Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Takashi Matsunaka is active.

Publication


Featured researches published by Takashi Matsunaka.


advanced information networking and applications | 2013

Passive OS Fingerprinting by DNS Traffic Analysis

Takashi Matsunaka; Akira Yamada; Ayumu Kubota

In this paper, we propose a new passive OS fingerprinting method which only requires DNS traffic analysis. The method utilizes characteristics on DNS queries specific to each OS, e.g. unique domain names, query patterns, time interval etc. The method can estimate the number of devices with each OS from the number of queries by utilizing the characteristics of the time interval patterns. The method considers the likelihood of irregular events that some queries are sent at less than regular time intervals, and some other queries are sent at more than regular time intervals. We analyze DNS traffic sent by each OS and extract the characteristics for OS fingerprinting. Then, we examine our estimation method by using DNS traffic in our intra-network. According to our examination, some results of our estimation method are close to the results of DHCP fingerprinting.


international conference on cloud computing | 2014

On the Feasibility of Deploying Software Attestation in Cloud Environments

Abhrajit Ghosh; Angelo Sapello; Alexander Poylisher; C. Jason Chiang; Ayumu Kubota; Takashi Matsunaka

We present XSWAT (Xen SoftWare ATtestation), a system that makes use of timing based software attestation to verify the integrity of cloud computing platforms. We believe that ours is the first instance of a system that uses this attestation technique in a cloud environment and results obtained indicate the feasibility of its deployment. An overview of the XSWAT system and the associated threat model, along with a study of cloud environment impacts on performance, is presented. Environmental parameters include types of interconnects between the XSWAT verifier and measurement agent as well as the number of concurrently executing virtual machines on the platform being verified. Conversely, we also study the impact of XSWAT execution using well known system benchmarks and find this to be insignificant, thereby strengthening the case for XSWAT. We also discuss novel XSWAT mechanisms for addressing TOCTOU attacks.


international conference on cloud computing and services science | 2018

Runtime Attestation for IAAS Clouds.

Jesse Elwell; Angelo Sapello; Alexander Poylisher; Giovanni Di Crescenzo; Abhrajit Ghosh; Ayumu Kubota; Takashi Matsunaka

We present the RIC (Runtime Attestation for Iaas Clouds) system which uses timing-based attestation to verify the integrity of a running Xen Hypervisor as well as the guest virtual machines running on top of it. As part of the RIC system we present a novel attestation technique which includes not only the guest operating system’s static code and read-only data sections but also the guest OS’ dynamically loadable kernel modules. These attestations are conducted periodically at run-time to provide a stronger guarantee of correctness than that offered by load-time verification techniques. A system such as RIC can be used in cloud computing scenarios to verify the environment in which the cloud services ultimately run. Furthermore we offer a method to decrease the performance impact that this process has on the virtual machines that run the cloud services since these services often have very strict performance and availability requirements. This scheme effectively extends the root of trust on the cloud machines from the Xen hypervisor upward to include the guest OS that runs within each virtual machine. This work represents an important step towards secure cloud computing platforms which can help cloud providers offer new services that require higher levels of security than are possible in cloud data centers today.


information security | 2013

Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web

Takashi Matsunaka; Junpei Urakawa; Ayumu Kubota


information security | 2014

An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors

Takashi Matsunaka; Ayumu Kubota; Takahiro Kasama


international conference on cloud computing and services science | 2017

ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System.

Angelo Sapello; C. Jason Chiang; Jesse Elwell; Abhrajit Ghosh; Ayumu Kubota; Takashi Matsunaka


電子情報通信学会総合大会講演論文集 | 2015

BS-3-10 A Feasibility Study for Detecting Landing Sites of Drive-by Download Attacks(BS-3. Advanced Technologies in the Design, Management and Control for Future Innovative Communication Network)

Takashi Matsunaka; Akira Yamada; Ayumu Kubota


Proceedings of the IEICE Engineering Sciences Society/NOLTA Society Conference | 2015

A-7-1 Understanding Dependencies among Human Factors that Impact Security Risk Aversion

Yukiko Sawaya; Akira Yamada; Akihiro Nakarai; Takashi Matsunaka; Jumpei Urakawa; Ayumu Kubota


Archive | 2015

System and method for mitigating toc/tou attacks in a cloud computing environment

Angelo Sapello; Abhrajit Ghosh; Alexander Poylisher; C. Jason Chiang; Ayumu Kubota; Takashi Matsunaka


電子情報通信学会ソサイエティ大会講演論文集 | 2014

BS-6-23 On the Study of Link Relation Characteristics of Malicious Webpages in the Webpage Transition of Drive-by Download(BS-6.Network and service Design, Control and Management)

Takashi Matsunaka; Ayumu Kubota

Collaboration


Dive into the Takashi Matsunaka's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge