Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Thre

Size: px
Start display at page:

Download "Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Thre"

Transcription

1 16 DNS DNS (Domain Name System) IP 2 (DNS ) (Probabilistic Threat Propagation) DNS DNS 69% 1 ( ) DNS 9% 40% DNS 2,170 DNS This paper proposes a method to estimate malicious domain names from a large scale DNS query response dataset. The key idea of the work is to leverage the use of DNS graph that is a bipartite graph consisting of domain names and corresponding IP addresses. We apply a concept of Probabilistic Threat Propagation (PTP) on the graph with a set of predefined benign and malicious node to a DNS graph obtained from DNS queries at a backbone link. The performance of our proposed method (EPTP) outperformed that of an original PTP method (9% improved) and that of a traditional method using N-gram (40% improved) in an ROC analysis. We finally estimated 2,170 of new malicious domain names with EPTP. 1 Domain Name System (DNS) ( ) IP DNS IP DNS DNS Detecting Malicious Domains with Probabilistic Threat Propagation on DNS Graph. Yuta Kazato, Toshiharu Sugawara,, Waseda University. Kensuke Fukuda, /, National Institute of Informatics / Sokendai., Vol.33, No.3(2016), pp [ ] IP IP C&C IP DNS ( )

2 Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Threat Propagation; PTP) DNS IP 2 (DNS ) ( 1) ( IP ) 3 DNS PTP EPTP (Extended PTP) 9% (N-gram ) 40% 2 (1) PTP EPTP (2) DNS DNS DNS DNS 1 DNS Top Level Domain (TLD) (.jp) Second Level Domain (SLD) (, co.jp) IP ( ) gtld (.com,.net) cctld (.cn,.jp) 60 85% [8] [10] [24] 50% TLD [12] gtld.com.net [20] cctld.cn [25] 90% gtld DNS 1 [13] TLD DDoS( ) Exposure [7] Kopis [3] Notos [2] Exposure [7] time to live (TTL) 15 3,000

3 18 Kopis [3] DDoS Notos [2] [14] DNS SVM [26] Domain Generation Algorithm (DGA) (N-gram) K-L DGA [15] Jaccard index C&C NX ( ) [27] [4] NX DGA [23] DGA DNS [28] DNS [22] Fast-flux DNS IP Flux (CDN ) [16] [6] NX DNS failure graph [16] 3G [19] [11] [9] Manadhata [19] HTTP DNS Polonium [11] Machine File 2 Probability Threat Propagation (PTP) [9] web proxy IP URL IP PTP PTP [9] DNS DNS (DNS) DNS DNS A IP

4 Vol. 33 No. 3 Aug DNS ( 1) G X E G = (X, E) IP IP IP i IP j i IP j (e ij E) 1 IP 1 IP ( CDN) 1 IP 1 IP ( ) DNS [5] IP 0 x j 1 O(N 2 ) 1 1 k 2 P k (x i) = w ij(p k 1 (x j) C k 1 (x i, x j)) j N(x i ) (2) P k (x i ) k x i P k 1 (x j) k 1 x i x j C k 1 (x i, x j ) k 1 x i x j C k 1 x i x j k x j x i 3. 2 EPTP PTP [9] (Malicious ) {malicious} P (x malicious) = γ PTP G x i 1 P (x i ; G) = w ij P (x j x i = 0; G) (1) j N(x i ) 1 N(x i ) x i w ij i j P (x j x i = 0; G) x i 2 k C k 1 3 C k 1 (x i, x j ) = w ji (P k 2 (x i )) (3) w ij 4 w ij = 1 N(x i ) e ij E 0 e ij E (4) PTP Alexa [1] DNS Alexa {benign}

5 20 Require: W, {malicious}, {benign}, γ, β 1: P α N, P (malicious) γ, P (benign) β, C 0 N N 2: repeat 3: T W diag(p ) 4: C T W C T 5: P < C, 1 > 6: C(malicious, ) 0, C(benign, ) 0 7: P (malicious) γ, P (benign) β 8: until P has converged 9: return P (A(i, j) B(i, j)) {malicious} P (malicious) γ {benign} P (benign) β 0 0 T W diag(p ) (diag(p ) P N N ) T W C T 2 2 Extended Probability Threat Propagation C C P =< C, 1 > {benign} Benign Malicious 1 PTP Malicious γ [0,1] 0 EPTP β > 0 γ < 0 α = γ+β 2 P (x) γ P (x) < α P (x) γ α < P (x) β P (x) β Benign β = 1 Malicious γ = β = 1 α = γ+β 2 = 0 ( 2) EPTP 2 N P R N (P (i) = P (x i )) W R N N T R N N (T (i, j) = W (i, j) P (j)) C R N N, C = T W C T A B 1 EPTP (<, > 1 N 1 ) P {malicious} {benign} P C x x {malicious}, {benign} EPTP 1 P P x k PTP DNS DNS 1 DNS tcpdump UDP port

6 Vol. 33 No. 3 Aug Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains /05 11/12 11/19 11/ /05 11/12 11/19 11/ /05 11/12 11/19 11/ /11 11/18 11/25 Time (JST 2013) Time (JST 2013) Time (JST 2013) Time (JST 2013) (a) (b) Benign (c) Malicious (d) Suspicious 3 IN KEEP OUT 24 DNS (A ) IP DNS 1,348,547, IP 2,417,727 3,917, DNS (Malicious) malwaredomains.com [18] uribl.com [21] (Malicious ) (Benign) Alexa [1] (Alexa ) 30,000 30,653 Alexa DGA 5 DNS DNS 5. 1 DNS 1 DNS k k 1 KEEP k 1 k OUT k 1 k IN DNS (All) (Malicious) (Benign) DNS IN KEEP OUT 3 (a) (c) 30,000 30,653 KEEP IN OUT 1 65% KEEP KEEP ( 71.8%) IN OUT ( 51.4%)

7 22 1 KEEP IN OUT KEEP IN OUT ALL 65.9% 17.1% 17.1% Benign 71.8% 14.1% 14.1% Malicious 48.6% 25.8% 25.6% Suspicious 65.3% 17.4% 17.2% 2 DNS d = 1 d = 24 1,271,975 3,766, ,266 1,348,547 IP 603,709 2,417,727 1,199,612 3,917, , , DNS 2013/11/05 1 (d = 1) 2013/11/ (d = 24) 2 DNS d=1 DNS DNS d = 24 d=1 DNS IP DNS d= 24 DNS 4 75% IP 1 1 d=24 70% Frequency Number of nodes 3 10 (d = 24) No. IP Benign Malicious 1 778,279 1,832, , , , , , , , , , % (d=24) 1 IP IP 2 spmode.ne.jp pandaworld.ne.jp 1

8 Vol. 33 No. 3 Aug d=1 d=24 567,663 2,610, , ,279 IP 218,082 1,832, ,706 3,095, (%) (%) ave med B B 912, ,422, M M 13, , B M 343, ,911, U U 2,738, ,226, IP 4 DNS 20 2 Frequency Benign-Benign Malicious-Malicious Benign-Malicious Unknown-Unknown Node distance d=24 d= DNS (d= ) 3 d=1 d=24 2 (B B) (B M) 8.4 (M M) % IP (B B) 5. 3 d=1 Benign Malicious Unknown 5 5 B B, M M, B M, U U Benign Malicious Benign Malicious Unknown (B M) Unknown (U U) B M 6 EPTP EPTP PTP, N-gram EPTP DNS

9 24 Ratio TPR 0.0 FPR Threshold True Positive Rate cv-Original PTP 10-cv-Extended PTP cv-Original PTP 5-cv-Extended PTP 0.00 Bigram-based False Positive Rate ROC (k-fold cross validation) 6. 1 EPTP 2,000, 1,973 k-fold cross validation (CV) (k = 5, 10) DNS 1 10-fold CV P (x) TPR (True Positive Rate) FPR (False Positive Rate) 6 TPR τ = 0 TPR 90% FPR τ = 0 FPR TLD biz net info SLD DGA Receiver Operatorating Characteristic (ROC) (EPTP) (PTP) N-gram [17] [26] 7 10-fold CV ROC EPTP FPR PTP TPR Time (s) / Memory (MiB) Memory (MiB) Time (s) Number of nodes EPTP EPTP TPR fold CV 10-fold CV ROC 10-fold CV N-gram 40% 1,000 10, ,000 1,000,000 EPTP 8 (CPU: Intel Xeon X GHz; Memory 32GB) 10

10 Vol. 33 No. 3 Aug c4brcwmg.biz info-ezweb-ne-jp.info poohpoohhany.info bvncm-kdkdkgree.jp nomoguz.su kisjehmbga.jp google-play.jp IP EPTP IP 1 IP IP IP 7 9 ( :, : IP : ) 6. 2 DNS d=24 DNS EPTP 6 FPR 0 τ = IP 2,170 IP 12,884 6 EPTP (τ = 0.1) IN KEEP OUT 6. 2 EPTP Suspicious IN KEEP OUT ( 3 (d) 1) Suspicious ALL IN KEEP OUT IN KEEP OUT Suspicious Malicious DGA 6 Suspicious DGA DNS 5 5 2

11 26 PTP DNS DNS IP DNS, d= DNS DNS DNS 69% 1 IP IP 7. 3 EPTP [9] PTP Alexa 10-fold CV FPR (=0.016) 8% 90.4% ( 7) EPTP 6 τ = 0 DNS 8 10 DNS 5-fold CV 10-fold CV 6 τ 0.1 2,170 ( 6) DGA google-play.jp N-gram EPTP ( 9) IP IP

12 Vol. 33 No. 3 Aug DNS A PTP DNS 1 EPTP DNS 90.4% 2,170 Malicious Alaxa (15H02699) (EU) FP7 ( :NECOMA) [ 1 ] Alexa: Alexa [Online], topsites/. [ 2 ] Antonakakis, M., Perdisci, R., Dagon, D., Lee, W. and Feamster, N.: Building a Dynamic Reputation System for DNS, in Proceedings of USENIX security symposium, 2010, pp [ 3 ] Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou II, N. and Dagon, D.: Detecting Malware Domains at the Upper DNS Hierarchy, in Proceedings of USENIX Security Symposium, 2011, pp [ 4 ] Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou II, N., Abu-Nimeh, S., Lee, W. and Dagon, D.: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware, in Proceedings of USENIX Security Symposium, 2012, pp [ 5 ] Arkko, J., Cotton, M. and Vegoda, L.: IPv4 Address Blocks Reserved for Documentation, RFC 5737, January [ 6 ] Bar, A., Paciello, A. and Romirer-Maierhofer, P.: Trapping botnets by DNS failure graphs: validation, extension and application to a 3G network, in Proceedings of TMA 13, IEEE, 2013, pp [ 7 ] Bilge, L., Sen, S., Balzarotti, D., Kirda, E. and Kruegel, C.: EXPOSURE: a passive DNS analysis service to detect and report malicious domains, ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 4(2014), p. 14. [ 8 ] Brownlee, N., Claffy, K. and Nemeth, E.: DNS measurements at a root server, in Proceedings of GLOBECOM 01, Vol. 3, IEEE, 2001, pp [ 9 ] Carter, K. M., Idika, N. and Streilein, W. W.: Probabilistic threat propagation for malicious activity detection, in Proceedings of ICASSP 13, IEEE, 2013, pp [10] Castro, S., Wessels, D., Fomenkov, M. and Claffy, K.: A Day at the Root of the Internet, ACM SIGCOMM Computer Communication Review, Vol. 38, No. 5(2008), pp [11] Chau, D., Nachenberg, C., Wilhelm, J., Wright, A. and Faloutsos, C.: Polonium: Tera-scale graph mining and inference for malware detection, in Proceedings of SIAM International Conference on Data Mining, Vol. 2, [12] Gao, H., Yegneswaran, V., Chen, Y., Porras, P., Ghosh, S., Jiang, J. and Duan, H.: An empirical reexamination of global DNS behavior, in Proceedings of SIGCOMM 13, ACM, 2013, pp [13] Hao, S., Feamster, N. and Pandrangi, R.: Monitoring the initial DNS behavior of malicious domains, in Proceedings of IMC 11, ACM, 2011, pp [14] Ishibashi, K. and Sato, K.: Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy, in Proceedings of World Telecommunications Congress (WTC 12), 2012, pp [15] Ishibashi, K., Toyono, T., Hasegawa, H. and Yoshino, H.: Extending black domain name list by using co-occurrence relation between DNS queries, IEICE Transactions on Communications, Vol. 95, No. 3(2012), pp [16] Jiang, N., Cao, J., Jin, Y., Li, L. E. and Zhang, Z.-L.: Identifying suspicious activities through DNS failure graph analysis, in Proceedings of ICNP 10, IEEE, 2010, pp [17] Kazato, Y., Fukuda, K. and Sugawara, T.: To-

13 28 wards classification of DNS erroneous queries, in Proceedings of AINTEC 13, ACM, 2013, pp [18] Malware Domain Blocklist: DNS-BH Malware Domain Blocklist, com/. [19] Manadhata, P. K., Yadav, S., Rao, P. and Horne, W.: Detecting Malicious Domains via Graph Inference, in Proceedings of ESORICS 14, Springer, 2014, pp [20] Osterweil, E., McPherson, D., DiBenedetto, S., Papadopoulos, C. and Massey, D.: Behavior of DNS Top Talkers, a. com/. net View, in Proceedings of PAM 12, Springer, 2012, pp [21] P. Vixie: Traltime URI Blacklist, com/. [22] Perdisci, R., Corona, I., Dagon, D. and Lee, W.: Detecting malicious flux service networks through passive analysis of recursive DNS traces, in Proceedings of ACSAC 09, IEEE, 2009, pp [23] Schiavoni, S., Maggi, F., Cavallaro, L. and Zanero, S.: Phoenix: DGA-based botnet tracking and intelligence, in Proceedings of DIMVA 14, Springer, 2014, pp [24] Wessels, D. and Fomenkov, M.: Wow, that s a lot of packets, in Proceedings of PAM 03, [25] Xuebiao, Y., Xin, W., Xiaodong, L. and Baoping, Y.: DNS measurements at the.cn TLD servers, in Proceedings of FSKD 09, Vol. 7, 2009, pp [26] Yadav, S., Reddy, A., Reddy, A. and Ranjan, S.: Detecting algorithmically generated malicious domain names, in Proceedings of IMC 10, ACM, 2010, pp [27] Yadav, S. and Reddy, A. N.: Winning with DNS failures: Strategies for faster botnet detection, in Proceedings of SecureCom 12, Springer, 2012, pp [28],,, : DNS,. IOT, No. 21(2009), pp ( ( )) (2002) ( ; ) / ( ) 1982., ,.,.,,,,. ( ).,,,, ISOC IEEE, ACM, AAAI.

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

IRC IRC HTTP P2P HTTP P2P IRC 1993 [1] IRC C&C [2], [3] [2] IRC C&C 16 3 [3] IRC IRC / n-gram 2003 C&C P2P [1] P2P P2P PeerShark [4] [4] IRC P2P HTTP

IRC IRC HTTP P2P HTTP P2P IRC 1993 [1] IRC C&C [2], [3] [2] IRC C&C 16 3 [3] IRC IRC / n-gram 2003 C&C P2P [1] P2P P2P PeerShark [4] [4] IRC P2P HTTP C&C 1,2, 1 1,2 2,3,a) 1,2 2014 12 8, 2015 6 5 Command and Control C&C 1 C&C C&C C&C C&C C&C C&C C&C C&C Evaluation of Machine Learning Techniques for C&C Traffic Classification Kazumasa Yamauchi 1,2, 1

More information

untitled

untitled 580 26 5 SP-G 2011 AI An Automatic Question Generation Method for a Local Councilor Search System Yasutomo KIMURA Hideyuki SHIBUKI Keiichi TAKAMARU Hokuto Ototake Tetsuro KOBAYASHI Tatsunori MORI Otaru

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

2 1 1 http://www.jpo.go.jp/indexj.htm International Patent Classification European Patent Classification JST Online Information System Derwent World Patent Index The Scientific and Technical Information

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy 1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura

More information

1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS...

1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS... 2015 User-AgentDNS 2016 2 1 5114F058-7 1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS......................................

More information

Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29

Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29 Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29, No. 8, pp. 4-12, Aug. 1986 Synopsis The pile foundation

More information

<> <> <> 11 ... 1 XML Web XML HTML 1 name item 2 item item HTML

<> <name> </name> <body> <></> <> <title> </title> <item> </item> <item> 11 </item> </>... </body> </> 1 XML Web XML HTML 1 name item 2 item item HTML DEWS2008 C6-4 XML 606-8501 E-mail: yyonei@db.soc.i.kyoto-u.ac.jp, {iwaihara,yoshikawa}@i.kyoto-u.ac.jp XML XML XML, Abstract Person Retrieval on XML Documents by Coreference that Uses Structural Features

More information

( )

( ) NAIST-IS-MT1051071 2012 3 16 ( ) Pustejovsky 2 2,,,,,,, NAIST-IS- MT1051071, 2012 3 16. i Automatic Acquisition of Qualia Structure of Generative Lexicon in Japanese Using Learning to Rank Takahiro Tsuneyoshi

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

fiš„v5.dvi

fiš„v5.dvi (2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java

More information

,, WIX. 3. Web Index 3. 1 WIX WIX XML URL, 1., keyword, URL target., WIX, header,, WIX. 1 entry keyword 1 target 1 keyword target., entry, 1 1. WIX [2

,, WIX. 3. Web Index 3. 1 WIX WIX XML URL, 1., keyword, URL target., WIX, header,, WIX. 1 entry keyword 1 target 1 keyword target., entry, 1 1. WIX [2 DEIM Forum 2013 B10-4 Web Index 223-8522 3-14-1 E-mail: haseshun@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp, URL WIX, Web Web Index(WIX). WIX, WIX.,,. Web Index, Web, Web,, Related Contents Recommendation

More information

58 10

58 10 57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have

More information

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google Drive-by Download 1,a) 1,b) Web Drive-by Download(DbD) DbD Web DbD HTTP DbD Web DbD, Drive-by Download The Network Visualization Tool for detecting the Drive-by Download attacks. Amako Katsuhiro 1,a) Takada

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

5) 2. Geminoid HI-1 6) Telenoid 7) Geminoid HI-1 Geminoid HI-1 Telenoid Robot- PHONE 8) RobotPHONE 11 InterRobot 9) InterRobot InterRobot irt( ) 10) 4

5) 2. Geminoid HI-1 6) Telenoid 7) Geminoid HI-1 Geminoid HI-1 Telenoid Robot- PHONE 8) RobotPHONE 11 InterRobot 9) InterRobot InterRobot irt( ) 10) 4 Remote Hand Clapping Transmission Using Hand Clapping Machines on Live Video Streaming Masato Takahashi, Yuto Kumon,ShuheyTakeda and Masahiko Inami Abstract We propose a remote transmission system of hand

More information

23

23 Master's Thesis / 修 士 論 文 映 像 配 信 の 中 断 から 復 旧 までの 時 間 を 短 縮 するネットワーク 再 構 築 手 法 の 改 良 隅 田, 貴 久 三 重 大 学, 2011. 三 重 大 学 大 学 院 地 域 イノベーション 学 研 究 科 博 士 前 期 課 程 地 域 イノベーション 学 専 攻 http://hdl.handle.net/10076/12400

More information

1034 IME Web API Web API 1 IME Fig. 1 Suitable situations for context-aware IME. IME IME IME IME 1 GPS Web API Web API Web API Web )

1034 IME Web API Web API 1 IME Fig. 1 Suitable situations for context-aware IME. IME IME IME IME 1 GPS Web API Web API Web API Web ) Vol. 52 No. 3 1033 1044 (Mar. 2011) IME 1 2 1 1 IME Web PC Android Dynamic Dictionary Generation Method for Context-aware Input Method Editor Yutaka Arakawa, 1 Shinji Suematsu, 2 Shigeaki Tagashira 1 and

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

揃 24 1681 0 20 40 60 80 100 0 21 42 63 84 Lag [hour] Lag [day] 35

揃 24 1681 0 20 40 60 80 100 0 21 42 63 84 Lag [hour] Lag [day] 35 Forecasting Model for Electricity Consumption in Residential House Based on Time Series Analysis * ** *** Shuhei Kondo Nobayasi Masamori Shuichi Hokoi ( 2015 7 3 2015 12 11 ) After the experience of electric

More information

2

2 1 2 3 4 5 Part I System Requirements 6 1 System Requirements "Planning Large Installations of PRTG Network Monitor 7" 7 PRTG 8 0 9 Part II Installation 10 2 Installation 11 12 13 14 15 16 17 Part III Introduction

More information

1: ( 1) 3 : 1 2 4

1: ( 1) 3 : 1 2 4 RippleDesk Using Ripples to Represent Conversational Noise on Internet Shigaku Iwabuchi Takaomi Hisamatsu Shin Takahashi Buntarou Shizuki Kazuo Misue Jiro Tanaka Department of Comupter Science, University

More information

ÿþ

ÿþ Abstract Social bookmark service is a tool to classify information on the web with user s own criteria. Organizing website with social bookmark service is fundamentally conducted for individual s benefit.

More information

ディスプレイと携帯端末間の通信を実現する映像媒介通信技術

ディスプレイと携帯端末間の通信を実現する映像媒介通信技術 Data Transfer Technology to Enable Communication between Displays and Smart Devices 倉木健介 中潟昌平 田中竜太 阿南泰三 あらまし Abstract Recently, the chance to see videos in various places has increased due to the speedup

More information

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori Proposal and Characteristics Evaluation of a Power Generation System Utilizing Waste Heat from Factories for Load Leveling Pyong Sik Pak, Member, Takashi Arima, Non-member (Osaka University) In this paper,

More information

untitled

untitled 2007 55 2 255 268 c 2007 2007 1 24 2007 10 30 k 10 200 11 110 6 60 3 1. 1 19 Mendenhall 1887 Dickens, 1812 1870 Thackeray, 1811 1863 Mill, 1806 1873 1960 610 0394 1 3 256 55 2 2007 Sebastiani 2002 k k

More information

1

1 3-1-2 156 Mbps Ultrahigh-Speed Wireless LAN Prototype in the 38GHz Band Gang Wu, Masugi INOUE, Homare MURAKAMI, and Yoshihiro HASE This paper describes a 156 Mbps ultrahigh-speed wireless LAN operating

More information

Twitter‡Ì”À‰µ…c…C†[…g‡ðŠŸŠp‡µ‡½…^…C…•…›…C…fi‘ã‡Ì…l…^…o…„‘îŁñ„�™m

Twitter‡Ì”À‰µ…c…C†[…g‡ðŠŸŠp‡µ‡½…^…C…•…›…C…fi‘ã‡Ì…l…^…o…„‘îŁñ„�™m 27 Twitter 1431050 2016 3 14 1 Twitter,,.,.,., Twitter,.,,.,,. URL,,,. BoW(Bag of Words), LSI(Latent Semantic Indexing)., URL,,,,., Accuracy, AUC(Area Under the Curve), Precision, Recall, F,. URL,,,.,

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

2

2 Japan Registry Service 2 Japan Registry Service 4 5 6 7 (root) com jp arpa example ne co in-addr e164 www jprs 1.8 www sip 3 1.7.5.2.7.9.2.5 8 Japan Registry Service 10 050-1000-XXXX 050-2000-XXXX 050-3000-XXXX

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

1: 2: 3: 4: 2. 1 Exploratory Search [4] Exploratory Search 2. 1 [7] [8] [9] [10] Exploratory Search

1: 2: 3: 4: 2. 1 Exploratory Search [4] Exploratory Search 2. 1 [7] [8] [9] [10] Exploratory Search DEIM Forum 2013 D2-1 112 8610 2-1-1 E-mail: {aco,itot}@itolab.is.ocha.ac.jp, chiemi@is.ocha.ac.jp Exploratory Search A product Search System for women adjusting amount of browsed items Abstract Eriko KOIKE,

More information

Repatriation and International Development Assistance: Is the Relief-Development Continuum Becoming in the Chronic Political Emergencies? KOIZUMI Koichi In the 1990's the main focus of the global refugee

More information

untitled

untitled 1. 2. 3. 1...1 2 DNS...1 2.1...1 2.2...2 2.3...3 2.3.1...3 2.3.2...3 2.3.3...4 2.3.4...5 2.3.5...5 2.4...5 3...6 4...6...8 1....8 2....8 3....8 4....9 5....9 6....9 6-1. conf...10 6-2....14 6-3....16 6-4....17

More information

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 1 2 3 1 2 ... 1 1... 8... 9... 18... 24... 25... 30... 31... 34... 37 E... 67 Bluetooth BIP... 68 2... 71... 73... 100 3 ... 132... 134... 136 E...

More information

自動シャットタ<3099>ウンクイックインストールカ<3099>イト<3099>.indb

自動シャットタ<3099>ウンクイックインストールカ<3099>イト<3099>.indb OMRON Corporation. 2011 All Rights Reserved. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 title Red Hat Enterprise Linux Server (2.6.18-8.el5xen serial) root (hd0,1) kernel /xen.gz-2.6.18-8.el5 console=vga xencons=ttys16

More information

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3

More information

303 Human Factors in Nuclear Power Plant with Focus on Application of Man-machine Interface and Advanced Data Processing Technologies to Nuclear Power Industry Abstract We discuss issues involved in a

More information

光学

光学 Image Recognition for On-Board Cameras and Distance Measurement Using Stereo Camera Takeshi SHIMA Haruki MATONO Shinji KAKEGAWA and Tatsuhiko MONJI Active safety systems for vehicles using outside detection

More information

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

Mhij =zhij... (2) Đhij {1, 2,...,lMhij}... (3)

Mhij =zhij... (2) Đhij {1, 2,...,lMhij}... (3) An Autonomous Decentralized Algorithm for a Large Scale Scheduling Problem Approach Based on Backward Scheduling Ichimi Norihisa, Non-member (Toshiba Corporation), lima Hitoshi, Member, Sannomiya Nobuo,

More information

10億人のソーシャルプラットフォームを目指すグリーの大規模インフラ運用

10億人のソーシャルプラットフォームを目指すグリーの大規模インフラ運用 Copyright GREE, Inc. All Rights Reserved. Copyright GREE, Inc. All Rights Reserved. Copyright GREE, Inc. All Rights Reserved. Copyright GREE, Inc. All Rights Reserved. http://developer.gree.net/sp/globalplatform/en/products/

More information

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc 1,a) 1,b) Obstacle Detection from Monocular On-Vehicle Camera in units of Delaunay Triangles Abstract: An algorithm to detect obstacles by using a monocular on-vehicle video camera is developed. Since

More information

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici

More information

untitled

untitled Kaminsky Attack ( ) DNS DAY Tsuyoshi TOYONO (toyono@nttv6.net) ( @JPRS) ( ) ( ) DNS DNS (DNS Cache Poisoning ) ( ) Pharming IP Pharming Cache Poisoning 0 ( (RR) Cache TTL) 1000 19 (1136 ) 50% 5 (271 )

More information

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S 1,a) 1 1,b) 1,c) 1,d) Interaction Design for Communication Between Older Adults and Their Families Using Channel-Oriented Interface Takeda Keigo 1,a) Ishiwata Norihiro 1 Nakano Teppei 1,b) Akabane Makoto

More information

The Key Questions about Today's "Experience Loss": Focusing on Provision Issues Gerald ARGENTON These last years, the educational discourse has been focusing on the "experience loss" problem and its consequences.

More information

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc VOL. J98-A NO. 1 JANUARY 2015 本 PDFの 扱 いは 電 子 情 報 通 信 学 会 著 作 権 規 定 に 従 うこと なお 本 PDFは 研 究 教 育 目 的 ( 非 営 利 )に 限 り 著 者 が 第 三 者 に 直 接 配 布 すること ができる 著 者 以 外 からの 配 布 は 禁 じられている ICT a) Caption Presentation Method

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou 情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these

More information

Hohenegger & Schär, a cm b Kitoh et. al., Gigerenzer et. al. Susan et. al.

Hohenegger & Schär, a cm b Kitoh et. al., Gigerenzer et. al. Susan et. al. Study on characteristics of inhabitants acceptance of weather information with a probability Motohiro HONMA *, Kyoko ARAI **, Kento MATSUMOTO *** and Yasushi SUZUKI *** Abstract In this study, we performed

More information

Web Social Networking Service Virtual Private Network 84

Web Social Networking Service Virtual Private Network 84 Promising business utilized five senses information media through the Next Generation Network Toshio ASANO Next Generation Network 2004 11 2010 6,000 3,000 2006 12 2008 83 Web Social Networking Service

More information

<4D F736F F D20D2E5E7E8F1FB E3EEE45FE8F1EFF0>

<4D F736F F D20D2E5E7E8F1FB E3EEE45FE8F1EFF0> 13 1 71 71 71 71 7 1 7 1 7 1 7 1 71 71 71 71 71 71 7 (1 71 71 71 7 1 71 7) 1 7 1 71 71 71 71 71 71 7 1 71 7 1 7 1 71 71 71 71 7 1 71 71 71 71 71 71 71 7 1 71 71 71 71 7, 1 71 71 71 71 71 71 7 1 7 1 71

More information

2 3, 4, 5 6 2. [1] [2] [3]., [4], () [3], [5]. Mel Frequency Cepstral Coefficients (MFCC) [9] Logan [4] MFCC MFCC Flexer [10] Bogdanov2010 [3] [14],,,

2 3, 4, 5 6 2. [1] [2] [3]., [4], () [3], [5]. Mel Frequency Cepstral Coefficients (MFCC) [9] Logan [4] MFCC MFCC Flexer [10] Bogdanov2010 [3] [14],,, DEIM Forum 2016 E1-4 525-8577 1 1-1 E-mail: is0111rs@ed.ritsumei.ac.jp, oku@fc.ritsumei.ac.jp, kawagoe@is.ritsumei.ac.jp 373 1.,, itunes Store 1, Web,., 4,300., [1], [2] [3],,, [4], ( ) [3], [5].,,.,,,,

More information

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member

More information

cover1.indd

cover1.indd OMRON Corporation. 2010 All Rights Reserved. Power Credit UPS PowerAct Pro Ver.4.x PA PowerAct Pro PA UPS Power Credit 2 3 4 5 6 7 8 9 10 11 12 13 title Red Hat Enterprise Linux Server (2.6.18-8.el5xen

More information

O1-1 O1-2 O1-3 O1-4 O1-5 O1-6

O1-1 O1-2 O1-3 O1-4 O1-5 O1-6 O1-1 O1-2 O1-3 O1-4 O1-5 O1-6 O1-7 O1-8 O1-9 O1-10 O1-11 O1-12 O1-13 O1-14 O1-15 O1-16 O1-17 O1-18 O1-19 O1-20 O1-21 O1-22 O1-23 O1-24 O1-25 O1-26 O1-27 O1-28 O1-29 O1-30 O1-31 O1-32 O1-33 O1-34 O1-35

More information

JAPANESE SHIP-OWNERS AND WORLD BULK MARKET BETWEEN THE TWO WORLD WARS Mariko Tatsuki Keisen University After World War I, Japanese shipping suffered for a long time from an excess of tonnage and severe

More information

30 1 2015 6 pp.33-48. Excel Excel Excel Microsoft Excel 2015 OS Windows7 Excel2010(Microsoft Office2010) Office 2007 2013 Excel 2 Excel 33

30 1 2015 6 pp.33-48. Excel Excel Excel Microsoft Excel 2015 OS Windows7 Excel2010(Microsoft Office2010) Office 2007 2013 Excel 2 Excel 33 計 量 国 語 学 アーカイブ ID KK300103 種 別 解 説 タイトル データの 視 覚 化 (1) Excelによるグラフ 作 成 の 基 本 (1) Title Data Visualization (1): Making Basic Charts in Microsoft Excel (Part 1) 著 者 林 直 樹 Author HAYASHI Naoki 掲 載 号 30 巻

More information

Lyra 2 2 2 X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) (

Lyra 2 2 2 X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) ( 1,a) 2,b) 2,c) 1. Web [1][2][3][4] [5] 1 2 a) ito@iplab.cs.tsukuba.ac.jp b) misue@cs.tsukuba.ac.jp c) jiro@cs.tsukuba.ac.jp [6] Lyra[5] ivisdesigner[6] [7] 2 Lyra ivisdesigner c 2012 Information Processing

More information

syuu_2_10_3.dvi

syuu_2_10_3.dvi [1] [1, 2, 3] [1, 4, 5] 6 7 3 (0.66) (0.65) 1 [6] 0 1 1 2 3 2.1................................ 3 2.1.1.................................. 3 2.1.2.................................. 3 2.2...........................

More information

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou NAT NETWORK ADDRESS TRANSLATION SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Group (ScreenOS ) 2 Copyright

More information

2

2 Japan Registry Service 2 Japan Registry Service 4 SIP GW 5 6 . com jp arpa 8 e164 4 1 4 7 (root) com jp arpa example ne co in-addr e164 www jprs 1.8 www sip 3 1.7.5.2.7.9.2.5 8 9 as of Feb.20, 2004 10

More information

untitled

untitled The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD

More information

Google Apps for Business Google Gmail Google Apps Google Apps Google Apps 2

Google Apps for Business Google Gmail Google Apps Google Apps Google Apps 2 Google Apps Google Apps 1 Google Apps for Business Google Gmail Google Apps Google Apps Google Apps 2 Google Apps 6,000 / 600 / 1 30GB Google PC 99.9% 24 Google SSAE 16 Type II 1 FISMA 2 Google Apps 3

More information

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima

More information

Microsoft PowerPoint - NICTER_Darknet_2014.pptx

Microsoft PowerPoint - NICTER_Darknet_2014.pptx Darknet 2014 独 政 法 情 報 通 信 研 究 機 構 (NICT) 笠 間 貴 弘 神 薗 雅 紀 Darknet 2014 Darknet 2014 ダークネット( 未 使 IPアドレス) 宛 てのトラフィックデータ 観 測 対 象 はある/20の 連 続 したダークネット 2011 年 4 1 2014 年 3 31 の3 年 間 分 +α NONSTOPを 利 して 提 供 (pcap+db(

More information

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer)

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

untitled

untitled WANJet 1: one-arm F5 Networks Japan K.K. 1 WANJet WANJet https://:10000 F5 Networks Japan K.K. 2 2: WANJet F5 Networks Japan K.K. 3 vs. F5 Networks Japan K.K. 4 3: WANJet F5 Networks

More information

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.

More information

16

16 Empirical Analysis of the Efficiency of the Broadcasting Industry: Verification of Regionalism and a Proposal ABSTRACT Reforms in the broadcasting industry have recently been discussed and proposed, and

More information

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000 Vol. 50 No. 12 2796 2806 (Dec. 2009) 1 1, 2 COM TCG COM TCG COM TCG Strategy-acquisition System for Video Trading Card Game Nobuto Fujii 1 and Haruhiro Katayose 1, 2 Behavior and strategy of computers

More information

(4) ω t(x) = 1 ω min Ω ( (I C (y))) min 0 < ω < C A C = 1 (5) ω (5) t transmission map tmap 1 4(a) 2. 3 2. 2 t 4(a) t tmap RGB 2 (a) RGB (A), (B), (C)

(4) ω t(x) = 1 ω min Ω ( (I C (y))) min 0 < ω < C A C = 1 (5) ω (5) t transmission map tmap 1 4(a) 2. 3 2. 2 t 4(a) t tmap RGB 2 (a) RGB (A), (B), (C) (MIRU2011) 2011 7 890 0065 1 21 40 105-6691 1 1 1 731 3194 3 4 1 338 8570 255 346 8524 1836 1 E-mail: {fukumoto,kawasaki}@ibe.kagoshima-u.ac.jp, ryo-f@hiroshima-cu.ac.jp, fukuda@cv.ics.saitama-u.ac.jp,

More information

IP IP MTU Maximum Transfer Unit MTU MTU [2] i

IP IP MTU Maximum Transfer Unit MTU MTU [2] i 13 A study on the load of packet assembly on edge routers 1020331 2002 2 8 IP IP MTU Maximum Transfer Unit MTU MTU [2] i CPU MTUIP ii Abstract A study on the load of packet assembly on edge routers Yamada

More information

untitled

untitled FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...

More information

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF. 2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................

More information

SRXシリーズおよびJシリーズのネットワークアドレス変換

SRXシリーズおよびJシリーズのネットワークアドレス変換 APPLICATION NOTE SRX J SRX J NAT Copyright 2014, Juniper Networks, Inc. ...1...1...1... 1... 1...1... 1...2 NAT...3 NAT...4 NAT...4 NAT...5 NAT...6 NAT...7....7 NAT....7 NAT...7 NAT....8 NAT....8 NAT...9

More information

スライド 1

スライド 1 IP Meeting 2004 DNS & (IANA/RIR) 2004 12 2 JPRS DNS 1 DNS 3 IP Anycast IPv6 AAAA glue BIND DNS 3 IP Anycast DDoS 2002 10 DDoS 13 7 2 DNS DNS 13(=13 IPv4 ) 4 IP Anycast IP RFC 1546

More information

形状変形による古文書画像のシームレス合成

形状変形による古文書画像のシームレス合成 Use of Shape Deformation to Seamlessly Stitch Historical Document Images Wei Liu Wei Fan Li Chen Sun Jun あらまし 1 2 Abstract In China, efforts are being made to preserve historical documents in the form

More information

„h‹¤.05.07

„h‹¤.05.07 Japanese Civilian Control in the Cold War Era Takeo MIYAMOTO In European and American democratic countries, the predominance of politics over military, i.e. civilian control, has been assumed as an axiom.

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

22SPC4報告書

22SPC4報告書 Practicing Persona Method to Clarify the Target User - Investigating Utilization of a Blog Service for Communities - UCD(User-Centered Design) UCD UCD UCD () UCD Abstract User-centered design (UCD) is

More information

_念3)医療2009_夏.indd

_念3)医療2009_夏.indd Evaluation of the Social Benefits of the Regional Medical System Based on Land Price Information -A Hedonic Valuation of the Sense of Relief Provided by Health Care Facilities- Takuma Sugahara Ph.D. Abstract

More information

ベース0516.indd

ベース0516.indd QlikView QlikView 2012 2 qlikview.com Business Discovery QlikTech QlikView QlikView QlikView QlikView 1 QlikView Server QlikTech QlikView Scaling Up vs. Scaling Out in a QlikView Environment 2 QlikView

More information