Keyword : network security


A Heuristic for Constructing Smaller Automata Based on Suffix Sorting and Its Application in Network Security
Inbok LEE Victor C. VALGENTI Min S. KIM Sung-il OH 
Publication:   
Publication Date: 2018/03/01
Vol. E101-D  No. 3 ; pp. 613-615
Type of Manuscript:  Special Section LETTER (Special Section on Foundations of Computer Science — Frontiers of Theoretical Computer Science —)
Category: 
Keyword: 
string algorithmregular expressionautomatanetwork security
 Summary | Full Text:PDF

A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks
Jae Kwan LEE Tae Ho CHO 
Publication:   
Publication Date: 2018/02/01
Vol. E101-B  No. 2 ; pp. 489-499
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
wireless sensor networksfalse reportfalse voteprobabilistic voting-based filtering schemefuzzy logic systemnetwork security
 Summary | Full Text:PDF

Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing
Mohamad Samir A. EID Hitoshi AIDA 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8 ; pp. 1738-1750
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Internet Security
Keyword: 
Distributed Denial of Service (DDoS) attacksapplication level attacksnetwork securityoverlay networks
 Summary | Full Text:PDF

RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks
Yue-Bin LUO Bao-Sheng WANG Xiao-Feng WANG Bo-Feng ZHANG Wei HU 
Publication:   
Publication Date: 2017/03/01
Vol. E100-D  No. 3 ; pp. 496-510
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
port and address hoppingmoving target defensenetwork securityreconnaissance
 Summary | Full Text:PDF

Defending DDoS Attacks in Software-Defined Networking Based on Legitimate Source and Destination IP Address Database
Xiulei WANG Ming CHEN Changyou XING Tingting ZHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 850-859
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network security
Keyword: 
network securityDDoS attackssoftware-defined networkingnon-parametric CUSUM
 Summary | Full Text:PDF

A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches
Daisuke KOTANI Yasuo OKABE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/03/01
Vol. E99-D  No. 3 ; pp. 695-707
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
network securitysoftware-defined networkingOpenFlow
 Summary | Full Text:PDF

Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks
Hae Young LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 964-967
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
wireless sensor networksnetwork securityintrusion detectionfalse data injection attackfuzzy logic
 Summary | Full Text:PDF

Distributed One-Time Keyboard Systems
YoungLok PARK MyungKeun YOON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/12/01
Vol. E96-D  No. 12 ; pp. 2870-2872
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
keyboard securitynetwork securitymulti-channelInternet banking
 Summary | Full Text:PDF

WHIT: A More Efficient Hybrid Method for Single-Packet IP Traceback Using Walsh Matrix and Router Degree Distribution
Yulong WANG Ji REN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/07/01
Vol. E96-B  No. 7 ; pp. 1896-1907
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
network securityIP tracebackWalsh matrixrouter degree distribution
 Summary | Full Text:PDF

Detecting Stealthy Spreaders by Random Aging Streaming Filters
MyungKeun YOON Shigang CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/08/01
Vol. E94-B  No. 8 ; pp. 2274-2281
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
network securityintrusion detectionspreader detectionport scananomaly detection
 Summary | Full Text:PDF

Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks
Hae Young LEE Tae Ho CHO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/06/01
Vol. E94-B  No. 6 ; pp. 1648-1656
Type of Manuscript:  PAPER
Category: Network
Keyword: 
ubiquitous sensor networksfalse data filteringnetwork securitygenetic algorithmsoptimizationfuzzy logic
 Summary | Full Text:PDF

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
Eun-Jun YOON Il-Soo JEON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/05/01
Vol. E94-D  No. 5 ; pp. 1113-1116
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
network securityautonomous systemcryptographyauthenticationAES
 Summary | Full Text:PDF

Detecting Long Duration Flows without False Negatives
SangWoo LEE Seon-Ho SHIN MyungKeun YOON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/05/01
Vol. E94-B  No. 5 ; pp. 1460-1462
Type of Manuscript:  LETTER
Category: Network Management/Operation
Keyword: 
traffic monitoringnetwork managementnetwork security
 Summary | Full Text:PDF

Abnormal Policy Detection and Correction Using Overlapping Transition
Sunghyun KIM Heejo LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5 ; pp. 1053-1061
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
firewallsecurity policypolicy anomaliesnetwork securityACL
 Summary | Full Text:PDF

WindTalker: A P2P-Based Low-Latency Anonymous Communication Network
Jia ZHANG Haixin DUAN Wu LIU Jianping WU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/10/01
Vol. E92-B  No. 10 ; pp. 3183-3194
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
anonymous communicationpeer-to-peertrustreputationnetwork security
 Summary | Full Text:PDF

A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks
Hsiao-Chien TSAI Nai-Wei LO Tzong-Chen WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 777-786
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
mobile ad hoc networknetwork securityreputation systemfuzzy logic
 Summary | Full Text:PDF

A Good IDS Response Protocol of MANET Containment Strategies
Bo-Chao CHENG Huan CHEN Ryh-Yuh TSENG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/11/01
Vol. E91-B  No. 11 ; pp. 3657-3666
Type of Manuscript:  PAPER
Category: Network
Keyword: 
MANETnetwork securityIDS responseT-cellAODV
 Summary | Full Text:PDF

Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
Daeseon CHOI Younho LEE Yongsu PARK Seung-hun JIN Hyunsoo YOON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/11/01
Vol. E91-B  No. 11 ; pp. 3574-3583
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
ad hoc networksnetwork securitykey managementself-organized
 Summary | Full Text:PDF

IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks
Ping DU Shunji ABE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1274-1281
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
denial of service attacknetwork securityattack detection
 Summary | Full Text:PDF

OpenIKEv2: Design and Implementation of an IKEv2 Solution
Alejandro Perez MENDEZ Pedro J. Fernandez RUIZ Rafael Marin LOPEZ Gregorio Martinez PEREZ Antonio F. Gomez SKARMETA Kenichi TANIUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1319-1329
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation
Keyword: 
IKEv2key managementIPsecnetwork securityopen-source
 Summary | Full Text:PDF

Hybrid Intrusion Forecasting Framework for Early Warning System
Sehun KIM Seong-jun SHIN Hyunwoo KIM Ki Hoon KWON Younggoo HAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1234-1241
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
early warning systemintrusion forecastingnetwork securitycyber threat
 Summary | Full Text:PDF

Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization
Dong Seong KIM Jong Sou PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/04/01
Vol. E91-D  No. 4 ; pp. 1050-1057
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detection systemgenetic algorithmsupport vector machinesfilter methodrandom forestfeature selectionparameters optimizationnetwork security
 Summary | Full Text:PDF

TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems
Miyuki HANAOKA Makoto SHIMAMURA Kenji KONO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/12/01
Vol. E90-D  No. 12 ; pp. 2019-2032
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
network securitynetwork intrusion detection/prevention systemslayer7-aware NIDS/NIPSTCP reassembler
 Summary | Full Text:PDF

Web Metering Scheme Based on the Bilinear Pairings
Narn-Yih LEE Ming-Feng LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/03/01
Vol. E90-D  No. 3 ; pp. 688-691
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographymetering schemesecret sharingbilinear pairingsnetwork security
 Summary | Full Text:PDF

Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR)
Chun-Li LIN Ching-Po HUNG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/12/01
Vol. E89-B  No. 12 ; pp. 3425-3427
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
network securityuser authenticationone-time passwordimpersonation attack
 Summary | Full Text:PDF

Large-Throughput Anomaly Prevention Mechanism Implemented in Dynamic Reconfigurable Processor
Takashi ISOBE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/09/01
Vol. E89-B  No. 9 ; pp. 2440-2447
Type of Manuscript:  Special Section PAPER (Special Section on Networking Technologies for Overlay Networks)
Category: 
Keyword: 
network securityDDoSwormP2Panomaly preventionDRPIDSIPS
 Summary | Full Text:PDF

An Effective DDoS Attack Detection and Packet-Filtering Scheme
Seokbong JEONG Hyunwoo KIM Sehun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/07/01
Vol. E89-B  No. 7 ; pp. 2033-2042
Type of Manuscript:  PAPER
Category: Network Management/Operation
Keyword: 
DDoS attacknetwork securityqueuing modelpacket-filtering
 Summary | Full Text:PDF

A More Efficient Improvement of the Virtual Software Token Protocols
Shuhong WANG Feng BAO Jie WANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/03/01
Vol. E89-B  No. 3 ; pp. 945-948
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
PKI roamingsoftware tokennetwork security
 Summary | Full Text:PDF

Improvement of an Efficient and Practical Solution to Remote Authentication: Smart Card
Her-Tyan YEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/01/01
Vol. E89-B  No. 1 ; pp. 210-211
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
remote authenticationsmart cardnetwork securitycryptographydata security
 Summary | Full Text:PDF

An Efficient Method for Optimal Probe Deployment of Distributed IDS
Jing WANG Naoya NITTA Hiroyuki SEKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/08/01
Vol. E88-D  No. 8 ; pp. 1948-1957
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
network securityintrusion detectionnetwork IDSdistributed IDSIDS partition deployment problem
 Summary | Full Text:PDF

A CAM-Based Signature-Matching Co-processor with Application-Driven Power-Reduction Features
Kazunari INOUE Hideyuki NODA Kazutami ARIMOTO Hans Jurgen MATTAUSCH Tetsushi KOIDE 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2005/06/01
Vol. E88-C  No. 6 ; pp. 1332-1342
Type of Manuscript:  PAPER
Category: Integrated Electronics
Keyword: 
CAMTCAMsignature-matchingnetwork security
 Summary | Full Text:PDF

An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading
JaeYong JEONG Yongsu PARK Yookun CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/05/01
Vol. E88-D  No. 5 ; pp. 1077-1081
Type of Manuscript:  LETTER
Category: Networks
Keyword: 
mobile communications securitynetwork securityauthentication
 Summary | Full Text:PDF

IP Traceback in Incomplete PPM
Yu-Kuo TSENG Lung-Jen WANG His-Han CHEN Wen-Shyong HSIEH 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/09/01
Vol. E87-D  No. 9 ; pp. 2262-2266
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
network securityDoSIP tracebackPPM
 Summary | Full Text:PDF

An Enhanced SAIDA: Stream Authentication with High Verification Probability and Low Computation Cost
Yongsu PARK Yookun CHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/09/01
Vol. E87-A  No. 9 ; pp. 2471-2473
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
network securityauthenticationdigital signaturestream distribution
 Summary | Full Text:PDF

Security of a Remote User Authentication Scheme Using Smart Cards
Her-Tyan YEH Hung-Min SUN Bin-Tsan HSIEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/01/01
Vol. E87-B  No. 1 ; pp. 192-194
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
password authenticationsmart cardnetwork securityremote logincryptanalysis
 Summary | Full Text:PDF

Pulse: A Class of Super-Worms against Network Infrastructure
Artemios G. VOYIATZIS Dimitrios N. SERPANOS 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/10/01
Vol. E86-B  No. 10 ; pp. 2971-2974
Type of Manuscript:  Special Section LETTER (IEICE/IEEE Joint Special Issue on Assurance Systems and Networks)
Category: 
Keyword: 
network securitywormssuper-wormsrouting
 Summary | Full Text:PDF

An Efficient Stream Authentication Scheme
Yongsu PARK Yookun CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/04/01
Vol. E86-D  No. 4 ; pp. 704-711
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
network securitystream authentication protocolstream distribution
 Summary | Full Text:PDF

Further Cryptanalysis of a Password Authentication Scheme with Smart Cards
Hung-Min SUN Her-Tyan YEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/04/01
Vol. E86-B  No. 4 ; pp. 1412-1415
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
password authenticationsmart cardnetwork securityID-based schemecryptanalysis
 Summary | Full Text:PDF

Public Information Server for Tracing Intruders in the Internet
Midori ASAKA Takefumi ONABUTA Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/12/01
Vol. E84-B  No. 12 ; pp. 3104-3112
Type of Manuscript:  Special Section PAPER (Special Issue on Network Software)
Category: Internet Technologies
Keyword: 
intrusion detectionnetwork securitytracing intrudersstepping stones
 Summary | Full Text:PDF

A New Intrusion Detection Method Based on Discriminant Analysis
Midori ASAKA Takefumi ONABUTA Tadashi INOUE Shunji OKAZAWA Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/05/01
Vol. E84-D  No. 5 ; pp. 570-577
Type of Manuscript:  Special Section PAPER (Special Issue on High-speed Internet Technology and its Applications)
Category: 
Keyword: 
intrusion detectiondiscriminant analysismultivariate analysisnetwork securitysystem call
 Summary | Full Text:PDF