Hiroaki HAZEYAMA


Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies
Sirikarn PUKKAWANNA Hiroaki HAZEYAMA Youki KADOBAYASHI Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/03/01
Vol. E98-D  No. 3  pp. 588-595
Type of Manuscript:  Special Section PAPER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: Internet Operation and Management
Keyword: 
anomaly detectionsketchentropytime-frequency analysisS-transform
 Summary | Full Text:PDF

Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set
Mio SUZUKI Hiroaki HAZEYAMA Daisuke MIYAMOTO Shinsuke MIWA Youki KADOBAYASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/10/01
Vol. E92-D  No. 10  pp. 1877-1887
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet)
Category: Network Architecture and Testbed
Keyword: 
network simulationnetwork emulation testbedinternet emulationassistant tool
 Summary | Full Text:PDF

Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic
Yoshihide MATSUMOTO Hiroaki HAZEYAMA Youki KADOBAYASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1292-1299
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
Bloom Filtercountingburst traffic
 Summary | Full Text:PDF

A Layer-2 Extension to Hash-Based IP Traceback
Hiroaki HAZEYAMA Masafumi OE Youki KADOBAYASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/11/01
Vol. E86-D  No. 11  pp. 2325-2333
Type of Manuscript:  Special Section PAPER (Special Issue on New Technologies in the Internet and their Applications)
Category: 
Keyword: 
distributed denial of service attack (DDoS)hash-based IP tracebacklayer-2 traceback
 Summary | Full Text:PDF