Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tomohiro Shigemoto is active.

Publication


Featured researches published by Tomohiro Shigemoto.


international workshop on security | 2012

Development of qualification of security status suitable for cloud computing system

Satoshi Kai; Tomohiro Shigemoto; Tetsuro Kito; Satoshi Takemoto; Tadashi Kaji

Cloud services have recently been expanding rapidly, but business users are still in the minority compared with consumer users. From the viewpoint of organizational risk management, it is necessary to control the risks of the cloud computing environment used as part of an organizations information system in order to minimize any negative influence on the organizations mission or business processes. In a previous article, the authors divided cloud security metrics into two security levels. One level shows how the security metrics influence the mission or business processes in 27 dimensions. The other level shows the security status at the time and the influence range when an incident occurs. This article focuses the latter variable security level and describes the results of developing a cloud security visualization system that was designed based on collection, analysis, and visualization architecture to calculate the level. From the viewpoint of security risk management, the system is considerered to be effective for cloud service providers because it reduces the time needed to investigate the cause of incidents and to recover from them, it helps in triage assessment when many incidents happen simultaneously, and it can detect warnings of an incident and forestall such incidents before they occur.


2010 6th IEEE Workshop on Secure Network Protocols | 2010

Detection and control system for Peer-to-Peer file exchange application

Kazuya Okochi; Nobutaka Kawaguchi; Tomohiro Shigemoto; Tetsuro Kito; Hirofumi Nakakoji; Masato Terada

As P2P (Peer-to-Peer) file sharing software is widely deployed, it causes some serious problems, such as network traffic congestion, unwanted file sharing by computer viruses that abuse P2P software, and so on. Detecting and controlling traffic of P2P software is an important issue to solve these problems. In this paper, we propose a basic architecture to observe large-scale network traffic, identify the P2P traffic and control them. This architecture consists of four units, the observation unit, the analysis unit, the control unit and the managing unit. We evaluate the architecture using lOGbps full duplex traffic, and demonstrate that this system can control the P2P traffic properly.


Archive | 2010

UNAUTHORIZED PROCESS DETECTION METHOD AND UNAUTHORIZED PROCESS DETECTION SYSTEM

Tetsuro Kito; Nobutaka Kawaguchi; Kazuya Okochi; Hirofumi Nakakoji; Tomohiro Shigemoto; Tatsunoshin Kawaguchi


Archive | 2011

VULNERABILITY COUNTERMEASURE DEVICE AND VULNERABILITY COUNTERMEASURE METHOD

Tomohiro Shigemoto; Hirofumi Nakakoji; Tetsuro Kito; Hisashi Umeki; Satoshi Takemoto; Tadashi Kaji; Satoshi Kai


Archive | 2011

SECURITY LEVEL VISUALIZATION DEVICE

Tomohiro Shigemoto; Hirofumi Nakakoji; Tetsuro Kito; Hisashi Umeki; Satoshi Takemoto; Tadashi Kaji; Satoshi Kai


Archive | 2015

Program analysis device, program analysis method, and program analysis system

林 直樹; Naoki Hayashi; 仲小路 博史; Hirofumi Nakakoji; 哲郎 鬼頭; Tetsuro Kito; 倫宏 重本; Tomohiro Shigemoto; 淳弥 楠美; Junya Kusumi


Archive | 2012

ENCRYPTED TRAFFIC TEST SYSTEM

Tomohiro Shigemoto; Hirofumi Nakakoji; Tetsuro Kito; Hisashi Umeki; Satoshi Takemoto; Tadashi Kaji; Satoshi Kai


Archive | 2011

INFORMATION LEAK FILE DETECTION APPARATUS AND METHOD AND PROGRAM THEREOF

Hirofumi Nakakoji; Tetsuro Kito; Masato Terada; Shinichi Tankyo; Isao Kaine; Tomohiro Shigemoto


information security | 2018

Development of White List Based Autonomous Evolution of Defense System for RAT Malware

Tomohiro Shigemoto; Shota Fujii; Ichiro Kuriama; Tetsuro Kito; Hirofumi Nakakoji; Yasuhiro Fujii; Hiroaki Kikuchi


network based information systems | 2016

Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results

Hirofumi Nakakoji; Yasuhiro Fujii; Yoshiaki Isobe; Tomohiro Shigemoto; Tetsuro Kito; Naoki Hayashi; Nobutaka Kawaguchi; Naoki Shimotsuma; Hiroaki Kikuchi

Collaboration


Dive into the Tomohiro Shigemoto's collaboration.

Researchain Logo
Decentralizing Knowledge