1. Domain Name System DNS IP DNS DNS DNS Distributed Denial-of-Service Attack; DDoS [1] Open Resolver Project [2] DNS 53/UDP ,000 DNS S

Size: px
Start display at page:

Download "1. Domain Name System DNS IP DNS DNS DNS Distributed Denial-of-Service Attack; DDoS [1] Open Resolver Project [2] DNS 53/UDP ,000 DNS S"

Transcription

1 DNS DNS 1,2,a) , DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS 33 87% DNS 1 DNS DNS DNS DDoS Correlation Analysis between DNS Honeypot and Darknet toward Proactive Countermeasures against DNS Amplification Attacks Daisuke Makita 1,2,a) Katsunari Yoshioka 1 Tsutomu Matsumoto 1 Junji Nakazato 2 Jumpei Shimamura 3 Daisuke Inoue 2 Received: June 30, 2014, Accepted: November 10, 2014 Abstract: In recent years, problems posed by DNS amplification attacks have become serious and there is a compelling need for effective countermeasures. We have proposed DNS honeypot, a method for observing DNS amplification attacks, and have been conducting the observation and analysis of DNS amplification attacks. In order to conduct DNS amplification attacks, attackers need to know where open resolvers are and therefore it is expected that they conduct network scans for finding open resolvers before conducting amplification attacks. However, since a DNS honeypot requires operational costs to work as a DNS server and it is unfit for large-scale monitoring, it is difficult to grasp the trends of scans for open resolvers by DNS honeypots. In this paper, we compare the DNS amplification attacks that DNS honeypot observed with the scans that darknet sensor observed, and analyze the correlation between them. As a result, out of 33 domain names used for DNS amplification attacks that DNS honeypots observed during the analysis period, 29 domain names (87%) were used for scans that darknet sensor observed, and 22 domain names out of them were observed by darknet sensor one or more days before the actual attacks occurred. From this result, it can be expected to develop proactive countermeasures against DNS amplification attacks using scan information. Keywords: cybersecurity, DNS amplification attack, DNS honeypot, darknet monitoring, DDoS attack prevention c 2015 Information Processing Society of Japan 921

2 1. Domain Name System DNS IP DNS DNS DNS Distributed Denial-of-Service Attack; DDoS [1] Open Resolver Project [2] DNS 53/UDP ,000 DNS Spamhaus [3] DDoS DNS 120 Gbps Tier1 300 Gbps [4] DDoS Prolexic [5] Gbps DNS [6] DNS DNS DNS [7] DNS DNS DNS DNS DNS DNS DNS DNS DNS 2 DNS /16 1 Yokohama National University, Yokohama, Kanagawa , Japan. 2 National Institute of Information and Communications Technology, Koganei, Tokyo , Japan. 3 clwit, Inc., Mitaka, Tokyo , Japan. a) makita-daisuke-jk@ynu.jp 6 DNS DNS DNS DNS DNS DNS DNS DNS DNS 2 DNS DNS 3 DNS DNS 4 DNS DNS DNS DNS DNS Amplifier [8] DNS DNS DNS DNS DNS DoS DNS User Datagram Protocol UDP UDP IP IP IP DNS DNS DoS IP DNS DNS Reflection DNS DNS DDoS DNS UDP DNS DNS c 2015 Information Processing Society of Japan 922

3 情報処理学会論文誌 Vol.56 No (Mar. 2015) 図 2 DNS ハニーポットのアイディア Fig. 2 Idea of DNS honeypot. 図 1 DNS アンプ攻撃 Fig. 1 Model of DNS amplification attack. ション攻撃は同義として使用されることが多い 本論文で は 以降 DNS アンプ攻撃に記述を統一する DNS アンプ攻撃のシナリオを図 1 に示す DNS アンプ 攻撃では 攻撃者が操作するボットネットとインターネット 上に多数存在するオープンリゾルバが利用される [9], [10] 攻撃者は ボットネットを操り 送信元 IP アドレスを攻 撃対象の IP アドレスに詐称した DNS クエリを多数のオー プンリゾルバに送信する オープンリゾルバは詐称された 図 3 DNS ハニーポットと観測システムの構成 IP アドレスに応答を返すが このとき 応答のデータサイ Fig. 3 Architecture of DNS honeypot and observation system. ズが大きくなるドメイン名を要求することにより 攻撃対 象に多量の増幅した応答が集中する その結果 攻撃対象 のネットワーク帯域がオープンリゾルバからの応答で飽和 し サービス不能状態に陥る 2.2 DNS ハニーポット ハニーポットとは 不正使用されることに価値を持つ情 報システム資源であり [14] 不正アクセスの手法やその傾 このように DNS アンプ攻撃は特定のプログラムの脆 向の観測 分析を主な目的する 我々が提案している DNS 弱性を狙う攻撃ではなく 攻撃対象となるネットワークの ハニーポットは DNS アンプ攻撃等の DNS サーバを悪用 帯域等の資源に対する攻撃である DNS アンプ攻撃では する不正活動の観測 分析を主な目的としている 提案シ オープンリゾルバが踏み台として利用されるため 被害者 ステムは 囮 おとり の DNS サーバを中心とするシス は攻撃者の特定が困難である また 踏み台となるオープ テムであり これをインターネット上で運用することによ ンリゾルバの中には 設定の誤りによりオープンリゾルバ り DNS サーバを悪用する不正活動の観測 分析を行う として動作している DNS キャッシュサーバだけでなく DNS アンプ攻撃の観測を想定した場合 図 2 のように オープンリゾルバとして機能する問題を有するネットワー 攻撃者が DNS ハニーポットを攻撃の踏み台として利用す ク機器も存在する [11] ため インターネット上のすべての ることにより 攻撃の観測 分析が可能になる オープンリゾルバに対処することも難しい システムの構成 増幅効果とコネクションレス型の性質をあわせ持つサー DNS ハニーポットと観測システムの構成を図 3 に示す ビスであれば DNS 以外のサービスでも同様の攻撃を実行 DNS ハニーポットは DNS サーバ アクセスコントロー することが可能である 論文 [12] では UDP 上で通信を行 ラ DNS ハニーポットマネージャ の 3 つの要素からな う 14 種類のサービスについて 通信の増幅率等を調査し る DNS サーバは DNS クエリに対して応答する役割を 攻撃に利用可能なサービスを検証している また Prolexic 担い インターネット上の任意のホストから名前解決が 社によると CHARGEN 19/UDP や NTP 123/UDP できるように設定する 次に アクセスコントローラは SNMP 161/UDP 等のサービスが攻撃に悪用されはじ DNS サーバとインターネットの間で動作し DNS サーバ めていると報告されている [13] 本論文では UDP 上で が悪用された場合に外部ネットワークに与える影響を少な サービスを提供する DNS 通信のみを研究の対象とし 他 くするように 通信を制御する役割を担う DNS ハニー のサービスを悪用する攻撃については今後の課題とする ポットマネージャは DNS サーバやアクセスコントローラ の制御 および ログの出力を担当する c 2015 Information Processing Society of Japan 923

4 DNS 3 2 DNS DNS DNS DNS DNS 4 Ubuntu [15] 1 DNS DNS DNS BIND [16] iptables [17] DNS Linux DNS DNS tcpdump [18] BIND tcpdump pcap DNS IP DoS *1 DNS [21], [22] [21] DNS DNS [22] DNS DNS IP DNS DNS DNS DNS DNS 3. DNS DNS DNS 1 DNS Table 1 Overview of DNS honeypots. 2.3 IP [19], [20] 4 DNS Fig. 4 Implementation of DNS honeypot. *1 3 c 2015 Information Processing Society of Japan 924

5 3.1 2 DNS DNS NICTER [23] NONSTOP [24] /16 DNS DNS DNS- HONEY1 DNS-HONEY2 ISP DNS-HONEY DNS-HONEY IP 1 pps Packet Per Second DNS-HONEY1 3 DNS-HONEY2 12 IP 2 Table 2 Overview of darknet sensor. NICTER /16 = 65,536 IP DNS DNS 3 DNS 5 2 DNS 182 6,400 1 DNS 173 8,900 DNS 1 IP 173 1, DNS IP 2 DNS 65,536 IP 6,867 DNS IP DNS 3 DNS DNS Table 3 Overview of DNS queries that DNS honeypots and darknet sensor observed. Fig. 5 5 DNS Changes in the number of DNS queries (Daily). c 2015 Information Processing Society of Japan 925

6 DNS DNS DNS DNS DNS DNS 65,536 IP DNS Table 4 Response sizes and amplification factors of general domain names (as of November 25th, 2013). IP IP 3.3 DNS DNS 10 5 DNS 4 Alexa [27] 10 DNS DNS DNS DNS isc.org [25] ripe.net [26] IP TXT Web 5 DNS DNS 10 Table 5 Information of domain names used for DNS amplification attacks (TOP 10 in descending order of the number of DNS queries). 6 aa3247.com pkts.asia bitstress.com DNS Table 6 First observation date in darknet and observation date of DNS amplification attack (aa3247.com, pkts.asia, bitstress.com). c 2015 Information Processing Society of Japan 926

7 DNS 5 4. DNS DNS DNS DNS DNS DNS DNS DNS IP 100 DNS DNS DNS Fig. 6 6 aa3247.com DNS Changes in the number of DNS queries of aa3246.com. 4.1 DNS DNS DNS 3 aa3247.com pkts.asia bitstress.com DNS aa3247.com aa3247.com DNS 2 DNS IP 54 DNS aa3247.com DNS 6 aa3247.com DNS aa3247.com 1 DNS aa3247.com DNS aa3247.com. DNS pkts.asia pkts.asia DNS 2 DNS 1,200 IP DNS pkts.asia DNS 7 pkts.asia DNS 10 3 pkts.asia DNS DNS pkts.asia 7 pkts.asia DNS Fig. 7 Changes in the number of DNS queries of pkts.asia. 5 6 DNS pkts.asia pkts.asia DNS bitstress.com bitstress.com DNS 2 DNS 17 IP DNS bitstress.com DNS 8 bitstress.com DNS DNS bitstress.com DNS bitstress.com DNS 4.2 DNS DNS 1,000 DNS c 2015 Information Processing Society of Japan 927

8 8 Table 8 Distribution of days from scan to peak of attacks. 8 bitstress.com DNS Fig. 8 Changes in the number of DNS queries of bitstress.com. 7 Table 7 Distribution of days from scan to attack DNS DNS (1) DNS DNS (2) DNS DNS DNS DNS % DNS % DNS DNS 5.1 DNS NXDOMAIN DNS 5 DNS C&C [29] DNS DNS DNS IP ISP IP IP c 2015 Information Processing Society of Japan 928

9 DNS DNS DNS EDNS0 Extension Mechanisms for DNS [30] DNS DNS UDP 512 DNS Google Public DNS [28] isc.org ANY DNS DNS IP 5.3 DNS DNS 9 4 DNS 2 DNS DNS DNS 1 DNS 5.4 DNS DNS TXT DNS DNS DNS ISP DNS DNS DNS DNS DNS DNS 6. DNS DNS DNS DNS DNS DNS DNS c 2015 Information Processing Society of Japan 929

10 DNS DNS DNS DNS DNS DNS DNS DNS / / / NICTER NONSTOP NICTER [1] JPCERT CC DNS DDoS jpcert.or.jp/at/2013/at html [2] Open Resolver Project, available from resolverproject.org/ (accessed ). [3] The Spamhaus Project, available from spamhaus.org/ (accessed ). [4] CloudFlare: The DDoS That Almost Broke the Internet, available from (accessed ). [5] Prolexic Technologies, available from prolexic.com/ (accessed ). [6] Prolexic Technologies: Prolexic Stops Largest-Ever DNS Reflection DDoS Attack, available from prolexic.com/news-events-pr-prolexic-stops-largest-everdns-reflection-ddos-attack-167-gbps.html (accessed ). [7] DNS Vol.2013-CSEC-62, No.54, pp.1 8 (2013). [8] DoS/DDoS Vol.54, No.5, pp (2012). [9] Internet Initiative Japan (IIJ): Internet Infrastructure Review (IIR), Vol.21, pp.28 31, available from html (accessed ). [10] Japan Registry Services JPRS DDoS DNS DNS Amp [11] Japan Vulnerability Note JVN JVN# [12] Rossow, C.: Amplification Hell: Revisiting Network Protocols for DDoS Abuse, Proc Network and Distributed System Security (NDSS) Symposium (2014). [13] Prolexic Technologies: Second white paper in the DrDoS Attacks series: SNMP, NTP and CHARGEN attacks, available from ttacks-drdos-ddos.html (accessed ). [14] Spitzner, L.: Honeypots Definitions and Value of Honeypots, available from com/papers/honeypots.html (accessed ). [15] Ubuntu, available from (accessed ). [16] BIND, available from (accessed ). [17] iptables, available from projects/iptables/ (accessed ). [18] tcpdump, available from (accessed ). [19] Bailey, M., Cooke, E., Jahanian, F., Nazario, J. and Watson, D.: The Internet Motion Sensor: A Distributed Blackhole Monitoring System, Proc. 12th Annual Network and Distributed System Security (NDSS) Symposium (2005). [20] IPA, html [21] Oberheide, J., Karir, M. and Mao, Z.M.: Characterizing Dark DNS Be-havior, DIMVA 2007, LNCS, No.4579, pp (2007). [22] DNS 2013 CSS2013 pp (2013). [23] NICTER, available from (accessed ). [24] NONSTOP Vol.113, No.95, ICSS , pp (2013). [25] Internet Systems Consortium, available from (accessed ). [26] RIPE Network Coordination Centre, available from (accessed ). [27] Alexa, available from (accessed ). [28] Google: Public DNS Google Developers, available from (accessed ). [29] Bilge, L., Kirda, E., Kruegel, C. and Balduzzi, M.: EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis, Proc. 18th Network and Distributed System Security (NDSS) Symposium (2011). [30] Vixie, P.: Extension Mechanisms for DNS (EDNS0) (RFC2671), IETF (online), available from ietf.org/rfc/rfc2671.txt (accessed ). c 2015 Information Processing Society of Japan 930

11 IAS-YNU IACR NICTER CYREC Asia-Pacific Information Security Leadership Achievements c 2015 Information Processing Society of Japan 931

DNS DNS DDoS [2] Open Resolver Project [3] DNS 53/UDP DNS ,800 DNS Spamhaus [4] DDoS DNS 120 Gbps Tier Gbps [5], [6] DDoS Prolex

DNS DNS DDoS [2] Open Resolver Project [3] DNS 53/UDP DNS ,800 DNS Spamhaus [4] DDoS DNS 120 Gbps Tier Gbps [5], [6] DDoS Prolex DNS DNS 1,a) 1 1 2013 12 2, 2014 6 17 Domain Name System DNS IP DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS 1 DNS DNS DNS DNS DNS DNS Observing DNS Amplification Attacks with DNS Honeypot Daisuke

More information

amplification attacks とは 送信元を偽装した dns query による攻撃 帯域を埋める smurf attacks に類似 攻撃要素は IP spoofing amp 2006/07/14 Copyright (C) 2006 Internet Initiative Jap

amplification attacks とは 送信元を偽装した dns query による攻撃 帯域を埋める smurf attacks に類似 攻撃要素は IP spoofing amp 2006/07/14 Copyright (C) 2006 Internet Initiative Jap amplification attacks Matsuzaki Yoshinobu 2006/07/14 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks とは 送信元を偽装した dns query による攻撃 帯域を埋める smurf attacks に類似 攻撃要素は

More information

5 サイバーセキュリティ技術 : 進化する脅威への対策技術と成果展開 5-3 DRDoS 攻撃を観測するハニーポット技術の研究開発 牧田大佑吉岡克成 我々は インターネット上の大きな脅威となっている DRDoS 攻撃を観測するためのハニーポット ( 以降 AmpPot) の研究開発を行っている 本稿

5 サイバーセキュリティ技術 : 進化する脅威への対策技術と成果展開 5-3 DRDoS 攻撃を観測するハニーポット技術の研究開発 牧田大佑吉岡克成 我々は インターネット上の大きな脅威となっている DRDoS 攻撃を観測するためのハニーポット ( 以降 AmpPot) の研究開発を行っている 本稿 5-3 DRDoS 攻撃を観測するハニーポット技術の研究開発 牧田大佑吉岡克成 我々は インターネット上の大きな脅威となっている DRDoS 攻撃を観測するためのハニーポット ( 以降 AmpPot) の研究開発を行っている 本稿では AmpPot の概要を説明するとともに 我々の運用する AmpPot が観測した DRDoS 攻撃を分析し 攻撃の傾向や特徴を示す また AmpPot を応用した DRDoS

More information

DDoS攻撃について

DDoS攻撃について DDoS 攻撃について 2016 年 3 月 1 日 株式会社グローバルネットコア 金子康行 目次 DDoS 攻撃とは DDoS 攻撃が成立する背景 DDoS 攻撃の目的 DDoS 攻撃の状況 DDoS 攻撃の防御手法私たちはどうすればいいのか 2 DDoS 攻撃とは Denial of Service Attack サービス不能攻撃

More information

IPSJ SIG Technical Report Vol.2009-CSEC-46 No /7/2 nicter Conficker nicter Conficker nicter Network Observation and Analysis Re

IPSJ SIG Technical Report Vol.2009-CSEC-46 No /7/2 nicter Conficker nicter Conficker nicter Network Observation and Analysis Re nicter Conficker 1 1 2 1 nicter 28 11 Conficker nicter Network Observation and Analysis Report on nicter Continuous Observaion of Conficker and a Primary Example of Maco-Micro Correlation Analysis Junji

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

ついて説明する.5 章では, 検証実験とその結果について述べる. そして最後に,6 章でまとめと今後の課題とする. 2. DRDoS 攻撃 DRDoS 攻撃とは,TCP/IP プロトコルの基本的な通信手順やアプリケーションの仕様において生成される様々な応答パケットを利用して, 複数のサーバマシンから

ついて説明する.5 章では, 検証実験とその結果について述べる. そして最後に,6 章でまとめと今後の課題とする. 2. DRDoS 攻撃 DRDoS 攻撃とは,TCP/IP プロトコルの基本的な通信手順やアプリケーションの仕様において生成される様々な応答パケットを利用して, 複数のサーバマシンから 複数種類のハニーポットによる DRDoS 攻撃の観測 筒見拓也 野々垣嘉晃 田辺瑠偉 牧田大佑 吉岡克成 松本勉 近年,DNS リフレクション攻撃に代表される分散型サービス不能攻撃, 通称 DRDoS 攻撃 (Distributed Reflection Denial-of-Service attack) が脅威となっている.DRDoS 攻撃は, インターネット上における様々な種類のサービスを悪用するため,

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a 1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

_念3)医療2009_夏.indd

_念3)医療2009_夏.indd Evaluation of the Social Benefits of the Regional Medical System Based on Land Price Information -A Hedonic Valuation of the Sense of Relief Provided by Health Care Facilities- Takuma Sugahara Ph.D. Abstract

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came 3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

Computer Security Symposium October 2015 ハニーポットによる TCP リフレクション攻撃の観測と分析 小出駿 牧田大佑 * 吉岡克成 松本勉 横浜国立大学 横浜国立大学大学院環境情報研究院 / 横浜国立大学先端科学高等研究院

Computer Security Symposium October 2015 ハニーポットによる TCP リフレクション攻撃の観測と分析 小出駿 牧田大佑 * 吉岡克成 松本勉 横浜国立大学 横浜国立大学大学院環境情報研究院 / 横浜国立大学先端科学高等研究院 Computer Security Symposium 2015 21-23 October 2015 ハニーポットによる TCP リフレクション攻撃の観測と分析 小出駿 牧田大佑 * 吉岡克成 松本勉 横浜国立大学 横浜国立大学大学院環境情報研究院 / 横浜国立大学先端科学高等研究院 240-8501 神奈川県横浜市保土ケ谷区常盤台 79-1 {koide-takashi-mx, makita-daisuke-jk}@ynu.jp,

More information

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical 1,a) 2,b) 3 24 3 (1) (2) (3) Development of Mobile Multilingual Medical Communication Support System and Its Introduction for Medical Field Shun Ozaki 1,a) Takashi Yoshino 2,b) Aguri Shigeno 3 Abstract:

More information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,

More information

Microsoft PowerPoint - NICTER_Darknet_2014.pptx

Microsoft PowerPoint - NICTER_Darknet_2014.pptx Darknet 2014 独 政 法 情 報 通 信 研 究 機 構 (NICT) 笠 間 貴 弘 神 薗 雅 紀 Darknet 2014 Darknet 2014 ダークネット( 未 使 IPアドレス) 宛 てのトラフィックデータ 観 測 対 象 はある/20の 連 続 したダークネット 2011 年 4 1 2014 年 3 31 の3 年 間 分 +α NONSTOPを 利 して 提 供 (pcap+db(

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f 1,a) 2 zabbix Consideration of a system to support understanding of fault occurrences based on the similarity of the time series Miyaza Nao 1,a) Masuda Hideo 2 Abstract: With the development of network

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

:... a

:... a Title 発達障害と睡眠困難 に関する研究の動向と課題 ( fulltext ) Author(s) 柴田, 真緒 ; 髙橋, 智 Citation 東京学芸大学紀要. 総合教育科学系, 69(2): 107-121 Issue Date 2018-02-28 URL http://hdl.handle.net/2309/148914 Publisher 東京学芸大学学術情報委員会 Rights

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

AP AP AP AP AP AP AP( AP) AP AP( AP) AP AP Air Patrol[1] Air Patrol Cirond AP AP Air Patrol Senser Air Patrol Senser AP AP Air Patrol Senser AP

AP AP AP AP AP AP AP( AP) AP AP( AP) AP AP Air Patrol[1] Air Patrol Cirond AP AP Air Patrol Senser Air Patrol Senser AP AP Air Patrol Senser AP AP AP 1,a) 2,b) LAN LAN AP LAN AP LAN AP Proposal of a System to Estimate the Location of Unknown Wireless APs by Utilizing the Signal Strength and Location Information of the Known APs Yoshiaki Tahara

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

22 Google Trends Estimation of Stock Dealing Timing using Google Trends

22 Google Trends Estimation of Stock Dealing Timing using Google Trends 22 Google Trends Estimation of Stock Dealing Timing using Google Trends 1135064 3 1 Google Trends Google Trends Google Google Google Trends Google Trends 2006 Google Google Trend i Abstract Estimation

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursi

The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursi The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursing Professionals for Diabetic Outpatients Not Using

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

Webサービス本格活用のための設計ポイント

Webサービス本格活用のための設計ポイント The Web Services are a system which links up the scattered systems on the Internet, leveraging standardized technology such as SOAP, WSDL and UDDI. It is a general thought that in the future business enterprises

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google Drive-by Download 1,a) 1,b) Web Drive-by Download(DbD) DbD Web DbD HTTP DbD Web DbD, Drive-by Download The Network Visualization Tool for detecting the Drive-by Download attacks. Amako Katsuhiro 1,a) Takada

More information

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori Proposal and Characteristics Evaluation of a Power Generation System Utilizing Waste Heat from Factories for Load Leveling Pyong Sik Pak, Member, Takashi Arima, Non-member (Osaka University) In this paper,

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki

More information

ネットワーク化するデジタル情報家電の動向

ネットワーク化するデジタル情報家電の動向 In this broadband era, Information Technology has started at a market targeting home consumers, and upon gaining good achievements there would move on to be used in the business and enterprise markets.

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa

More information

FUJII, M. and KOSAKA, M. 2. J J [7] Fig. 1 J Fig. 2: Motivation and Skill improvement Model of J Orchestra Fig. 1: Motivating factors for a

FUJII, M. and KOSAKA, M. 2. J J [7] Fig. 1 J Fig. 2: Motivation and Skill improvement Model of J Orchestra Fig. 1: Motivating factors for a /Specially issued Original Paper QOL 1 1 A Proposal of Value Co-creation Model to Promote Elderly People s Community Activities Concerning QOL Improvement Case Studies of Successful Social Activities by

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

ブロードバンドルータにおける問題(オープンリゾルバ)の解説、対策の説明

ブロードバンドルータにおける問題(オープンリゾルバ)の解説、対策の説明 Internet Week 2014 DNS のセキュリティブロードバンドルータにおける問題 ( オープンリゾルバ ) の解説 対策の説明 2014 年 11 月 20 日 NECプラットフォームズ株式会社開発事業本部アクセスデバイス開発事業部 川島正伸 Internet Week 2014 T7 DNS のセキュリティ 目次 世間が注目!? 家庭用ルータが引き起こすネット障害 ブロードバンドルータにおけるDNSプロキシ機能とは?

More information

日本感性工学会論文誌

日本感性工学会論文誌 Vol.13 No.2 pp.391-402 2014 PROGRESS Consideration of the Transition in Mitsubishi Electric Corporate Website Design Transition in Response to Environmental Change and Record through the Case of Corporate

More information

IPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte

IPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte Twitter 1 1 1 IME Twitter 2009 12 15 2010 2 1 13590 4.83% 8.16% 2 3 Web 10 45% Relational Analysis between User Context and Input Word on Twitter Yutaka Arakawa, 1 Shigeaki Tagashira 1 and Akira Fukuda

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

SNS GIS Abstract The Tourism-based Country Promotion Basic Act was enacted in Japan over a decade ago. Tourism is expected to be the primary contribut

SNS GIS Abstract The Tourism-based Country Promotion Basic Act was enacted in Japan over a decade ago. Tourism is expected to be the primary contribut SNS GIS Abstract The Tourism-based Country Promotion Basic Act was enacted in Japan over a decade ago. Tourism is expected to be the primary contributing factor toward the economic activation of Japan

More information

..,,...,..,...,,.,....,,,.,.,,.,.,,,.,.,.,.,,.,,,.,,,,.,,, Becker., Becker,,,,,, Becker,.,,,,.,,.,.,,

..,,...,..,...,,.,....,,,.,.,,.,.,,,.,.,.,.,,.,,,.,,,,.,,, Becker., Becker,,,,,, Becker,.,,,,.,,.,.,, J. of Population Problems. pp.,,,.,.,,. Becker,,.,,.,,.,,.,,,,.,,,.....,,. ..,,...,..,...,,.,....,,,.,.,,.,.,,,.,.,.,.,,.,,,.,,,,.,,, Becker., Becker,,,,,, Becker,.,,,,.,,.,.,, ,,, Becker,,., Becker,

More information

2 122

2 122 32 2008 pp. 121 133 1 Received November 4, 2008 The aim of this paper is to clarify some profound changes in the language used in the visual media, especially in TV news programs in Japan, and show what

More information

DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2

DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2 DNS 2002 12 19 2003 1 16 Internet Week 2002/DNS DAY ( ) (JPRS) DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2 DNS SOA SOA TTL $TTL NS MX CNAME 2002/12/19 Internet Week 2002/DNS DAY

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

XMLを基盤とするビジネスプロトコルの動向

XMLを基盤とするビジネスプロトコルの動向 XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information

Core Ethics Vol.

Core Ethics Vol. Core Ethics Vol. < > Core Ethics Vol. ( ) ( ) < > < > < > < > < > < > ( ) < > ( ) < > - ( ) < > < > < > < > < > < > < > < > ( ) Core Ethics Vol. ( ) ( ) ( ) < > ( ) < > ( ) < > ( ) < >

More information

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi

More information

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum 1 2 1 3 PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fumio Sugai, 1 Masami Ikeda, 2 Naonobu Okazaki 1 and Mi RangPark 3 In recent years,

More information

いきなりすいません 本日は DNSSEC 2013 スプリングフォーラムですが DNSSEC の話はしません

いきなりすいません 本日は DNSSEC 2013 スプリングフォーラムですが DNSSEC の話はしません DNS Response Rate Limi0ng (DNS RRL) IIJ 山口崇徳 いきなりすいません 本日は DNSSEC 2013 スプリングフォーラムですが DNSSEC の話はしません DNS amplifica0on a?ack 先日 重複をお許しください が出ましたね h?p://jprs.jp/tech/no0ce/2013-04- 18- reflector- a?acks.html

More information

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website by the author(s) under the agreement with the IPSJ.

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11

2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11 1-122013 1 2 1 2 20 2,000 2009 12 1 2 1,362 68.1 2009 1 1 9.5 1 2.2 3.6 0.82.9 1.0 0.2 2 4 3 1 2 4 3 Key words acupuncture and moxibustion Treatment with acupuncture, moxibustion and Anma-Massage-Shiatsu

More information

農研機構 食品総合研究所 研究報告 77号

農研機構 食品総合研究所 研究報告 77号 Rep. Natl Food Res. InstNo 技 術 報 告 食 品 害 虫 サイトの 長 期 間 アクセス 解 析 --- A Long-Term Analysis of Access Trend to Food-Insect Site Yukio Magariyama, Kumiko Shichiri, Akihiro Miyanoshita, Taro Imamura, Satoshi

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

16_.....E...._.I.v2006

16_.....E...._.I.v2006 55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

:- Ofer Feldman,Feldman : -

:- Ofer Feldman,Feldman : - - -- E-mail: nkawano@hiroshima-u.ac.jp : - :- Ofer Feldman,Feldman : - : : : Mueller : - Mueller :.. : ... :........ .. : : : - : Kawano & Matsuo: - : - : - : : No. Feldman, Ofer (), The Political

More information

Web-ATMによる店舗向けトータルATMサービス

Web-ATMによる店舗向けトータルATMサービス Web- Total Service for Stores by Web- 土田敬之 阿久津和弘 山本耕司 高木晋作 川端正吾 幾見典計 あらまし Automated Teller Machine 2002 2004 Web- 2013 3 5 4400 Web- Abstract Automated teller machines (s) for financial institutions have

More information

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada Social Influences and Legal Issues of Google Street View Hiroshi Takada Sanno University Bulletin Vol. No. September Social Influences and Legal Issues of Google Street View Hiroshi Takada In this paper,

More information

:

: An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would

More information

Vol.54 No (May 2013) 7 1,a) , e e Factors and Strategies for Accelerating the Diffusion of Electronic Money Based

Vol.54 No (May 2013) 7 1,a) , e e Factors and Strategies for Accelerating the Diffusion of Electronic Money Based 7 1,a) 2 2012 7 4, 2013 2 1 7 5 8 e e Factors and Strategies for Accelerating the Diffusion of Electronic Money Based on a Consumer Survey in Seven Regions in Japan Kazuo Watabe 1,a) Kunihiko Iwasaki 2

More information

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima

More information

IIS RealSecure Network Sensor 6.5 IDS, IBM Proventia G200 IDS/IPS, FortiNetwork FortiGate-310B, FortiGate-620B UTM, BivioNetwork Bivio 7512 DPI Nokia

IIS RealSecure Network Sensor 6.5 IDS, IBM Proventia G200 IDS/IPS, FortiNetwork FortiGate-310B, FortiGate-620B UTM, BivioNetwork Bivio 7512 DPI Nokia L2/L3 1 L2/L3 A study of the transparent firewalls using L2/L3 switching devices Hideaki Tsuchiya 1 The transparent firewalls are the useful security devices, that are capable to sit in-line without changing

More information

28 TCG SURF Card recognition using SURF in TCG play video

28 TCG SURF Card recognition using SURF in TCG play video 28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka

More information

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki Pitman-Yor Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Akira Shirai and Tadahiro Taniguchi Although a lot of melody generation method has been

More information

電子マネーと通信産業の戦略

電子マネーと通信産業の戦略 No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe

More information

平常時火災における消火栓の放水能力に関する研究

平常時火災における消火栓の放水能力に関する研究 Discharge Ability of Hydrant to Ordinary Fire Yoshiro Namba *1,Kenjiro Yasuno *2,Yoshiteru Murosaki *3,Akihiko Hokugo *4, Masahiro Fujiwara *5, Akihiro Kasuya *6,Hideo Matsuoka* 7 * 1 Department of Architecture,

More information

041-057_’¼Œì

041-057_’¼Œì 542012 4157 Nishino Toshiaki The purpose of this paper is to analyze the present conditions of the mountain villages of Japan in the early 21 st century. The revolution of fuel sources from a predominance

More information

<30315F836D815B83675F95D08BCB8E812E696E6464>

<30315F836D815B83675F95D08BCB8E812E696E6464> Sociological Essays 7 : Anticipating changes in an opaque society Shinji KATAGIRI Abstract After the Great East Japan Earthquake, it became very difficult to predict the future of Japanese society. However,

More information

SERPWatcher SERPWatcher SERP Watcher SERP Watcher,

SERPWatcher SERPWatcher SERP Watcher SERP Watcher, SERPWatcher 112-8610 2-1-1 112-8610 2-1-1 229-8558 5-10-1 E-mail: nakabe@db.is.ocha.ac.jp, chiemi@is.ocha.ac.jp SERPWatcher SERP Watcher SERP Watcher, SERP Analysis of transition of ranking in SERP Watcher

More information

NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for

NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for SIP utilizing NAT-f Kenkichi Miura, 1 Hidekazu Suzuki

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

<332D985F95B62D8FAC93638BA795DB90E690B62E706466>

<332D985F95B62D8FAC93638BA795DB90E690B62E706466> No.50 pp.5568, 2014 Komazawa Journal of Geography Geography of Religion in Postwar Japan (2) ODA Masayasu 1 10 200211 1219972006 Keywords: geography of religion, Bibliography of Geography, Islam, sacred

More information

The Indirect Support to Faculty Advisers of die Individual Learning Support System for Underachieving Student The Indirect Support to Faculty Advisers of the Individual Learning Support System for Underachieving

More information