Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Thre

Size: px
Start display at page:

Download "Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Thre"

Transcription

1 16 DNS DNS (Domain Name System) IP 2 (DNS ) (Probabilistic Threat Propagation) DNS DNS 69% 1 ( ) DNS 9% 40% DNS 2,170 DNS This paper proposes a method to estimate malicious domain names from a large scale DNS query response dataset. The key idea of the work is to leverage the use of DNS graph that is a bipartite graph consisting of domain names and corresponding IP addresses. We apply a concept of Probabilistic Threat Propagation (PTP) on the graph with a set of predefined benign and malicious node to a DNS graph obtained from DNS queries at a backbone link. The performance of our proposed method (EPTP) outperformed that of an original PTP method (9% improved) and that of a traditional method using N-gram (40% improved) in an ROC analysis. We finally estimated 2,170 of new malicious domain names with EPTP. 1 Domain Name System (DNS) ( ) IP DNS IP DNS DNS Detecting Malicious Domains with Probabilistic Threat Propagation on DNS Graph. Yuta Kazato, Toshiharu Sugawara,, Waseda University. Kensuke Fukuda, /, National Institute of Informatics / Sokendai., Vol.33, No.3(2016), pp [ ] IP IP C&C IP DNS ( )

2 Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Threat Propagation; PTP) DNS IP 2 (DNS ) ( 1) ( IP ) 3 DNS PTP EPTP (Extended PTP) 9% (N-gram ) 40% 2 (1) PTP EPTP (2) DNS DNS DNS DNS 1 DNS Top Level Domain (TLD) (.jp) Second Level Domain (SLD) (, co.jp) IP ( ) gtld (.com,.net) cctld (.cn,.jp) 60 85% [8] [10] [24] 50% TLD [12] gtld.com.net [20] cctld.cn [25] 90% gtld DNS 1 [13] TLD DDoS( ) Exposure [7] Kopis [3] Notos [2] Exposure [7] time to live (TTL) 15 3,000

3 18 Kopis [3] DDoS Notos [2] [14] DNS SVM [26] Domain Generation Algorithm (DGA) (N-gram) K-L DGA [15] Jaccard index C&C NX ( ) [27] [4] NX DGA [23] DGA DNS [28] DNS [22] Fast-flux DNS IP Flux (CDN ) [16] [6] NX DNS failure graph [16] 3G [19] [11] [9] Manadhata [19] HTTP DNS Polonium [11] Machine File 2 Probability Threat Propagation (PTP) [9] web proxy IP URL IP PTP PTP [9] DNS DNS (DNS) DNS DNS A IP

4 Vol. 33 No. 3 Aug DNS ( 1) G X E G = (X, E) IP IP IP i IP j i IP j (e ij E) 1 IP 1 IP ( CDN) 1 IP 1 IP ( ) DNS [5] IP 0 x j 1 O(N 2 ) 1 1 k 2 P k (x i) = w ij(p k 1 (x j) C k 1 (x i, x j)) j N(x i ) (2) P k (x i ) k x i P k 1 (x j) k 1 x i x j C k 1 (x i, x j ) k 1 x i x j C k 1 x i x j k x j x i 3. 2 EPTP PTP [9] (Malicious ) {malicious} P (x malicious) = γ PTP G x i 1 P (x i ; G) = w ij P (x j x i = 0; G) (1) j N(x i ) 1 N(x i ) x i w ij i j P (x j x i = 0; G) x i 2 k C k 1 3 C k 1 (x i, x j ) = w ji (P k 2 (x i )) (3) w ij 4 w ij = 1 N(x i ) e ij E 0 e ij E (4) PTP Alexa [1] DNS Alexa {benign}

5 20 Require: W, {malicious}, {benign}, γ, β 1: P α N, P (malicious) γ, P (benign) β, C 0 N N 2: repeat 3: T W diag(p ) 4: C T W C T 5: P < C, 1 > 6: C(malicious, ) 0, C(benign, ) 0 7: P (malicious) γ, P (benign) β 8: until P has converged 9: return P (A(i, j) B(i, j)) {malicious} P (malicious) γ {benign} P (benign) β 0 0 T W diag(p ) (diag(p ) P N N ) T W C T 2 2 Extended Probability Threat Propagation C C P =< C, 1 > {benign} Benign Malicious 1 PTP Malicious γ [0,1] 0 EPTP β > 0 γ < 0 α = γ+β 2 P (x) γ P (x) < α P (x) γ α < P (x) β P (x) β Benign β = 1 Malicious γ = β = 1 α = γ+β 2 = 0 ( 2) EPTP 2 N P R N (P (i) = P (x i )) W R N N T R N N (T (i, j) = W (i, j) P (j)) C R N N, C = T W C T A B 1 EPTP (<, > 1 N 1 ) P {malicious} {benign} P C x x {malicious}, {benign} EPTP 1 P P x k PTP DNS DNS 1 DNS tcpdump UDP port

6 Vol. 33 No. 3 Aug Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains /05 11/12 11/19 11/ /05 11/12 11/19 11/ /05 11/12 11/19 11/ /11 11/18 11/25 Time (JST 2013) Time (JST 2013) Time (JST 2013) Time (JST 2013) (a) (b) Benign (c) Malicious (d) Suspicious 3 IN KEEP OUT 24 DNS (A ) IP DNS 1,348,547, IP 2,417,727 3,917, DNS (Malicious) malwaredomains.com [18] uribl.com [21] (Malicious ) (Benign) Alexa [1] (Alexa ) 30,000 30,653 Alexa DGA 5 DNS DNS 5. 1 DNS 1 DNS k k 1 KEEP k 1 k OUT k 1 k IN DNS (All) (Malicious) (Benign) DNS IN KEEP OUT 3 (a) (c) 30,000 30,653 KEEP IN OUT 1 65% KEEP KEEP ( 71.8%) IN OUT ( 51.4%)

7 22 1 KEEP IN OUT KEEP IN OUT ALL 65.9% 17.1% 17.1% Benign 71.8% 14.1% 14.1% Malicious 48.6% 25.8% 25.6% Suspicious 65.3% 17.4% 17.2% 2 DNS d = 1 d = 24 1,271,975 3,766, ,266 1,348,547 IP 603,709 2,417,727 1,199,612 3,917, , , DNS 2013/11/05 1 (d = 1) 2013/11/ (d = 24) 2 DNS d=1 DNS DNS d = 24 d=1 DNS IP DNS d= 24 DNS 4 75% IP 1 1 d=24 70% Frequency Number of nodes 3 10 (d = 24) No. IP Benign Malicious 1 778,279 1,832, , , , , , , , , , % (d=24) 1 IP IP 2 spmode.ne.jp pandaworld.ne.jp 1

8 Vol. 33 No. 3 Aug d=1 d=24 567,663 2,610, , ,279 IP 218,082 1,832, ,706 3,095, (%) (%) ave med B B 912, ,422, M M 13, , B M 343, ,911, U U 2,738, ,226, IP 4 DNS 20 2 Frequency Benign-Benign Malicious-Malicious Benign-Malicious Unknown-Unknown Node distance d=24 d= DNS (d= ) 3 d=1 d=24 2 (B B) (B M) 8.4 (M M) % IP (B B) 5. 3 d=1 Benign Malicious Unknown 5 5 B B, M M, B M, U U Benign Malicious Benign Malicious Unknown (B M) Unknown (U U) B M 6 EPTP EPTP PTP, N-gram EPTP DNS

9 24 Ratio TPR 0.0 FPR Threshold True Positive Rate cv-Original PTP 10-cv-Extended PTP cv-Original PTP 5-cv-Extended PTP 0.00 Bigram-based False Positive Rate ROC (k-fold cross validation) 6. 1 EPTP 2,000, 1,973 k-fold cross validation (CV) (k = 5, 10) DNS 1 10-fold CV P (x) TPR (True Positive Rate) FPR (False Positive Rate) 6 TPR τ = 0 TPR 90% FPR τ = 0 FPR TLD biz net info SLD DGA Receiver Operatorating Characteristic (ROC) (EPTP) (PTP) N-gram [17] [26] 7 10-fold CV ROC EPTP FPR PTP TPR Time (s) / Memory (MiB) Memory (MiB) Time (s) Number of nodes EPTP EPTP TPR fold CV 10-fold CV ROC 10-fold CV N-gram 40% 1,000 10, ,000 1,000,000 EPTP 8 (CPU: Intel Xeon X GHz; Memory 32GB) 10

10 Vol. 33 No. 3 Aug c4brcwmg.biz info-ezweb-ne-jp.info poohpoohhany.info bvncm-kdkdkgree.jp nomoguz.su kisjehmbga.jp google-play.jp IP EPTP IP 1 IP IP IP 7 9 ( :, : IP : ) 6. 2 DNS d=24 DNS EPTP 6 FPR 0 τ = IP 2,170 IP 12,884 6 EPTP (τ = 0.1) IN KEEP OUT 6. 2 EPTP Suspicious IN KEEP OUT ( 3 (d) 1) Suspicious ALL IN KEEP OUT IN KEEP OUT Suspicious Malicious DGA 6 Suspicious DGA DNS 5 5 2

11 26 PTP DNS DNS IP DNS, d= DNS DNS DNS 69% 1 IP IP 7. 3 EPTP [9] PTP Alexa 10-fold CV FPR (=0.016) 8% 90.4% ( 7) EPTP 6 τ = 0 DNS 8 10 DNS 5-fold CV 10-fold CV 6 τ 0.1 2,170 ( 6) DGA google-play.jp N-gram EPTP ( 9) IP IP

12 Vol. 33 No. 3 Aug DNS A PTP DNS 1 EPTP DNS 90.4% 2,170 Malicious Alaxa (15H02699) (EU) FP7 ( :NECOMA) [ 1 ] Alexa: Alexa [Online], topsites/. [ 2 ] Antonakakis, M., Perdisci, R., Dagon, D., Lee, W. and Feamster, N.: Building a Dynamic Reputation System for DNS, in Proceedings of USENIX security symposium, 2010, pp [ 3 ] Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou II, N. and Dagon, D.: Detecting Malware Domains at the Upper DNS Hierarchy, in Proceedings of USENIX Security Symposium, 2011, pp [ 4 ] Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou II, N., Abu-Nimeh, S., Lee, W. and Dagon, D.: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware, in Proceedings of USENIX Security Symposium, 2012, pp [ 5 ] Arkko, J., Cotton, M. and Vegoda, L.: IPv4 Address Blocks Reserved for Documentation, RFC 5737, January [ 6 ] Bar, A., Paciello, A. and Romirer-Maierhofer, P.: Trapping botnets by DNS failure graphs: validation, extension and application to a 3G network, in Proceedings of TMA 13, IEEE, 2013, pp [ 7 ] Bilge, L., Sen, S., Balzarotti, D., Kirda, E. and Kruegel, C.: EXPOSURE: a passive DNS analysis service to detect and report malicious domains, ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 4(2014), p. 14. [ 8 ] Brownlee, N., Claffy, K. and Nemeth, E.: DNS measurements at a root server, in Proceedings of GLOBECOM 01, Vol. 3, IEEE, 2001, pp [ 9 ] Carter, K. M., Idika, N. and Streilein, W. W.: Probabilistic threat propagation for malicious activity detection, in Proceedings of ICASSP 13, IEEE, 2013, pp [10] Castro, S., Wessels, D., Fomenkov, M. and Claffy, K.: A Day at the Root of the Internet, ACM SIGCOMM Computer Communication Review, Vol. 38, No. 5(2008), pp [11] Chau, D., Nachenberg, C., Wilhelm, J., Wright, A. and Faloutsos, C.: Polonium: Tera-scale graph mining and inference for malware detection, in Proceedings of SIAM International Conference on Data Mining, Vol. 2, [12] Gao, H., Yegneswaran, V., Chen, Y., Porras, P., Ghosh, S., Jiang, J. and Duan, H.: An empirical reexamination of global DNS behavior, in Proceedings of SIGCOMM 13, ACM, 2013, pp [13] Hao, S., Feamster, N. and Pandrangi, R.: Monitoring the initial DNS behavior of malicious domains, in Proceedings of IMC 11, ACM, 2011, pp [14] Ishibashi, K. and Sato, K.: Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy, in Proceedings of World Telecommunications Congress (WTC 12), 2012, pp [15] Ishibashi, K., Toyono, T., Hasegawa, H. and Yoshino, H.: Extending black domain name list by using co-occurrence relation between DNS queries, IEICE Transactions on Communications, Vol. 95, No. 3(2012), pp [16] Jiang, N., Cao, J., Jin, Y., Li, L. E. and Zhang, Z.-L.: Identifying suspicious activities through DNS failure graph analysis, in Proceedings of ICNP 10, IEEE, 2010, pp [17] Kazato, Y., Fukuda, K. and Sugawara, T.: To-

13 28 wards classification of DNS erroneous queries, in Proceedings of AINTEC 13, ACM, 2013, pp [18] Malware Domain Blocklist: DNS-BH Malware Domain Blocklist, com/. [19] Manadhata, P. K., Yadav, S., Rao, P. and Horne, W.: Detecting Malicious Domains via Graph Inference, in Proceedings of ESORICS 14, Springer, 2014, pp [20] Osterweil, E., McPherson, D., DiBenedetto, S., Papadopoulos, C. and Massey, D.: Behavior of DNS Top Talkers, a. com/. net View, in Proceedings of PAM 12, Springer, 2012, pp [21] P. Vixie: Traltime URI Blacklist, com/. [22] Perdisci, R., Corona, I., Dagon, D. and Lee, W.: Detecting malicious flux service networks through passive analysis of recursive DNS traces, in Proceedings of ACSAC 09, IEEE, 2009, pp [23] Schiavoni, S., Maggi, F., Cavallaro, L. and Zanero, S.: Phoenix: DGA-based botnet tracking and intelligence, in Proceedings of DIMVA 14, Springer, 2014, pp [24] Wessels, D. and Fomenkov, M.: Wow, that s a lot of packets, in Proceedings of PAM 03, [25] Xuebiao, Y., Xin, W., Xiaodong, L. and Baoping, Y.: DNS measurements at the.cn TLD servers, in Proceedings of FSKD 09, Vol. 7, 2009, pp [26] Yadav, S., Reddy, A., Reddy, A. and Ranjan, S.: Detecting algorithmically generated malicious domain names, in Proceedings of IMC 10, ACM, 2010, pp [27] Yadav, S. and Reddy, A. N.: Winning with DNS failures: Strategies for faster botnet detection, in Proceedings of SecureCom 12, Springer, 2012, pp [28],,, : DNS,. IOT, No. 21(2009), pp ( ( )) (2002) ( ; ) / ( ) 1982., ,.,.,,,,. ( ).,,,, ISOC IEEE, ACM, AAAI.

DNS: Domain Name

DNS: Domain Name 2012 DNS 2012 8 2 5110B140-4 1 5 1.1..................................... 5 1.2..................................... 6 1.3.................................... 6 2 DNS: Domain Name System 7 2.1...................................

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

1 PCAP PCAP PCAP IP K Wv(t + 1) = Wv(t) + (v; t)a(t)(d(t)!wv(t)) 16: standard find query 6:random ID choice NA ms-sql 1782 ssh t

1 PCAP PCAP PCAP IP K Wv(t + 1) = Wv(t) + (v; t)a(t)(d(t)!wv(t)) 16: standard find query 6:random ID choice NA ms-sql 1782 ssh t Computer Security Symposium 2013 21-23 October 2013 okino@itc.u-toyama.ac.jp katayama@magi.co.jp ruo@nict.go.jp 22,168,821 Geographical classification of malicious packets using self-organization map Koji

More information

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/

More information

Web Web Web Web Web IP

Web Web Web Web Web IP 2012 Web 2013 2 1 5111B073-1 1 5 1.1... 5 1.2... 6 1.3... 6 2 Web 8 2.1 Web... 8 2.2 Web... 9 2.2.1... 9 2.2.2 Web... 10 2.2.3 Web... 11 3 13 3.1... 13 3.2... 15 3.2.1 IP... 15 3.2.2 WHOIS... 17 3.2.3

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree LAN 1 2 3 2 LAN WiFiTag WiFiTag LAN LAN 100% WiFi Tag An Improved Determination Method with Multiple Access Points for Relative Position Estimation Using Wireless LAN Abstract: We have proposed a WiFiTag

More information

修士論文

修士論文 27 Mobile Ad Hoc Networks An Ant-based Routing Algorithm with Multi-phase Pheromone and Power-saving in Mobile Ad Hoc Networks 14T0013 Shohei Miyashita E-mail: shohei.miyashita.4j@stu.hosei.ac.jp : Abstract

More information

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki Pitman-Yor Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Akira Shirai and Tadahiro Taniguchi Although a lot of melody generation method has been

More information

IRC IRC HTTP P2P HTTP P2P IRC 1993 [1] IRC C&C [2], [3] [2] IRC C&C 16 3 [3] IRC IRC / n-gram 2003 C&C P2P [1] P2P P2P PeerShark [4] [4] IRC P2P HTTP

IRC IRC HTTP P2P HTTP P2P IRC 1993 [1] IRC C&C [2], [3] [2] IRC C&C 16 3 [3] IRC IRC / n-gram 2003 C&C P2P [1] P2P P2P PeerShark [4] [4] IRC P2P HTTP C&C 1,2, 1 1,2 2,3,a) 1,2 2014 12 8, 2015 6 5 Command and Control C&C 1 C&C C&C C&C C&C C&C C&C C&C C&C Evaluation of Machine Learning Techniques for C&C Traffic Classification Kazumasa Yamauchi 1,2, 1

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

DDoS Distributed Denial of Service Attack [1], [2] [3] [4] 1.2 [5], [6] [7], [8] IRC IRC IRC IRC IRC IRC IRC IRC IRC Dews [9] M

DDoS Distributed Denial of Service Attack [1], [2] [3] [4] 1.2 [5], [6] [7], [8] IRC IRC IRC IRC IRC IRC IRC IRC IRC Dews [9] M 1,2,a) 2,3,b) 1,2,c) 1,2,d) 2012 6 29, 2012 12 7 IRC IRC IRC IRC IRC IRC IRC IRC A Bot Detection Method Using Hierarchical Clustering Based on Mechanical Communication Behavior Model Seiichiro Mizoguchi

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

[2][3][4][5] 4 ( 1 ) ( 2 ) ( 3 ) ( 4 ) 2. Shiratori [2] Shiratori [3] [4] GP [5] [6] [7] [8][9] Kinect Choi [10] 3. 1 c 2016 Information Processing So

[2][3][4][5] 4 ( 1 ) ( 2 ) ( 3 ) ( 4 ) 2. Shiratori [2] Shiratori [3] [4] GP [5] [6] [7] [8][9] Kinect Choi [10] 3. 1 c 2016 Information Processing So 1,a) 2 2 1 2,b) 3,c) A choreographic authoring system reflecting a user s preference Ryo Kakitsuka 1,a) Kosetsu Tsukuda 2 Satoru Fukayama 2 Naoya Iwamoto 1 Masataka Goto 2,b) Shigeo Morishima 3,c) Abstract:

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

1

1 5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of

More information

untitled

untitled 580 26 5 SP-G 2011 AI An Automatic Question Generation Method for a Local Councilor Search System Yasutomo KIMURA Hideyuki SHIBUKI Keiichi TAKAMARU Hokuto Ototake Tetsuro KOBAYASHI Tatsunori MORI Otaru

More information

1 : Google Amazon Facebook Akamai Hyper giants Web [1] Web Web Web Magnitude Exploit Kit PHP.net Web Yahoo 600 [2] Web URL Blacklist URL Blacklist URL

1 : Google Amazon Facebook Akamai Hyper giants Web [1] Web Web Web Magnitude Exploit Kit PHP.net Web Yahoo 600 [2] Web URL Blacklist URL Blacklist URL Computer Security Symposium 2014 22-24 October 2014 URL URL NTT 169-8555 3-4-1 180-8585 3-9-11 {sunshine,mori}@nsl.cs.waseda.ac.jp {akiyama.mitsuhiro, yagi.takeshi}@lab.ntt.co.jp Web URL URL URL URL URL

More information

CSIS (No.324) {kazuya-o, okuda, 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geograp

CSIS (No.324) {kazuya-o, okuda, 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geograp CSIS (No.324) {kazuya-o, okuda, suguru}@is.naist.jp 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geographically Aggregatable Location-based Multicast Address)

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

untitled

untitled 2011 2 9 Akamai Technologies, Inc., et al., Plaintiff Appellant, v. Limelight Networks, Inc., Defendant-Cross Appellant. 1 ( ) 2 3 CAFC BMC 4 (control or 3 Aro Mfg. Co. v. Convertible Top Replacement Co.,

More information

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo 1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

ict4.key

ict4.key IP IP IP IP IP IPv4 32 0-1 IPv6 128 0-1 Web IP 192.47.204.101 IP addressing IP IP IP DNS daito.ac.jp st.daito.ac.jp ic.daito.ac.jp jm.daito.ac.jp DNS =host name....tld www.daito.ac.jp, www.google.com,

More information

DNS DNS DDoS [2] Open Resolver Project [3] DNS 53/UDP DNS ,800 DNS Spamhaus [4] DDoS DNS 120 Gbps Tier Gbps [5], [6] DDoS Prolex

DNS DNS DDoS [2] Open Resolver Project [3] DNS 53/UDP DNS ,800 DNS Spamhaus [4] DDoS DNS 120 Gbps Tier Gbps [5], [6] DDoS Prolex DNS DNS 1,a) 1 1 2013 12 2, 2014 6 17 Domain Name System DNS IP DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS 1 DNS DNS DNS DNS DNS DNS Observing DNS Amplification Attacks with DNS Honeypot Daisuke

More information

Intrusion Detection Method using Online Learning by Kouki Takahata BA Thesis at Future University Hakodate, 2017 Advisor: Ayahiko N

Intrusion Detection Method using Online Learning by Kouki Takahata BA Thesis at Future University Hakodate, 2017 Advisor: Ayahiko N 28 1013251 29 1 31 Intrusion Detection Method using Online Learning by Advisor: Ayahiko Niimi Department of Media Architecture Future University Hakodate January 31, 2017 Abstract Cyber-attacks such as

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

Mining Social Network of Conference Participants from the Web

Mining Social Network of  Conference Participants from the Web Social Network Mining Social network Semantic Web, KM, Our lives are enormously influenced by relations to others. SNS Mixi, myspace, LiveJournal, Yahoo!360 FOAF WebBlog Web mining Social network mining

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal 1 2 3 A projection-based method for interactive 3D visualization of complex graphs Masanori Takami, 1 Hiroshi Hosobe 2 and Ken Wakita 3 Proposed is a new interaction technique to manipulate graph layouts

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for

NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for SIP utilizing NAT-f Kenkichi Miura, 1 Hidekazu Suzuki

More information

浜松医科大学紀要

浜松医科大学紀要 On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse

More information

2 1 1 http://www.jpo.go.jp/indexj.htm International Patent Classification European Patent Classification JST Online Information System Derwent World Patent Index The Scientific and Technical Information

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

IPSJ SIG Technical Report Vol.2009-DBS-149 No /11/ Bow-tie SCC Inter Keyword Navigation based on Degree-constrained Co-Occurrence Graph

IPSJ SIG Technical Report Vol.2009-DBS-149 No /11/ Bow-tie SCC Inter Keyword Navigation based on Degree-constrained Co-Occurrence Graph 1 2 1 Bow-tie SCC Inter Keyword Navigation based on Degree-constrained Co-Occurrence Graph Satoshi Shimada, 1 Tomohiro Fukuhara 2 and Tetsuji Satoh 1 We had proposed a navigation method that generates

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 : Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]

More information

DEIM Forum 2010 A Web Abstract Classification Method for Revie

DEIM Forum 2010 A Web Abstract Classification Method for Revie DEIM Forum 2010 A2-2 305 8550 1 2 305 8550 1 2 E-mail: s0813158@u.tsukuba.ac.jp, satoh@slis.tsukuba.ac.jp Web Abstract Classification Method for Reviews using Degree of Mentioning each Viewpoint Tomoya

More information

Internet Week '98 (c) JPNIC, NTTPC, moto kawasaki WP, niana, wwtld Internet Governance Moto JPNIC DOM-WG / NTTPC 9

Internet Week '98 (c) JPNIC, NTTPC, moto kawasaki WP, niana, wwtld Internet Governance Moto JPNIC DOM-WG / NTTPC 9 Internet Week '98 (c) JPNIC, NTTPC, moto kawasaki 1998 1 WP, niana, wwtld Internet Governance Moto Kawasaki(kawasaki@nic.ad.jp) JPNIC DOM-WG / NTTPC 98/Dec/15 Internet Governance IANA IP address AS number

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

インターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show

インターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo ShowNet syslog Proposal of the anomaly detection method analyzing syslog data using Bollinger Bands algorithm on event network Hiroshi Abe 1,2,a) Mikifumi

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数 Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 takaken@ol.inf.uec.ac.jp {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i 25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time

More information

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The

More information

DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2

DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2 DNS 2002 12 19 2003 1 16 Internet Week 2002/DNS DAY ( ) (JPRS) DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2 DNS SOA SOA TTL $TTL NS MX CNAME 2002/12/19 Internet Week 2002/DNS DAY

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL 1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis 1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly

More information

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta 1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness

More information

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe

More information

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i 27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification

More information

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S 1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro

More information

main.dvi

main.dvi FDTD S A Study on FDTD Analysis based on S-Parameter 18 2 7 04GD168 FDTD FDTD S S FDTD S S S S FDTD FDTD i 1 1 1.1 FDTD.................................... 1 1.2 FDTD..................... 3 2 S 5 2.1 FDTD

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

Key Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic

More information

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter ,a),2,3 3,4 CG 2 2 2 An Interpolation Method of Different Flow Fields using Polar Interpolation Syuhei Sato,a) Yoshinori Dobashi,2,3 Tsuyoshi Yamamoto Tomoyuki Nishita 3,4 Abstract: Recently, realistic

More information

22 / ( ) OD (Origin-Destination)

22 / ( ) OD (Origin-Destination) 23 2 15 22 / ( ) OD (Origin-Destination) 1 1 2 3 2.1....................................... 3 2.2......................................... 3 2.3.......................................... 5 2.4............................

More information

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy 1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura

More information

Elastic stack Jun Ohtani 1

Elastic stack Jun Ohtani 1 Elastic stack Jun Ohtani 2017/12/06 @johtani 1 about Me, Jun Ohtani / Technical Advocate lucene-gosen ElasticSearch Server http://blog.johtani.info Elasticsearch, founded in 2012 Products: Elasticsearch,

More information

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

JFE.dvi

JFE.dvi ,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho

More information

人工知能学会研究会資料 SIG-KBS-B Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki Graduate School of Integrated B

人工知能学会研究会資料 SIG-KBS-B Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki Graduate School of Integrated B 人工知能学会研究会資料 SIG-KBS-B508-09 Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki 2 1 1 Graduate School of Integrated Basic Sciences, Nihon University 2 2 College of Humanities

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS...

1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS... 2015 User-AgentDNS 2016 2 1 5114F058-7 1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS......................................

More information

悪性Webサイト探索のための効率的な巡回順序の決定法

悪性Webサイト探索のための効率的な巡回順序の決定法 2012 年度修士論文審査 悪性 Web サイト探索のための 効率的な巡回順序の決定法 千葉大紀 学籍番号 : 5111B073-1 指導 : 後藤滋樹教授 Feb. 8, 2013 Daiki Chiba, Goto Lab. 1 種類別 査読付国際会議 国内学会発表 国内学会発表 国内学会発表 本論文に関わる研究業績 (2013 年 2 月現在 ) 題名 発表 発行掲載誌名 発表 発行年月 連名者

More information

[1] [3]. SQL SELECT GENERATE< media >< T F E > GENERATE. < media > HTML PDF < T F E > Target Form Expression ( ), 3.. (,). : Name, Tel name tel

[1] [3]. SQL SELECT GENERATE< media >< T F E > GENERATE. < media > HTML PDF < T F E > Target Form Expression ( ), 3.. (,). : Name, Tel name tel DEIM Forum 2011 C7-5 SuperSQL 223 8522 3 14 1 E-mail: tomonari@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL, SQL SELECT GENERATE SQL., SuperSQL HTML,.,. SuperSQL, HTML, Equivalent Transformation on

More information

Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29

Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29 Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29, No. 8, pp. 4-12, Aug. 1986 Synopsis The pile foundation

More information

大学における原価計算教育の現状と課題

大学における原価計算教育の現状と課題 1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012

More information

[12] Qui [6][7] Google N-gram[11] Web ( 4travel 5, 6 ) ( 7 ) ( All About 8 ) (1) (2) (3) 3 3 (1) (2) (3) (a) ( (b) (c) (d) (e) (1

[12] Qui [6][7] Google N-gram[11] Web ( 4travel 5, 6 ) ( 7 ) ( All About 8 ) (1) (2) (3) 3 3 (1) (2) (3) (a) ( (b) (c) (d) (e) (1 RD-003 Building a Database of Purpose for Action from Word-of-mouth on the Web y Hiromi Wakaki y Hiroko Fujii y Michiaki Ariga y Kazuo Sumita y Kouta Nakata y Masaru Suzuki 1 ().com 1 Amazon 2 3 [10] 2007

More information

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T 第 55 回自動制御連合講演会 212 年 11 月 日, 日京都大学 1K43 () Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. Tokumoto, T. Namerikawa (Keio Univ. ) Abstract The purpose of

More information