Mitsuaki AKIYAMA


BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure
Daiki CHIBA Takeshi YAGI Mitsuaki AKIYAMA Kazufumi AOKI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5  pp. 1012-1023
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
malwarebotnetdynamic analysistemplate
 Summary | Full Text:PDF(2.1MB)

MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 860-872
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by downloadweb-based malwarecode analysisredirection analysis
 Summary | Full Text:PDF(912KB)

Automating URL Blacklist Generation with Similarity Search Approach
Bo SUN Mitsuaki AKIYAMA Takeshi YAGI Mitsuhiro HATADA Tatsuya MORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 873-882
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by-downloadURL blacklistsearch spacemachine learningweb client honeypot
 Summary | Full Text:PDF(2MB)

Client Honeypot Multiplication with High Performance and Precise Detection
Mitsuaki AKIYAMA Takeshi YAGI Youki KADOBAYASHI Takeo HARIU Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4  pp. 775-787
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
client honeypotdrive-by downloadweb-based malwareprocess sandboxintrusion detection
 Summary | Full Text:PDF(892.7KB)

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki AKIYAMA Makoto IWAMURA Yuhei KAWAKOYA Kazufumi AOKI Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5  pp. 1131-1139
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
malwareclient honeypotintrusion detection
 Summary | Full Text:PDF(2.3MB)