Koji NAKAO


GHOST Sensor: A Proactive Cyber Attack Monitoring Platform
Masashi ETO Tomohide TANAKA Koei SUZUKI Mio SUZUKI Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4  pp. 788-795
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
network monitoringcyber attackdarknethoneypotattack detection
 Summary | Full Text:PDF(889.4KB)

An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking
Ryoichi ISAWA Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4  pp. 883-893
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software packermalwarecode analysisData Execution Prevention (DEP)security
 Summary | Full Text:PDF(637.9KB)

An Accurate Packer Identification Method Using Support Vector Machine
Ryoichi ISAWA Tao BAN Shanqing GUO Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 253-263
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
malware analysispackunpackmachine learningSVM
 Summary | Full Text:PDF(1.4MB)

Towards Cost-Effective P2P Traffic Classification in Cloud Environment
Tao BAN Shanqing GUO Masashi ETO Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12  pp. 2888-2897
Type of Manuscript:  Special Section PAPER (Special Section on Parallel and Distributed Computing and Networking)
Category: Network and Communication
Keyword: 
P2Pnetwork monitoringtraffic classificationQoS
 Summary | Full Text:PDF(862.3KB)

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
Junji NAKAZATO Jungsuk SONG Masashi ETO Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2150-2158
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
malware analysisbehavior of malwareclustering
 Summary | Full Text:PDF(944.4KB)

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9  pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF(951.3KB)

O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
Jungsuk SONG Daisuke INOUE Masashi ETO Hyung Chan KIM Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 245-254
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Network Security
Keyword: 
spamclusteringfeatureK-means clustering method
 Summary | Full Text:PDF(1023.4KB)

Experimental Results on Simple Distributed Cooperative Transmission Scheme with Visible Light Communication
Takaya YAMAZATO Koji NAKAO Hiraku OKADA Masaaki KATAYAMA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/11/01
Vol. E93-B  No. 11  pp. 2959-2962
Type of Manuscript:  Special Section LETTER (Special Section on Fundamental Issues on Deployment of Ubiquitous Sensor Networks)
Category: 
Keyword: 
wireless sensor networksdistributed cooperative transmissionturbo coded FSKrandom phase multiplicationvisible light communication
 Summary | Full Text:PDF(971.8KB)

A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
Jungsuk SONG Hiroki TAKAKURA Yasuo OKABE Daisuke INOUE Masashi ETO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/09/01
Vol. E93-D  No. 9  pp. 2544-2554
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
intrusion detection systemunsupervised machine learning techniquesreal traffic datavarious evaluation criteria
 Summary | Full Text:PDF(1.2MB)

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
Masashi ETO Kotaro SONODA Daisuke INOUE Katsunari YOSHIOKA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1106-1116
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
malware correlation analysisspectrum analysisFourier transform
 Summary | Full Text:PDF(561.2KB)

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Koji NAKAO Daisuke INOUE Masashi ETO Katsunari YOSHIOKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 787-798
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
network monitoringdarknet malware analysissandboxcorrelation analysis
 Summary | Full Text:PDF(2MB)

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Daisuke INOUE Katsunari YOSHIOKA Masashi ETO Yuji HOSHIZAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 945-954
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malwaredynamic analysissandboxsecurity incident
 Summary | Full Text:PDF(1.6MB)

Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
Katsunari YOSHIOKA Daisuke INOUE Masashi ETO Yuji HOSHIZAWA Hiroki NOGAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 955-966
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malware sandbox analysisexploit code detectionlow-interaction honeypot
 Summary | Full Text:PDF(3.2MB)

UDP Large-Payload Capability Detection for DNSSEC
Kenji RIKITAKE Koji NAKAO Shinji SHIMOJO Hiroki NOGAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1261-1273
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
DNSDNSSECIP fragmentationapplication MTU discovery
 Summary | Full Text:PDF(882.8KB)

FOREWORD
Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1225-1225
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(47.9KB)

FOREWORD
Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2483-2483
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(34.3KB)

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
Akira YAMADA Shinsaku KIYOMOTO Toshiaki TANAKA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 182-189
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
time-stamplinking schemeforward or backward dating attackpseudonymousmutual communication
 Summary | Full Text:PDF(520KB)

FOREWORD
Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(35.7KB)

QoS Routing-Based Congestion Management over Active Internetworking System Using Stream Code
Shigehiro ANO Toru HASEGAWA Koji NAKAO Toshihiko KATO Takashi EGAWA Koji HINO Yoshiaki KIRIHA Fumito KUBOTA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/06/01
Vol. E84-B  No. 6  pp. 1569-1580
Type of Manuscript:  Special Section PAPER (Special Issue on New Developments on QoS Technologies for Information Networks)
Category: 
Keyword: 
active networkcongestion managementQoS routing
 Summary | Full Text:PDF(1.4MB)