment dynamically changes. B...Show More