Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hirofumi Nakakoji is active.

Publication


Featured researches published by Hirofumi Nakakoji.


symposium on applications and the internet | 2010

Enhancing Network Based Bot Detection with Contextual Information

Nobutaka Kawagcuhi; Kazuya Okouchi; Hirofumi Nakakoji; Tetsuro Kito; Tomonori Shigemoto; Masato Terada

In this paper, we propose a bot detection method that enhances traffic analysis of Network based IDS (NIDS) by using process contextual information obtained from monitored machines. Existing NIDS classifies hosts suspected of doing both of the Command and Control (C&C) communication and infection activities as bots. However, this approach cannot conduct finer-grained analysis than IP address level, and which leads to false positives and negatives. To address this problem, this proposed method enables NIDS to achieve process-grained detection by feeding the contextual information of the processes that perform network activities. Through experiments using a prototype implementation on Xen and a bot sample, we demonstrate that the proposed method enables to detect bots appropriately.


2010 6th IEEE Workshop on Secure Network Protocols | 2010

Detection and control system for Peer-to-Peer file exchange application

Kazuya Okochi; Nobutaka Kawaguchi; Tomohiro Shigemoto; Tetsuro Kito; Hirofumi Nakakoji; Masato Terada

As P2P (Peer-to-Peer) file sharing software is widely deployed, it causes some serious problems, such as network traffic congestion, unwanted file sharing by computer viruses that abuse P2P software, and so on. Detecting and controlling traffic of P2P software is an important issue to solve these problems. In this paper, we propose a basic architecture to observe large-scale network traffic, identify the P2P traffic and control them. This architecture consists of four units, the observation unit, the analysis unit, the control unit and the managing unit. We evaluate the architecture using lOGbps full duplex traffic, and demonstrate that this system can control the P2P traffic properly.


Archive | 2009

Attack node set determination apparatus and method, information processing device, attack dealing method, and program

Hirofumi Nakakoji; Tetsuro Kito; Masato Terada; Shinichi Tankyo; Isao Kaine


Archive | 2005

Log analysis system, method and apparatus

Hirofumi Nakakoji; Masato Terada; Kenichi Sakamoto


Archive | 2010

UNAUTHORIZED PROCESS DETECTION METHOD AND UNAUTHORIZED PROCESS DETECTION SYSTEM

Tetsuro Kito; Nobutaka Kawaguchi; Kazuya Okochi; Hirofumi Nakakoji; Tomohiro Shigemoto; Tatsunoshin Kawaguchi


Archive | 2011

VULNERABILITY COUNTERMEASURE DEVICE AND VULNERABILITY COUNTERMEASURE METHOD

Tomohiro Shigemoto; Hirofumi Nakakoji; Tetsuro Kito; Hisashi Umeki; Satoshi Takemoto; Tadashi Kaji; Satoshi Kai


Archive | 2011

SECURITY LEVEL VISUALIZATION DEVICE

Tomohiro Shigemoto; Hirofumi Nakakoji; Tetsuro Kito; Hisashi Umeki; Satoshi Takemoto; Tadashi Kaji; Satoshi Kai


Archive | 2015

Program analysis device, program analysis method, and program analysis system

林 直樹; Naoki Hayashi; 仲小路 博史; Hirofumi Nakakoji; 哲郎 鬼頭; Tetsuro Kito; 倫宏 重本; Tomohiro Shigemoto; 淳弥 楠美; Junya Kusumi


Archive | 2012

ENCRYPTED TRAFFIC TEST SYSTEM

Tomohiro Shigemoto; Hirofumi Nakakoji; Tetsuro Kito; Hisashi Umeki; Satoshi Takemoto; Tadashi Kaji; Satoshi Kai


Archive | 2011

INFORMATION LEAK FILE DETECTION APPARATUS AND METHOD AND PROGRAM THEREOF

Hirofumi Nakakoji; Tetsuro Kito; Masato Terada; Shinichi Tankyo; Isao Kaine; Tomohiro Shigemoto

Collaboration


Dive into the Hirofumi Nakakoji's collaboration.

Researchain Logo
Decentralizing Knowledge