Keyword : network monitoring


GHOST Sensor: A Proactive Cyber Attack Monitoring Platform
Masashi ETO Tomohide TANAKA Koei SUZUKI Mio SUZUKI Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 788-795
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
network monitoringcyber attackdarknethoneypotattack detection
 Summary | Full Text:PDF(889.4KB)

New Directions for a Japanese Academic Backbone Network
Shigeo URUSHIDANI Shunji ABE Kenjiro YAMANAKA Kento AIDA Shigetoshi YOKOYAMA Hiroshi YAMADA Motonori NAKAMURA Kensuke FUKUDA Michihiro KOIBUCHI Shigeki YAMADA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/03/01
Vol. E98-D  No. 3 ; pp. 546-556
Type of Manuscript:  INVITED PAPER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
100-Gigabit EthernetMPLS-TPSDNmulti-layer networksecuritycloud serviceperformance acceleratornetwork monitoring
 Summary | Full Text:PDF(2.8MB)

Towards Cost-Effective P2P Traffic Classification in Cloud Environment
Tao BAN Shanqing GUO Masashi ETO Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12 ; pp. 2888-2897
Type of Manuscript:  Special Section PAPER (Special Section on Parallel and Distributed Computing and Networking)
Category: Network and Communication
Keyword: 
P2Pnetwork monitoringtraffic classificationQoS
 Summary | Full Text:PDF(862.3KB)

A Memory-Efficient Bit-Split Pattern Matching Architecture Using Shared Match Vectors for Deep Packet Inspection
HyunJin KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/11/01
Vol. E95-B  No. 11 ; pp. 3594-3596
Type of Manuscript:  LETTER
Category: Network Management/Operation
Keyword: 
computer network securitydeep packet inspectionfinite state machinestring matchingnetwork monitoring
 Summary | Full Text:PDF(255.1KB)

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Koji NAKAO Daisuke INOUE Masashi ETO Katsunari YOSHIOKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 787-798
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
network monitoringdarknet malware analysissandboxcorrelation analysis
 Summary | Full Text:PDF(2MB)

New Methods for Maintaining Fairness between Well-Behaved TCP Flows and Tampered-TCP Flows at Edge Routers
Junichi MARUYAMA Go HASEGAWA Masayuki MURATA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/01/01
Vol. E91-B  No. 1 ; pp. 197-206
Type of Manuscript:  PAPER
Category: Transmission Systems and Transmission Equipment for Communications
Keyword: 
transmission control protocol (TCP)tampered-TCPcongestion windownetwork monitoringfairness
 Summary | Full Text:PDF(688.9KB)

Detecting and Guarding against Kernel Backdoors through Packet Flow Differentials
Cheolho LEE Kiwook SOHN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/10/01
Vol. E90-B  No. 10 ; pp. 2638-2645
Type of Manuscript:  Special Section PAPER (Special Section on New Challenge for Internet Technology and its Architecture)
Category: 
Keyword: 
kernel-mode backdoorsrootkitsbackdoorsnetwork monitoring
 Summary | Full Text:PDF(682.2KB)