研究キーワード
インターネット トレースバック技術 オーバーレイネットワーク Webセキュリティ
研究分野
情報通信 / 情報ネットワーク / , 情報通信 / 計算機システム /
研究室概要
サイバースペースおよびそれを構成するインターネットを高度化し、レジリエンスを向上させていくための実証的な技術開発と、社会に対する積極的な技術移転を目指す研究・教育を行う。
学術論文
"FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection," IEEE Access, Sep. 2024
Nahid Ferdous Aurna, Md Delwar Hossain, Latifur Khan, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1109/ACCESS.2024.3464333 ]
"Web-Biometrics for User Authenticity Verification in Zero Trust Access Control," IEEE Access, vol.12, pp129611-129622, Jun. 2024
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall
[ doi:10.1109/ACCESS.2024.3413696 ]
"Interdependency Attack-aware Secure and Performant Virtual Machine Allocation Policies with Low Attack Efficiency and Coverage," IEEE Access, vol.12, pp74944-74960, May. 2024
Bernard Ousmane Sane, Mandicou Ba, Doudou Fall, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi
[ doi:10.1109/ACCESS.2024.3404949 ]
"Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning with Real and Synthetic Attacks," IEEE Access, vol.12, pp26023-26045, Feb. 2024
Olufemi Abiodun Abraham, Hideya Ochiai, HOSSAIN Md Delwar, Yuzo Taenaka, Youki Kadobayashi
[ NAISTレポジトリ ] [ doi:10.1109/ACCESS.2024.3366493 ]
"Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning," IEEE Communications Magazine, 2023.6
Hideya Ochiai, HOSSAIN Md Delwar, Pawissakan Chirupphapa, 門林 雄基, Hiroshi Esaki
"Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing through Modulated Synchronous Taxiing Approach," IEEE Open Journal of Intelligent Transportation Systems, Jun. 2023
Mohd Ruzeiny Kamaruzzaman, HOSSAIN Md Delwar, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1109/OJITS.2023.3286881 ]
"Smart home cybersecurity awareness and behavioral incentives," Information & Computer Security, Jun. 2023
N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1108/ICS-03-2023-0032 ]
"Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware," Journal of Computer Virology and Hacking Techniques, vol.19, pp149-163, May. 2023
Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto
[ doi:10.1007/s11416-023-00478-x ]
"An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks," Applied Sciences, vol.13, no.7, Apr. 2023
N’guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.3390/app13074645 ]
"Towards Autonomous Driving Model Resistant to Adversarial Attack," Applied Artificial Intelligence, Mar. 2023
Kabid Hassan Shibly, HOSSAIN Md Delwar, 井上 博之, 妙中 雄三, 門林 雄基
[ doi:10.1080/08839514.2023.2193461 ]
"Oblivious Statistic Collection with Local Differential Privacy in Mutual Distrust," IEEE Access, vol.11, pp21374-21386, Mar. 2023
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1109/ACCESS.2023.3251560 ]
"A Survey on Blockchain, SDN and NFV for the Smart-Home Security," Internet of Things, Aug. 2022
N'guessan Yves-Roland Douha, Monowar Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi
[ doi:10.1016/j.iot.2022.100588 ]
"DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT," Internet of Things, vol.14, pp100391, Jun. 2021
Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Fall Doudou, Erik Elmroth, Youki Kadobayashi
[ doi:10.1016/j.iot.2021.100391 ]
"LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications," IEEE Access, vol.8, pp185489-185502, Nov. 2020
Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Fall Doudou, Youki Kadobayashi
[ doi:10.1109/ACCESS.2020.3029307 ]
"LSTM-based Intrusion Detection System for In-Vehicle CAN Bus Communications," IEEE Access, Sep. 2020
Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Fall Doudou, Youki Kadobayashi
"Hierarchical Load Balancing and Clustering Technique for Home Edge Computing," IEEE Access, Jul. 2020
Cheikh Saliou Mbacke Babou, Fall Doudou, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Youki Kadobayashi
[ doi:10.1109/ACCESS.2020.3007944 ]
"A Demographic Perspective of Smartphone Security and its Redesigned Notifications," Journal of Information Processing (JIP), Dec. 2019
Jema David Ndibwile, Edith Talina Luhanga, Fall Doudou, Youki Kadobayashi
"Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis," IEICE Transactions on Communications, vol.E102-B, no.10, Oct. 2019
Gábor Lencse, Youki Kadobayashi
"An Empirical Approach to Phishing Countermeasures through Smart Glasses and Validation Agents," IEEE Access, vol.7, pp130758-130771, Sep. 2019
Jema David Ndibwile, Edith Talina Luhanga, Fall Doudou, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi
[ doi:10.1109/ACCESS.2019.2940669 ]
"A normative decision-making model for cyber security", Information & Computer Security," Information & Computer Security, Jun. 2019
Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto
[ doi:10.1108/ICS-01-2019-0021 ]
"Proposal of Cyber Security Game Practice Tool Secure-One," Transactions of Information Processing Society of Japan, vol.41, no.12, pp2264-2271, Dec. 2018
Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi
"Methodology for DNS Cache Poisoning Vulnerability Analysis of DNS64 Implementations," Infocommunications Journal, vol.10, no.2, pp13-25, Jun. 2018
Gábor Lencse, Youki Kadobayashi
"Benchmarking DNS64 Implementations: Theory and Practice," Computer Communications, vol.127, no.1, pp61-74, May. 2018
Gábor Lencse, Youki Kadobayashi
"Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64," Computers & Security, vol.77, no.1, pp397-411, Apr. 2018
Gábor Lencse, Youki Kadobayashi
"Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment," Security and Communication Networks, vol.2018, Feb. 2018
Ady Wahyudi Paundu, Fall Doudou, Daisuke Miyamoto, Youki Kadobayashi
"Web of Cybersecurity: Linking, Locating, and Discovering Structured Cybersecurity Information," International Journal of Communication Systems, Oct. 2017
Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao
"Benchmarking Methodology for DNS64 Servers," Computer Communications, vol.109, no.1, pp162-175, Jun. 2017
G. Lencse, M. Georgescu, Youki Kadobayashi
"HoneyCirculator: Distributing Credential Honeytoken for Introspection of Web-based Attack Cycle," International Journal of Information Security 2017, Jan. 2017
Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, Youki Kadobayashi
"Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing," Journal of Information Processing (JIP), vol.24, no.2, Mar. 2016
Fall Doudou, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
"Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home," International Journal of Gaming and Computer-Mediated Simulations (IJGCMS), vol.7, no.3, Aug. 2015
Christopher Michael Yap, Youki Kadobayashi, Suguru Yamaguchi
"Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms," Journal of Information Processing, vol.23, no.4, pp465-475, Jul. 2015
Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
"Client Honeypot Multiplication with High Performance and Precise Detection," IEICE Transactions on Information and Systems, vol.E98-D, no.4, Apr. 2015
Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi
"Detecting Anomalies in Massive Traffic Streams based on S-transform Analysis of Summarized Traffic Entropies," IEICE Transactions on Information and Systems, vol.E98-D, no.3, pp588-595, Mar. 2015
Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
"Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed," EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, vol.15, no.2, Feb. 2015
Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
"Reference Ontology for Cybersecurity Operational Information," The Computer Journal, Oct. 2014
Takeshi Takahashi, Youki Kadobayashi
" Sip flooding attack detection using a trust model and statistical algorithms," Journal of Information Processing, vol.22, no.2, pp118-129, 15 Apr. 2014
Noppawat Chaisamran, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
"位置依存情報配信を目的としたipv6マルチキャストアドレスの設計と評価," 情報処理学会論文誌, vol.55, no.2, pp619-629, 2014.2
岡田和也, 奥田剛, 門林雄基, 山口英
"A Learner-Independent Knowledge Transfer Approach to Multi-task Learning," Cognitive Computation, vol.6, no.3, pp304-320, Nov. 2013
Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue
"Behind HumanBoost: Analysis of Users' Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, vol.4, pp319-329, Nov. 2012
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, Takeshi Takahashi
"Exploring Attack Graph for Cost-Benefit Security Hardening: a Probabilistic Approach," Elsevier Computers & Security, vol.32, pp158-169, Oct. 2012
Zonghua Zhang, Shuzhen Wang, Youki Kadobayashi
"LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration," IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.42, no.2, pp552-564, Apr. 2012
Shaoning Pang, Tao Ban, Youki Kadobayashi, N.K. Kasabov
"A Step Towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude.," IEICE Transactions on Information and Systems, vol. E94-D, no.11, Nov. 2011
Gregory Blanc, Youki Kadobayashi
"Towards Cost-sensitive Self-optimizing Anomaly Detection and Response in Autonomic Networks.," Computers & Security , vol.30, no.6-7, pp525-537, Oct. 2011
Zonghua Zhang, Farid Nait-Abdesselam, Pin-Han Ho, Youki Kadobayashi
"Personalized mode transductive spanning SVM classification tree," Information Sciences, vol.181, no.11, pp2071-2085, Jun. 2011
Shaoning Pang, Tao Ban, Youki Kadobayashi, Nicola Kasabov
"HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications, vol.2, no.4, pp190-199, Oct. 2010
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi
"Introduction to AdaIndex - an Adaptive Similarity Search Algorithm in General Metric Spaces," Advances in Computer Science and IT, In-Teh, pp381-391, Dec. 2009
Tao Ban, Youki Kadobayashi
"Handover Management for VoWLAN based on Estimation of AP Queue Length and Frame Retries," IEICE Transactions on Information and System, vol.E92-D, no.10, pp1847-1856, Oct. 2009
Muhammad Niswar, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi
[ NAISTレポジトリ ]
"Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set," IEICE TRANSACTIONS on Information and Systems, vol.E92-D, no.10, pp1877-1887, Oct. 2009
Mio Suzuki, Hiroaki Hazeyama, Daisuke Miyamoto, Shinsuke Miwa, Youki Kadobayashi
[ NAISTレポジトリ ]
"階層型p2pネットワークを用いたインターネット計測基盤の性能評価と実展開シナリオの考察," 情報処理学会論文誌, vol.50, no.2, pp709-720, 2009.2
益井 賢次, 門林 雄基
"徹底攻略!トレースバック技術," ThinkIT 連載記事2009年2月特集「セキュリティーのツボ」, 2009.2
門林 雄基, 櫖山 寛章
"Hose bandwidth allocation method to achieve minimum throughput assurance service for provider provisioned VPNs," IPSJ Journal, vol.49, no.12, pp3967-3984, Dec. 2008
Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi
"An Evaluation of Machine Learning-based Methods for Detection of Phishing Sites," Australian Journal of Intelligent Information Processing Systems, vol.10, no.2, pp54-63, Nov. 2008
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi
"トレーサブルネットワークの研究開発," 情報通信研究機構 季報, vol.54, no.2/3, 2008.9
門林 雄基
"On tighter inequalities for efficient similarity search in metric spaces," IAENG International Journal of Computer Science, International Association of Engineering, vol.35, no.3, Aug. 2008
Tao Ban, Youki Kadobayashi
"Incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques," International Journal of Security and Its Applications (IJSIA), Science & Engineering Research Support Center, vol.2, no.3, pp41-47, Jul. 2008
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
"Adaptive bloom filter : Space efficient counting algorithm for unpredictable network traffic," IEICE Transactions on Information and Systems, vol.91-D, no.5, May. 2008
Yoshihide Matsumoto, Hiroaki Hazeyama, Youki Kadobayashi
"オーバーレイ・ネットワーク," コンピュータソフトウェア, 日本ソフトウェア科学会, vol.Vol.23, no.No.1, pp15-23, 2006.1
門林雄基
"Improvement of Consistency among AS Policies on IRR Database," Journal of IPSJ, vol.Vo.46, No.6, pp1456-1465, Jun. 2005
Masasi Eto, Youki Kadobayashi, Suguru Yamaguchi
"Reducing Processor Usage on Heavily-loaded Network Servers with POSIX Real-time Scheduling Control," IEICE Transactions on Information and Systems, vol.Vol. E88-D, no.No. 6, pp1168-1177, Jun. 2005
Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
"Performance Study and Deployment Strategies on the Sender-InitiatedMulticast," Special issue on Internet Technology V, IEICETrans. on Commun, vol.Vol.E88-B, , no.No.4, pp1383-1394, Apr. 2005
V. Visoottiviseth, H. Kido, K. Iida, Y. Kadobayashi, S. Yamaguchi
"実時間シグナルを用いたポーリングI/Oライブラリの設計," 情報処理学会論文誌コンピューティングシステム, vol.Vol.46, no.No. SIG4 , pp22-32, 2005.3
河合 栄治, 門林 雄基, 山口 英
"Distributed Scalable Multi-Player Online Game Servers on Peer-to-Peer Networks," 情報処理学会論文誌, vol.Vol.46, no.No.2, pp376-391, Feb. 2005
Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi
"ポリシによる複数ファイアウォールの一括設定方式の提案と実装," 電子情報通信学会論文誌, vol.Vol.J87-B, no.No.10, pp1616-1625, 2004.10
下條敏男, 衛藤将史, 門林雄基
"Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks," IEICE Transactions on Communications, vol.E87-B, no.3, pp490-496, Mar. 2004
Shigeru Kashihara, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi
[ NAISTレポジトリ ]
"ネットワークサーバにおける多重化I/Oの実行間隔制御による性能向上手法," 情報処理学会論文誌, vol.Vol.45, no.No.2, pp391-401, 2004.2
河合栄治, 門林雄基, 山口英
[ NAISTレポジトリ ]
"ネットワークプロセッサ技術の研究開発動向," 情報処理学会論文誌, vol.Vol.45, no.No. SIG1, pp54-65, 2004.1
河合栄治, 門林雄基, 山口英
"A Layer-2 Extention to Hash-bsaed IP Traceback," IEICE Transactions on Information and Systems, vol.Vol.E86-D, no.No.11, Nov. 2003
Hiroaki Hazeyama, Masafumi Oe, Youki Kadobayashi
"階層型IPトレースバック機構の実装と検証," 電子情報通信学会論文誌, vol.Vol.J86-B, no.No.8, pp1313-1322, 2003.8
大江将史, 門林雄基
"An Early Experience in Content Internetworking with Content RoutingNetwork," IEICE Transactions on Communications, vol.Vol.E86-B, no.No.2, Feb. 2003
Youki Kadobayashi, Satoshi Abe, Yasuhiro Ohara, Masaki Minami
"少人数を対象とした送信者指定型マルチキャストプロトコルSIM," 電子情報通信学会論文誌, vol.j85-B, no.8, pp1215-1226, 2002.8
ワサカ ヴィスーティヴィセット, 門林 雄基, 山口 英
"階層型IPトレースバック機構の提案," 電子情報通信学会論文誌, vol.j85-B, no.8, pp1313-1322, 2002.8
大江 将史, 門林 雄基, 山口 英
"CDNとエッジサービス," 情報処理学会誌, vol.43, no.4, pp454-460, 2002.4
門林 雄基
"IPトレースバック技術.," 情報処理学会学会誌, vol.42, no.12, pp1175-1180, 2001.12
門林 雄基, 大江 将史
"グローバルコンピューティングの実際," Computer Today, pp56-62, 2001.3
門林 雄基, 伊達 進
受賞
"Best paper award," The Sixteenth International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2024), Feb. 2024
Tomoya Suzuki, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi
"若手研究奨励賞," 電子情報通信学会ネットワークシステム研究会, 2024.1
湯浅潤樹, 笹田大翔, 妙中雄三, 門林雄基
"Best paper award," SmartCom2022, Nov. 2022
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi
"Best paper award," 2018 International Conference on Edge Computing (EDGE 2018), Jun. 2018
Cheikh Saliou Mbacke Babou, Fall Doudou, Shigeru Kashihara, Ibrahima Niang, Youki Kadobayashi
"日本ITU協会賞 功績賞," 一般財団法人日本ITU協会, 2017.5.17
門林 雄基
"総務省情報通信国際戦略局長表彰「情報セキュリティ促進部門」," 総務省, 2009.10
門林 雄基
"電子情報通信学会 インターネットアーキテクチャ研究会 研究賞," 電子情報通信学会 インターネットアーキテクチャ研究会, 2009.6
櫖山 寛章, 門林 雄基
所属学協会
ACM SIGCOMM
情報処理学会
電子情報通信学会
WIDEプロジェクト
資料

妙中 雄三

職位 准教授
領域 情報科学領域 AI基盤情報学
研究室 サイバーレジリエンス構成学

サイバースペースおよびそれを構成するインターネットを高度化し、レジリエンスを向上させていくための実証的な技術開発と、社会に対する積極的な技術移転を目指す研究・教育を行う。

宮本 大輔

職位 客員准教授
領域 情報科学領域 AI基盤情報学
研究室 サイバーレジリエンス構成学

サイバースペースおよびそれを構成するインターネットを高度化し、レジリエンスを向上させていくための実証的な技術開発と、社会に対する積極的な技術移転を目指す研究・教育を行う。

井上 博之

職位 客員准教授
領域 情報科学領域 AI基盤情報学
研究室 サイバーレジリエンス構成学

サイバースペースおよびそれを構成するインターネットを高度化し、レジリエンスを向上させていくための実証的な技術開発と、社会に対する積極的な技術移転を目指す研究・教育を行う。