Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nobutaka Kawaguchi is active.

Publication


Featured researches published by Nobutaka Kawaguchi.


international conference on communications | 2016

Building suspiciousness cascading graph over multiple hosts for detecting targeted attacks

Nobutaka Kawaguchi; Hideyuki Tomimura; Mamoru Tsuichihara

In this paper, we propose a novel approach to detect a targeted attack by visualizing the paths of lateral movement in which the attacker compromises several hosts in the targeted network step by step to achieve his final goal. To this end, we first identify a pair of hosts that has a relationship in which a host can have compromised the other host based on the suspiciousness of their activities and communication patterns between them. Then we cluster such pairs as a graph visualizing an attack path. The attack is finally detected based on the graph size. Since this approach is agnostic to specific signatures, it can cope with a wide variety of attacks. The evaluation experiments show our approach achieves both the high detection rate of 97%, and the low false positives, which is 10% of an existing approach.


2010 6th IEEE Workshop on Secure Network Protocols | 2010

Detection and control system for Peer-to-Peer file exchange application

Kazuya Okochi; Nobutaka Kawaguchi; Tomohiro Shigemoto; Tetsuro Kito; Hirofumi Nakakoji; Masato Terada

As P2P (Peer-to-Peer) file sharing software is widely deployed, it causes some serious problems, such as network traffic congestion, unwanted file sharing by computer viruses that abuse P2P software, and so on. Detecting and controlling traffic of P2P software is an important issue to solve these problems. In this paper, we propose a basic architecture to observe large-scale network traffic, identify the P2P traffic and control them. This architecture consists of four units, the observation unit, the analysis unit, the control unit and the managing unit. We evaluate the architecture using lOGbps full duplex traffic, and demonstrate that this system can control the P2P traffic properly.


Archive | 2010

UNAUTHORIZED PROCESS DETECTION METHOD AND UNAUTHORIZED PROCESS DETECTION SYSTEM

Tetsuro Kito; Nobutaka Kawaguchi; Kazuya Okochi; Hirofumi Nakakoji; Tomohiro Shigemoto; Tatsunoshin Kawaguchi


Archive | 2012

Security system, and security monitoring method

Tetsuro Kito; 哲郎 鬼頭; Yoshinobu Tanigawa; 谷川 嘉伸; Nobutaka Kawaguchi; 信隆 川口


Archive | 2014

Virus detection system and method

信隆 川口; Nobutaka Kawaguchi; 谷川 嘉伸; Yoshinobu Tanigawa; 嘉伸 谷川; 恒太 井手口; Kota Ideguchi


Archive | 2013

Program analysis system and method thereof

Nobutaka Kawaguchi; Tadashi Kaji; Hiroki Yamaguchi


Archive | 2012

PROGRAM ANALYZING SYSTEM AND METHOD

Nobutaka Kawaguchi; Tadashi Kaji; Hiroki Yamaguchi


Archive | 2009

Traffic observation/control system

Nobutaka Kawaguchi; Tetsuo Kito; Hiroshi Nakakoji; Kazuya Okochi; Michihiro Shigemoto; Masatoshi Terada; Hisashi Umeki; Tomoaki Yamada; 博史 仲小路; 一弥 大河内; 真敏 寺田; 知明 山田; 信隆 川口; 久志 梅木; 倫宏 重本; 哲郎 鬼頭


Archive | 2009

Method of detecting illegal program, program for detecting illegal program, and information processing apparatus

Nobutaka Kawaguchi; Tetsuo Kito; Hiroshi Nakakoji; Kazuya Okochi; Michihiro Shigemoto; Masatoshi Terada; Tomoaki Yamada; 博史 仲小路; 一弥 大河内; 真敏 寺田; 知明 山田; 信隆 川口; 倫宏 重本; 哲郎 鬼頭


international symposium on computers and communications | 2017

Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train

Nobutaka Kawaguchi; Hideyuki Tomimura; Tetsutoshi Komiyama; Kosuke Kubota; Mamoru Tsuichihara

Collaboration


Dive into the Nobutaka Kawaguchi's collaboration.

Researchain Logo
Decentralizing Knowledge