Masashi ETO


GHOST Sensor: A Proactive Cyber Attack Monitoring Platform
Masashi ETO Tomohide TANAKA Koei SUZUKI Mio SUZUKI Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4  pp. 788-795
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
network monitoringcyber attackdarknethoneypotattack detection
 Summary | Full Text:PDF(889.4KB)

Towards Cost-Effective P2P Traffic Classification in Cloud Environment
Tao BAN Shanqing GUO Masashi ETO Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12  pp. 2888-2897
Type of Manuscript:  Special Section PAPER (Special Section on Parallel and Distributed Computing and Networking)
Category: Network and Communication
Keyword: 
P2Pnetwork monitoringtraffic classificationQoS
 Summary | Full Text:PDF(862.3KB)

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
Junji NAKAZATO Jungsuk SONG Masashi ETO Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2150-2158
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
malware analysisbehavior of malwareclustering
 Summary | Full Text:PDF(944.4KB)

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9  pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF(951.3KB)

O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
Jungsuk SONG Daisuke INOUE Masashi ETO Hyung Chan KIM Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 245-254
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Network Security
Keyword: 
spamclusteringfeatureK-means clustering method
 Summary | Full Text:PDF(1023.4KB)

A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
Jungsuk SONG Hiroki TAKAKURA Yasuo OKABE Daisuke INOUE Masashi ETO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/09/01
Vol. E93-D  No. 9  pp. 2544-2554
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
intrusion detection systemunsupervised machine learning techniquesreal traffic datavarious evaluation criteria
 Summary | Full Text:PDF(1.2MB)

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
Masashi ETO Kotaro SONODA Daisuke INOUE Katsunari YOSHIOKA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1106-1116
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
malware correlation analysisspectrum analysisFourier transform
 Summary | Full Text:PDF(561.2KB)

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Koji NAKAO Daisuke INOUE Masashi ETO Katsunari YOSHIOKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 787-798
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
network monitoringdarknet malware analysissandboxcorrelation analysis
 Summary | Full Text:PDF(2MB)

Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
Katsunari YOSHIOKA Daisuke INOUE Masashi ETO Yuji HOSHIZAWA Hiroki NOGAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 955-966
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malware sandbox analysisexploit code detectionlow-interaction honeypot
 Summary | Full Text:PDF(3.2MB)

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Daisuke INOUE Katsunari YOSHIOKA Masashi ETO Yuji HOSHIZAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 945-954
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malwaredynamic analysissandboxsecurity incident
 Summary | Full Text:PDF(1.6MB)