- Caching and Content Delivery
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Network Packet Processing and Optimization
- Peer-to-Peer Network Technologies
- Opportunistic and Delay-Tolerant Networks
- Advanced Data Storage Technologies
- IPv6, Mobility, Handover, Networks, Security
- Cooperative Communication and Network Coding
- IoT and Edge/Fog Computing
- Multimedia Communication and Technology
- Innovation in Digital Healthcare Systems
- Spam and Phishing Detection
- Covalent Organic Framework Applications
- Privacy, Security, and Data Protection
- Technology and Data Analysis
- Privacy-Preserving Technologies in Data
- Recommender Systems and Techniques
- Image and Video Quality Assessment
- Advanced Steganography and Watermarking Techniques
- Mobile Ad Hoc Networks
- Web Data Mining and Analysis
- IoT-based Smart Home Systems
- Advanced Malware Detection Techniques
- Mobile Crowdsensing and Crowdsourcing
Tokyo Metropolitan University
2023-2024
Osaka Metropolitan University
2022-2024
Osaka Prefecture University
2020-2021
Université de Lorraine
2017-2018
Laboratoire Lorrain de Recherche en Informatique et ses Applications
2017-2018
Centre National de la Recherche Scientifique
2017-2018
Centre de Recherche en Informatique
2017
Centre Inria de l'Université de Lorraine
2017
Dynamic Systems (United States)
2016
The University of Tokyo
2014-2015
Many enterprises are under threat of targeted attacks aiming at data exfiltration. To launch such attacks, in recent years, attackers with their malware have exploited a covert channel that abuses the domain name system (DNS) named DNS tunneling. Although several research efforts been made to detect tunneling, existing methods rely on features advanced tunneling techniques can easily obfuscate by mimicking legitimate clients. Such obfuscation would result leakage. tackle this problem, we...
Edge computing over Named Data Networking (NDN) is expected to be a promising approach for the deployment of applications such as connected cars and virtual or augmented reality. In conventional edge frameworks NDN, request packets are not forwarded based on resource availability status execution nodes (e.g., CPU memory utilization). This may result in requests reaching fully loaded that cannot handle these requests. To address this issue, paper proposes discovery scheme NDN. scheme, each...
The orchestration of counter-measures in the context security incidents remains a challenging task for network operators. main objective this demonstration is to present how possible virtualized NDN network. Based on an adaptation TOSCA topology and model, it trigger these counter- measures after detection specific attacks. We show Montimage Monitoring Tool (MMT) has been adapted detect typical Content Poisoning Attack (CPA), orchestrator can reactions mitigate their impact
Information leakages are one of the main security threats in today's Internet. As ICN is expected to become core architecture for Future Internet, it therefore mandatory prevent this threat. This paper proves that some configuration prevents information via Data packets and shows an open problem interest from carrying encoded crucial their names. Assuming names will follow current URL format commonly used we get statistics web based on extensive crawling experiments internet organizations....
In 2016, Dyn Inc., a managed Domain Name System (DNS) service provider, experienced DNS water torture attack. The attackers created several unique and unresolvable fully qualified domain names (FQDNs) with random labels sent malicious queries to the authoritative server via cache servers. This attack eventually caused become unserviceable. We propose collaborative defense framework that minimizes damage by quickly detecting on victim side effectively defending against it source side. this...
A lot of enterprises are under threat targeted attacks causing data exfiltration. As a means performing the attacks, attackers and their malware have exploited DNS tunneling in recent years. Although there many research efforts to detect tunneling, previously proposed methods rely on features that malicious entities can easily obfuscate by mimicking legitimate ones. Therefore, this obfuscation would result leakage. In order mitigate issue, we focus trace which cannot be hidden. context...
Named data networking (NDN) has emerged as a future architecture having the potential to replace Internet. In order do so, NDN needs cope with inherent problems of Internet, such attacks that cause information leakage from an enterprise. Since not yet been deployed on large scale, it is currently unknown how can occur, let alone what countermeasures be taken against them. this paper, we first show in caused by malware inside enterprise, which uses steganography produce malicious interest...
With diversification of content distribution systems, multi-view video services, particularly in real-time will become popular the future. To distribute many contents to users, P2P live streaming systems are expected due its high scalability. Because this characteristic, also suitable for services. However, current typically configure one overlay network and they do not take service into account. Hence, it takes long delay during changing views because users search available nodes obtain...
Edge computing over Named Data Networking (NDN) is expected to be a promising approach for the deployment of applications such as connected cars and virtual/augmented reality. In conventional edge frameworks, request packets are not forwarded based on resource availability statuses execution nodes (e.g., CPU memory utilization). This makes it possible requests reach fully loaded that cannot deal with these requests. To address this issue, paper proposes discovery scheme NDN. scheme, each...
BitTorrent causes redundant inter-AS traffic that increases the operational cost by constructing topology-agnostic overlay network. One promising way for eliminating is to utilize in-network cache. Even though LRU algorithm widely used cache eviction in practice and believed result good performance most cases, we posit may lead suboptimal context of BitTorrent. This due fact adopts so called rarest-first exchanging content pieces. Thus, rendered since exploits temporal locality. In this...
Wireless sensor networks and their applications are becoming more diverse, as an important future challenge, urgent high-priority data must be transferred with minimum delay loss in a prioritized manner. This paper proposes strictly multihop transmission of data, composed not only single frame but also multiple frames, by reserving the channel exploiting medium access control coordination among nodes on route. Its effectiveness is shown through computer simulation.
Information-leakage is one of the most important security issues in current Internet. In Named-Data Networking (NDN), Interest names introduce novel vulnerabilities that can be exploited. By setting up a malware, used to encode critical information (steganography embedded) and leak out network by generating anomalous traffic. This threat based on does not exist IP network, it essential solve this issue secure NDN architecture. paper performs risk analysis information-leakage NDN. We first...
The domain name system (DNS) has been an important base of the Internet; however, it faces various issues, including DNS server attacks. Blockchain-based services have recently emerged to solve these issues. Among them, Handshake provides a decentralized root zone and supports state-of-the-art features. However, few studies investigated performance evaluations Handshake. We measure resolution latency on assess its suitability as alternative current servers reveal that practical drawback...
After more than one decade of research efforts, ICN technologies seem mature enough to move from a design and implementation phase early deployment trials. However, if wants an stack be operated in production context, some major locks, related the lack adequate infrastructure, migration relevant services, capability accurately monitor overall domain, must addressed. In this article we present feedback experience Named Data Networking island. The latter considers HTTP over NDN as primary...
Live streaming distribution services have spread as one of the most popular services. The technique creating contents has been developed, and users can use it easily. Accordingly, number rapidly increased. In existing content system, must select an interesting from a large amount in Internet. It takes long time to find out content. Moreover, when they switch other content, delay because need procedure joining another network anew. Thus, system which helps view satisfied provides fast...
BitTorrent causes redundant inter-AS traffic that increases the operational cost by constructing topology-agnostic overlay network. One promising way for eliminating is to utilize in-network cache. Even though LRU algorithm widely used cache eviction in practice and believed result good performance most cases, we posit may lead suboptimal context of BitTorrent. This due fact adopts so called rarest-first exchanging content pieces. Thus, rendered since exploits temporal locality. In this...
Technologies such as volunteer computing, which use computing resources of nodes in the neighborhood people, have been attracting attention. When using a large number end with power people an "End Cloud," main problems selecting appropriate group that communicate each other from among End Cloud include long physical distances between and amount messages required to precisely grasp resources. In this paper, we propose algorithm for set taking these into account.