Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks

    Distributed attacks have reportedly caused the most serious losses in recent years. Here, distributed attacks means those attacks conducted collaboratively by multiple hosts. How to detect distributed attacks ...

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai in Information Security Applications (2017)

  2. No Access

    Chapter and Conference Paper

    A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation

    Distributed DoS (Denial-of-Service) attacks, or say DDoS attacks, have reportedly caused the most serious losses in recent years and such attacks are getting worse. How to efficiently detect DDoS attacks has n...

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai in Security, Privacy, and Anonymity in Comput… (2017)

  3. No Access

    Chapter and Conference Paper

    A Comprehensive Security Analysis Checksheet for OpenFlow Networks

    Software-defined networking (SDN) enables the exible and dynamic configuration of a network, and OpenFlow is one practical SDN implementation. Although it has been widely deployed in actual environments, it ca...

    Yoshiaki Hori, Seiichiro Mizoguchi in Advances on Broad-Band Wireless Computing,… (2017)

  4. No Access

    Chapter and Conference Paper

    Detection of Android API Call Using Logging Mechanism within Android Framework

    Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked from Android. However, it is difficult for users to judge the availability of app...

    Yuuki Nishimoto, Naoya Kajiwara in Security and Privacy in Communication Netw… (2013)

  5. No Access

    Chapter and Conference Paper

    Analysis of Methods for Detecting Compromised Nodes and its Countermeasures

    The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first revie...

    Fangming Zhao, Takashi Nishide, Yoshiaki Hori in IT Convergence and Security 2012 (2013)

  6. No Access

    Chapter and Conference Paper

    Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic

    Recently, we have a problem about an attack generated by a botnet which consists of a group of compromised computers called bots. An attacker called botmaster controls it and a botnet invokes an attack such as...

    Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai in Cyberspace Safety and Security (2012)

  7. No Access

    Chapter and Conference Paper

    Grou** Provenance Information to Improve Efficiency of Access Control

    Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Prove...

    Amril Syalim, Yoshiaki Hori, Kouichi Sakurai in Advances in Information Security and Assur… (2009)

  8. No Access

    Chapter and Conference Paper

    Reconsidering Data Logging in Light of Digital Forensics

    Logs record the events that have happened within in a system so they are considered the history of system activities. They are one of the objects that digital forensic investigators would like to examine when ...

    Bin-Hui Chou, Kenichi Takahashi in Advances in Information Security and Its A… (2009)

  9. No Access

    Chapter and Conference Paper

    Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks

    Nowadays, with over 70% of attacks carried out over the web application level, organizations need all the help they can get in making their system secure. Web Application Firewalls (WAFs) are among the tools t...

    Yi Han, Akihiro Sakai, Yoshiaki Hori in Advances in Information Security and Its A… (2009)

  10. No Access

    Chapter and Conference Paper

    Formal Verification for Access Control in Web Information Sharing System

    When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there...

    Akihiro Sakai, Yoshiaki Hori in Advances in Information Security and Assur… (2009)

  11. No Access

    Chapter and Conference Paper

    On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments

    In this paper, we proposed two enhanced trust propagation and reputation ranking approaches based on spreading activation model to mitigate the effect of front peer. By front peer it means that these malicious...

    Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai in Advances in Web and Network Technologies, … (2007)

  12. No Access

    Chapter and Conference Paper

    An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System

    It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions “in tandem”, and generally computes trust ranks for sets of individuals according to peers’ so...

    Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai in Autonomic and Trusted Computing (2007)

  13. No Access

    Chapter and Conference Paper

    On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network

    This paper attempts to comprehensively characterize economic-based incentive compatible routing and forwarding mechanisms in ad hoc network, including hidden information in routing phase, and hidden action in ...

    Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai in Ubiquitous Intelligence and Computing (2007)

  14. No Access

    Chapter and Conference Paper

    Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network

    Considering the fact that there exist information asymmetry (hidden information) in routing phase, and moral hazard (hidden action) in forwarding phase in autonomous Ad hoc network, this paper argues that econ...

    Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai in Theory and Applications of Models of Compu… (2007)

  15. No Access

    Chapter and Conference Paper

    Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment

    With the increasing popularity of self-organized communication systems, distributed trust and reputation systems in particular have received increasing attention. By formalizing trust relationships, trust betw...

    Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai in Emerging Technologies in Knowledge Discove… (2007)

  16. No Access

    Chapter and Conference Paper

    On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance

    The virtual region-based P2P architecture was provided in this paper, which extended the proximity concept in overlay network. By virtual region it meant various related factors should be integrated into the d...

    Yufeng Wang, Wendong Wang, Kouichi Sakurai in Ubiquitous Intelligence and Computing (2006)

  17. No Access

    Chapter and Conference Paper

    Application and Evaluation of Bayesian Filter for Chinese Spam

    Recently, a statistical filtering based on Bayes theory, so-called Bayesian filtering gain attention when it was described in the paper “A Plan for Spam” by Paul Graham, and has become a popular mechanism to d...

    Zhan Wang, Yoshiaki Hori, Kouichi Sakurai in Information Security and Cryptology (2006)