Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Masaya Yamagata is active.

Publication


Featured researches published by Masaya Yamagata.


international conference on neural information processing | 2008

An incident analysis system NICTER and its analysis engines based on data mining techniques

Daisuke Inoue; Katsunari Yoshioka; Masashi Eto; Masaya Yamagata; Eisuke Nishino; Jun'ichi Takeuchi; Kazuya Ohkouchi; Koji Nakao

Malwares are spread all over cyberspace and often lead to serious security incidents. To grasp the present trends of malware activities, there are a number of ongoing network monitoring projects that collect large amount of data such as network traffic and IDS logs. These data need to be analyzed in depth since they potentially contain critical symptoms, such as an outbreak of new malware, a stealthy activity of botnet and a new type of attack on unknown vulnerability, etc. We have been developing the Network Incident analysis Center for Tactical Emergency Response (NICTER), which monitors a wide range of networks in real-time. The NICTER deploys several analysis engines taking advantage of data mining techniques in order to analyze the monitored traffics. This paper describes a brief overview of the NICTER, and its data mining based analysis engines, such as Change Point Detector (CPD), Self-Organizing Map analyzer (SOM analyzer) and Incident Forecast engine (IF).


Journal of Information Processing | 2012

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior

Takahiro Kasama; Katsunari Yoshioka; Tsutomu Matsumoto; Masaya Yamagata; Masashi Eto; Daisuke Inoue; Koji Nakao

Recent malware communicate with remote hosts in the Internet for receiving C&C commands and updating themselves, etc., and their behaviors can be diverse depending on the behaviors of the remote hosts. Thus, when analyzing these malware by sandbox analysis, it is important not only to focus behaviors of a malware sample itself but also those of the remote servers that are controlled by attackers. A simple solution to achieve this is to observe the live sample by an Internet-connected sandbox for a long period of time. However, since we do not know when these servers will send meaningful responses, we need to keep the sample being executed in the sandbox, which is indeed a costly operation. Also, leaving the live malware in the Internet-connected sandbox increases the risk that its attacks spill out of the sandbox and induce secondary infections. In this paper, we propose a novel sandbox analysis method using a dummy client, an automatically generated lightweight script to interact with the remote servers instead of the malware sample itself. In the proposed method, at first we execute a malware sample in the sandbox that is connected to the real Internet and Internet Emulator. Secondly, we inspect the traffic observed in the sandbox and filter out highrisk communications. The rest of the traffic data is then used by the dummy client to interact with the remote servers instead of the sample itself and effectively collects the responses from the servers. The collected server responses are then fed back to the Internet Emulator in the sandbox and will be used for improving observability of malware sandbox analysis. In the experiment with malware samples captured in the wild, we indeed observed a considerable number of changes in the responses from the remote servers that were obtained by our dummy client. Also, in comparison with the simple Internet-connected sandbox, the proposed sandbox could improve observability of malware sandbox analysis.


Archive | 2003

Attack defending system and attack defending method

Masayuki Nakae; Masaya Yamagata


Archive | 2012

Terminal, control device, communication method,communication system, communication module, program, and information processing device

Kentaro Sonoda; Hideyuki Shimonishi; Masayuki Nakae; Masaya Yamagata; Yoichiro Morita


Archive | 2011

Communication system, control device, policy management device, communication method, and program

Hideyuki Shimonishi; Kentaro Sonoda; Masayuki Nakae; Masaya Yamagata; Yoichiro Morita


Archive | 2012

COMMUNICATION SYSTEM, CONTROL DEVICE, COMMUNICATION METHOD, AND PROGRAM

Kentaro Sonoda; Hideyuki Shimonishi; Masayuki Nakae; Masaya Yamagata; Yoichiro Morita


Archive | 2012

Communication system, control device, and processing rule setting method and program

Kentaro Sonoda; Hideyuki Shimonishi; Masayuki Nakae; Masaya Yamagata; Yoichiro Morita


Archive | 2012

COMMUNICATION SYSTEM, CONTROL APPARATUS, COMMUNICATION METHOD, AND PROGRAM

Yoichiro Morita; Masayuki Nakae; Masaya Yamagata; Hideyuki Shimonishi; Kentaro Sonoda


Archive | 2003

System and method of defending attack

Masayuki Nakae; Masaya Yamagata; 政行 中江; 昌也 山形


Archive | 2013

Communication system, control apparatus, communication apparatus, communication control method, and program

Kentaro Sonoda; Hideyuki Shimonishi; Toshio Koide; Yoichi Hatano; Masayuki Nakae; Masaya Yamagata; Yoichiro Morita; Takayuki Sasaki; Yuki Ashino; Takeo Ohno

Collaboration


Dive into the Masaya Yamagata's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daisuke Inoue

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar

Katsunari Yoshioka

Yokohama National University

View shared research outputs
Top Co-Authors

Avatar

Koji Nakao

National Institute of Information and Communications Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge