高トラフィック観測・分析法に関する技術調査
|
|
- ちかこ えいさか
- 5 years ago
- Views:
Transcription
1
2 Contents PC IPv DoS DoS DDoS IDS IDS IDS Anomaly Anomaly
3 LPF IPv6 IX Reflector Pulsing DoS LAN N N N
4 1. DoS DoS
5 2 3 4 DoS DoS 5 IDS
6
7 ATM 1995 Vern Paxson [1] [1][2][3] 2.1. [1] ATM [1] IP - 4 -
8 Tcplib [Danzig et al 1992][2] TCP TELNET TCP FTP FTP - 5 -
9 FTP FTP 1 2 FTP TELNET [3] [3] - 6 -
10 FFT FFT Fast Fourier Transform FFT Fractional Gaussian Noise FFT Whittle H(Hurst) [3] 3-7 -
11 for [4] 4 6 IP SNMP - 8 -
12
13 - 10 -
14 3. Firewall IDS
15 IPv SNMP: Simple Network Management Protocol MIB: Management Information Base
16 [5] [6]
17 Attacker Back bone Victim 5 a) DDoS b) c) DDoS 4.7 WIDE
18 NLANR (National Laboratory for Applied Network Research)[7] vbns (very high performance Backbone Network Service) CAIDA (the Cooperative Association for Internet Data Analysis)[8] Skitter[9] WIDE MAWI (Measurement and Analysis on the WIDE Internet) WG[10] IP AGURI[11][12] PAM (Passive and Active measurement Workshop) [13] ACM SIGCOMM Internet measurement conference (Special Interest Group on Data Communications) [14] PC PC UNIX OS libpcap[15] tcpdump[16] libpcap tcpdump Agilent 64 UDP 50,
19 CPU Memory OS VIA C MHz 512M FreeBSD 4.8 Release 6 pcap tcpdump count tcpdump dropped by kernel Pcap dropped by kernel OS
20 C IDS [17][18] systematic
21 7 [17] 10 IETF PSAMP (Packet Sampling) WG[19] MIB RFC DoS [6][20]
22 34 Hours ms 5 Seconds [21]
23 1 (1ms-100ms) 1 1 Internet-Draft IETF [22] [11] [12] IP IP IPv6 IPv6 IPv6-20 -
24 SNORT IPv6 IPv6 IPv6 Snort IDS IPv6 128 IP IPv6 Snort IPv6 IPv6 Snort IPv IPv6 Snort IPv6 IPv6 IPv6 IPv6 (detection plug-in preprocessor ) IPv6 (output plug-in) Snort IP syslog SNMP Trap Syslog IP syslog IPv6 IPv6 Snort PostgreSQL 7.4 IPv6 IPv6 SNMP Trap snort IPv6 [23] IPv6 SNMP IPv6 SNMP IPv6 IPv6 IPv6 IPv6 IETF IPv6 RFC [24][25][26][27][28]
25 Internet-Drafts IPv6 Mobile IPv6 IPSec IPv6 IPv6 IPv6 NETWORLD + INTEROP 2003 TOKYO IPv6 Show Case [29] SNMP IPv6 Show Case SNMP IPv6 SNMP net-snmp [30] IPv6 IPv
26
27 4. 11 IPv
28 4.1. [31] DDoS DNS 230% 30% DDoS DDoS DNS DDOS 3 RTT RTT USC: RTT 120ms CodeRed NIMDA RTT DDoS RTT DNS DDoS DNS
29 4.2. DoS DoS DoS DoS DoS DoS DoS DoS DoS [32] TCP / ICMP / UDP 90% ICMP
30 TTL [32] ICMP ECHO DDoS [33] DDoS DoS
31 1 TCP SYN (to open port) TCP SYN (to closed port) TCP ACK TCP DATA TCP RST TCP NULL ICMP ECHO Request ICMP TS Request UDP pkt (to open port) UDP pkt (to closed port) TCP SYN/ACK TCP RST (ACK) TCP RST (ACK) TCP RST (ACK) no response TCP RST (ACK) ICMP Echo Reply ICMP TS Reply protocol dependent ICMP Port Unreach DoS IP ISP A) B) (Uniformity)
32 SYN-flood Syn-ack Syn-ack TCP-RST TCP ICMP Anderson-Darling DNS BGP IP AS DoS DoS
33 (unsolicited response) 4.3. [34] (Intrusion Detection System : IDS) IDS (NN) IDS IDS
34 IDS IDS IDS IDS MultiLayer Perceptron(MLP) IDS Jake Neural Network Intrusion Detector (NNID)[35] CPU Kymie The Application Of Neural Networks To UNIX Computer Security[36] Anup K. Ghosh Detecting Anomalous and Unknown Intrusions Against Programs[37] James Cannady Artificial Neural Networks for Misuse Detection[38] Probe DoS
35 Zheng Zhang HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification[39] UDP Flood MLP Self Organizing Map(SOM) IDS Peter Lichodzijewski Host-Based Intrusion Detection Using Self-Organizing Maps[40] SOM SOM Anup K. Ghosh Elman Networks MLP Detecting Anomalous and Unknown Intrusions Against Programs Learning Program Behavior Profiles for Intrusion Detection[41] IDS IDS IDS IDS MLP IDS ( ) IDS IDS
36 4.4. IDS Anomaly IDS(Intrusion Detection System) IDS IDS IDS IDS [42] Anomaly (Multivariate) (SPICE ) IDS IDS IDS ( IP Port) IDS IDS IP
37 IDS Snort SPADE[43] IP Port IDS SYN FIN IDS Krugel Service Specific Anomaly Detection for Network Intrusion Detection[44] GET HEAD Matthew C. Mahoney PHAD ALAD [45] PHAD ALAD PHAD ALAD Carol Taylor NATE [46]
38 NATE IDS IDS IP SYN FIN SYN FIN IP Sekar Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusion [47] W. Lee Mining in a data-flow environment: Experience in network intrusion detection [48] Anomaly IDS IDS
39 4.5. [49] OSPF BGP BGP OSPF private peering
40 2. BGP OSPF peering (BGP-MIB OSPF-MIB ) peering
41 LPF(Low Pass Filter) LPF LPF v in LPF vout LPF v v = v out v in out IPv6 IX JGN-IPv6 NSPIXP6[50] IPv IPv6 ( ) 1 14 LPF LPF
42 14 IX 4.7. CSIRT (Computer Security Incident Response Team) CSIRT IETF INCH WG[51] [52] [53] DoS Reflector DRDoS(Distributed Reflection DoS)
43 DoS DoS Reflector Source IP Reflector Source IP [54][55][56] 15 DDoS DDoS reflection SYN flooding attack Source IP IP SYN SYN TCP 3way SYN/ACK SYN Source IP( ) Reflector 3way ACK SYN/ACK SYN/ACK SYN ACK SYN/ACK SYN 3 4 SYN/ACK Reflector
44 Reflector Reflector 16 TCP-SYN 17 A R TCP-SYN R V SYN-ACK V X A TCP-SYN PPS Y V R V R RST A R SYN flood A R V RST 16 TCP-SYN
45 A V 17 Reflector DDoS Pulsing DoS DoS DeS(Degradation of Service) DoS DeS DoS DoS Pulsing DoS Queue Queue TCP TCP [57] 18 Pulse TCP l1 Queue
46 Queue Queue l2 l2 TCP Queue TCP Slow Start TCP Slow Start T TCP TCP 18 Pulsing DoS 4.9. DoS DoS
47 False Positive 19 Anomaly DOS
48 - 45 -
49 LAN
50 Catal 2950G-24 econ-sw6f Catal 2950G-24 Phbox1 econ-sw5f econ- Phbox2 Catal 2950G-24 FS716TXV2 Catalyst G econ-sw4f FS708XL Catalyst2924 Catalyst2924 Catal 2924LX Cisco7204 FPD econ-sw3f Catal 2950G-24 econ-sw2f M/C M/C Catalyst3512XL Apple Talk M/C Corega SW-HUB85W-8L Catalyst3512XL F Catalyst4006 PD CenterCom FS702FCL PD PD F FS724XJ x10 Catal 2924LX M/C PD CenterCom FS708XL PD F F M/C chuzai1 Com SuperStackII SW LAN SW-HUB SNMP 13node phbox LAN phbox2 430 LAN SW-HUB SNMP SW-HUB Ether
51 Port 1 phbox sec F FTP WWW Mail
52 FFT Wavelet 5.3. P2P
53 8 LAN LAN
54 LAN SW-HUB SW-HUB Proxy Proxy ( )
55 ( ) LAN 5.5. POP ( )
56 ( ) SW-HUB P P SW-HUB (Byte) (Byte)
57 - 54 -
58 - 55 -
59 [58][59] IP AS(Autonomous System) 1 AS
60 Top N 1 D(N) 1 Top N D ( N) = Number of packets in TopN group slot Number of packets slot Top N Top N Top 3 D(3) IP Top N
61 21 22 Top N D(N) T TH DT-(N) T T DT+(N) T TH DT-(N) DT+(N) Stable? T t 22 Stability N D(N) Top N N N 2 32 IPv4-58 -
62 Top N 2 N D ( N + 1) D( N) < C Top N N+1 C N+1 C 1% Top N N=14 23 Top N N 22 DT-(N) 2 N N DT-(N) N N
63 N N DT-(N) m 2 ( 1 i m Ni ) ,000 Ni X Y N N DT-(N) 24 10,
64 25 N N m N N N N N m m N N
65 IP TCP
66 N N
67 27 N 28 N
68 29 30 m N m 5, 10, 20, 30, 40, 50 IP m=5 m m= m N
69 30 m N N N 31 N N
70 pkt 32 ( 1000pkt )
71 33 34 N N N 33 N 30,000pkts
72 34 N 30,000pkts 6.2. IP IP IP TTL(Time To Live) ID(Identification) TCP UDP
73 ,000pkt 1000pkt Internet Intranet 35 IP N IP N 10 IP IP (D)DoS 35 IP 36 IP IP N IP
74 36 IP 37 IP TTL TTL TTL OS IP IP TTL IP TTL DDoS
75 37 TTL 38 IP ID N 1 Top 1 1% ID ID TopN
76 38 ID 39 TCP Intranet Web(HTTP) (SMTP)
77 39 TCP 40 TCP Intranet TCP 40 TCP
78 41 TCP TCP TCP TCP N OS TCP IP ID TCP
79 42 43 TCP TCP N
80 43 44 UDP TCP UDP N 44 UDP
81 45 UDP UDP UDP 45 UDP IP N
82 46 IP 47 IP IP N N 47 IP
83 48 TTL N 48 TTL 49 ID 49 ID
84 50 TCP N 50 TCP 51 TCP TCP N 51 TCP
85 52 TCP TCP
86 54 TCP UDP
87 55 UDP 56 UDP UDP 56 UDP
88 IP IP TCP TCP TTL TCP TTL 6.4. TCP Flooding
89 TCP Pulsing DoS DeS Top N TCP Finger printing N 57 TCP TCP ACK TCP
90 57 TCP TCP AR(Ack-Rst)
91 58 (slot1 slot50) Inside Outside AR Outside
92 Outside.210 Inside SYN Half Open SW-HUB
93
94 7. IEEE Network July/August ASIC ASIC NP ASIC NP NP NP NP [60][61] NP NP [62] NP IDS
95 - 92 -
96 WIDE
97
98 WIDE Project, URL
99 1 V. Paxson and S. Floyd, Wide-Area Traffic: The Failure of Poisson Modeling.IEE E/ACM Transactions on Networking, Vol. 3 No. 3, pp , June P. Danzig and S. Jamin, tcplib: A Library of TCP Internetwork Traffic Charact eristics, Report CS-SYS-91-01, Computer Science Department, University of South ern California, 1991, Available via FTP to catatina.usc.edu as pub/jamin/tcplib/tcpl ib.tar.z 3 V. Paxson, Fast,Approximate Synthesis of Fractional Gaussian Noise for Genera ting Self-Similar Network Traffic. Computer Communications Review, V. 27 N. 5, October 1997, pp Paul Barford, Jeffery Kline, David Plonka and Amos Ron "A Signal Analysis of Network Traffic Anomalies", Proceedings of ACM SIGCOMMInternet Measuremen t Workshop M. Robinson, J. Mirkovic, M. Schnaider, S Michel and P. Reiher, Challenges an d Principles of DDoS Defense, submitted to SIGCOMM Rocky K.C. Chang, Hong Kong Polytechnic University, Defending against Floodi ng-based Distributed Denial-of-Service Attacks: Tutorial, IEEE Communications M agazine October The National Laboratory for Applied Network Research, 8 The Cooperative Association for Internet Data Analysis, 9 Huffaker, B., Fomenkov, M., Moore, D., claffy, k., Macroscopic analyses of the in frastructure: measurement and visualization of Internet connectivity and performa nce, Proceedings of PAM MAWI (Measurement and Analysis on the WIDE Internet), p/wg/active/217_mawi.html 11 Kenjiro Cho, Ryo Kaizaki, Akira Kato, Aguri: An Aggregation-Based Traffic Pr ofiler, Quality of Future Internet Services,Coimbre,Portugal,September, Ryo Kaizaki, Osamu Nakamura, Jun Murai, Characteristics of Denial of Servi ce sttacks on Internet using AGURI, The International Conference on Informatio n Networking 2003 Proceedings (vol.1),jeju Korea, Feb PAM2004, April 19-20, 2004, Antibes Juan-les-Pins, France, 4.org/ 14 Internet Measurement Conference 2004, Sponsored by ACM SIGCOMM and in cooperation with USENIX, October 25-27, 2004, Taormina, Sicily, Italy, w.icir.org/vern/imc/
100 15 Steve MaCanne, Craig Leres, Van Jacobson, Network Research Group. Packet Capturing Library, Lawrence Berkeley National Laboratory. ftp:// cap.tar.z 16 tcpdump, 17 K. C. Claffy, G. C. Polyzos, and H-W Braun. Application of Sampling Methodol ogies to Network Traffic Characterisation. In Proceedings of ACM SIGCOMM'93, San Francisco, CA, September (p 65) 18 K.C. Claffy, G.C. Polyzos, and H.-W. Braun. "Application of Sampling Methodol ogies to Network Traffic Characterization", Computer Communication Review, 23 (4): , October IETF WG, Packet Sampling (psamp), arter.html 20 Stefan Savage et.al at, Estimating Global Denial-of-Service Activity NANOG2 2, May 20-22, 2001 Scottsdale, AZ 21 Zhi-Li Zhang, Vinay J. Ribeiro, Sue Moon, and Christophe Diot, Small-Time Sc aling Behaviors of Internet Backbone Traffic: An Empirical Study, the Proceeding s of IEEE INFOCOM 2003, April Glenn MANSFIELD Keeni, The Managed Object Aggregation MIB, work in p rogress, July Management Infromation Base for IP Version 6: Textual Convensions and Gen ral Group, D. Haskin, S. Onishi, Dec. 1998, RFC IP Version 6 Management Information Base for the Transmission Control Prot ocol, M. Daniele, Dec. 1998, RFC IP Version 6 Management Information Base for the User Datagram Protocol, M. Daniele, Dec. 1998, RFC Management Infromation Base for IP Version 6: Textual Convensions and Gen ral Group, D. Haskin, S. Onishi, Dec. 1998, RFC Management Infromation Base for IP Version 6: ICMPv6 Group, D. Haskin, S. Onishi, Dec. 1998, RFC IP Version 6 Management Information Base for the Multicast Listener Discove ry Protocol, B. Haverman, R. Worzella, Jan. 2001, RFC NETWORLD + INTEROP 2003 TOKYO,IPv6 Show Case, p/events/ni2003/_exhibit/_project/ipv6.html 30 net-snmp,
101 31 Kun-chan Lan, Alefiya Hussain and Debojyoti Dutta, The Effect of Malicious T raffic on the Network, In the Proceedings of PAM 2003, April 6-8, La Jolla 32 Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework f or Classifying Denial of Service Attacks. In Proceedings of the ACM SIGCOMM C onference, Karlsruhe, Germany, ACM. August, D. Moore, G. Voelker & S. Savage., "Inferring Internet Denial-of-Service Activit y", USENIX Security Symp, Hussam O.mousa,A Survey and Analysis of Neural Netwrk approaches to Intr usion Detection, SANS institute, 2002/11/12 35 Jake Ryan(1), Meng-Jang Lin(2), and Risto Miikkulainen(1) (2002). Intrusion D etection With Neural Networks, In Jordan, M. I., Kearns, M. J., and Solla, S. A. (editors) Advances in Neural Information Processing Systems 10 (NIPS'97, Denve r, CO), Cambridge, MA: MIT Press, Kymie Tan, The Application Of Neural Networks To UNIX Computer Security Proc. Int. Conf. Neural Networks, ICNN Anup K. Ghosh, James Wanken, Frank Charron, Detectiong Anomalous and U nknown Intrusions Against Programs, Reliable Software Technol., Sterling, VA, US A 38 Cannady, J., Artificial Neural Networks for Misuse Detection, Proceedings of t he 1998 National Information Systems Security Conference (NISSC'98) October Arlington, VA. 39 Zheng Zhang, JunLi C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a H ierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification, Proceedings of the 2001 IEEE, Workshop on Infor mation Assurance and Security, United States Military Academy, West Point, NY, 5-6 June, Peter Lichodzijewski, A. Nur Zincir-Heywood, Malcolm I.Heywood, "Host-Based In trusion Detection Using Self-Organizing Maps", 14th Annual Canadian Informatio n Technology Security Symposium, May Anup K. Ghosh, Aaron Schwartzbard, and Michael Schatz, "Learning Program Behavior Profiles for Intrusion Detection", Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring 42 Review of Anomaly-based Network Intrusion Detection Jonathan Werrett, 2003/ 05/26, 43 Stuart Staniford, James A. Hoagland, and Joseph M. McAlerny. SPADE, Retrieve d May 20th 2003 from the World Wide Web: ice/
102 44 Christopher Krugel, Thomas Toth, and Engin Kirda. Service Specific Anomaly Dete ction for Network Intrusion Detection Proceedings of the ACM Symposium on Appli ed Computing, Matthew C. Mahoney and Philip K. Chan. Learning Nonstarationary Models of No rmal Network Traffic for Detecting Novel Attacks. Proceedings of the Eighth Internati onal Conference of Knowledge Discovery and Data Mining, pp , Retrieve d May 21st 2003 from the World Wide Web: 46 Carol Taylor and Jim Alves-Foss. NATE - Network Analysis of Anomalous Traf fic Events, A Low-Cost Approach. Proceedings of the New Security Paradigms Wo rkshop '01, pp 89-96, September R. Sekar, A. Gupta, J. Frullo, T. Shanbhad, A. Tiwari, H. Yang, and S. Zhou. Specification-based Anomaly Detection: A New Approach for Detectiong Network I ntrusions. Proceedings of the ACM Conference on Computer and Communications Security 2002, November W. Lee, S. J. Stolfo, and K. W. Mok. Mining in a data-flow environment: Expe rience in network intrusion detection. Proceedings of the ACM SIGKDD Internatio nal Conference on Knowledge Discovery & Data Mining (KDD-99), K.Koide, G.Mansfield Keeni, G.Kitagata and N.Shiratori, ``DCAA: A Dynamic Constrained Adaptive Aggregation method for Effective Network Traffic Informatio n Summarization,'' IEICE Transactions on Communications Special Issue on IPv6 Technology (to be appeared in 2004). 50 NSPIXP6: 51 Extended Incident Handling (inch) WG, arter.html 52 Yuri Demchenko, Hiroyuki Ohno, Glenn M Keeni, Requirements for Format for INcident information Exchange (FINE), work in progress, October, 2003, ww.ietf.org/internet-drafts/draft-ietf-inch-requirements-02.txt 53 J. Meijer, R. Danyliw, Y. Demchenko, The Incident Data Exchange Format Dat a Model and XML Implementation, work in progress, September 29, 2003, Steve Gibson, ``DRDoS'', 55 Vern Paxson, ``An Analysis of Using Reflectors for Distributed Denial-of-Servic e Attacks'', Computer Communication Review 31(3),July Rodney Denno ``A Next-Generation DoS Attack: Distributed Reflection'', Aleksandar Kuzmanovic, Edward W. Knightly, Low-Rate TCP-Targeted Denial
103 of Service Attacks, Proceedings of ACM SIGCOMM 2003, August 25-29, S. Uhlig and O. Bonaventure, "Implications of interdomain traffic characterist ics on traffic engineering", European Transactions on Telecommunications, special issue on traffic engineering, B. Quoitin, S. Tandel, S. Uhlig, and O. Bonaventure, "Interdomain Traffic Engi neering with Redistribution Communities", Preprint submitted to Elsevier Science 60 Mohammad Peyravian, Gordon Davis, and Jean Calvignac, Search Engine Im plications for network Processor Efficiency, IEEE Network July/August Frank T. Hady, Tony Bock, Mason Cabat, Jim Chu, Jeff Meinecke, Ken Oliver, and Wes Talarek, Platform Level Support for High Throughput Edge Application s: The Twin Cities Prototype, IEEE Network July/August Ying-Dar Lin and Yi-Neng Lin, Shun-Chin Yang and Yu-Sheng Lin, DiffServ Edge Routers over Network Processors: Implementation and Evaluation, IEEE Ne twork July/August
2004 SYN/ACK SYN Flood G01P014-6
2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................
More informationuntitled
IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More information¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó
1 2011 5 11 lumeta internet mapping http://www.lumeta.com http://www.cheswick.com/ches/map/ 2 / 43 ( ) 3 / 43 (Kenjiro Cho) WIDE 1984 ( ) OS 1993 1996 ( ) (QoS ) 2001 ( ) 2004 ( ) QoS 4 / 43 (Internet
More information2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP
1.,.. 2 OSI,,,,,,,,, TCP/IP,, IP, ICMP, ARP, TCP, UDP, FTP, TELNET, ssh,,,,,,,, IP,,, 3 OSI OSI(Open Systems Interconnection: ). 1 OSI 7. ( 1) 4 ( 4),,,,.,.,..,,... 1 2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP,
More information集中講義 インターネットテクノロジー 第5回
5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of
More informationルータ(IPv6)掲示用池田.PDF
JEITA IPv6 - IPv6-1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 2 1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 3 (1) 4 2 (2) IP(Internet Protocol - - A A 5 (3) IPv6 AP AP TCP IP TCP IP 6 3 TCP/IP(v6) TELNET FTP TFTP
More information3. LISP B EID RLOC ETR B 4. ETR B ITR A 1: LISP 5. ITR A B EID RLOC 6. A SYN 7. ITR A ITR A B EID RLOC SYN ITR A RLOC ETR B RLOC 8. ETR B SYN ETR B B
L-020 SYN Cookies Locator/ID Separation Protocol Locator/ID Separation Protocol implementation considering SYN Cookies Watanabe Takaya Takashi Imaizumi 1. AS Autonomous System ISP IETF Locator/ID Separation
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More informationTCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)
3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments
More information橡c03tcp詳説(3/24修正版).PDF
1 1 2 TCP 1 3 TCP 9 4 TCP 15 5 21 6 TCP 25 7 27 TCP 1 TCP Windows98 Linux Solaris TCP(Transmission Control Protocol) IP TCP UDP UDP TCP UDP TCP 1 TCP RFC793 RFC2581 TCP 4-1 - DataLink header IP header
More informationuntitled
25: Part ( ) Chief Technology Officer mshindo@fivefront.com SNMP MRTG HP/OV RMON INTERNET WEEK 2006/12/08 Copyright 2006 Fivefront Corporation, All Rights Reserved. 2 1 SNMP IfInUcastPkts, IfOutUcastPkts
More informationDEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN
DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More information1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.
2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More informationtotal-all-nt.dvi
XI W I D E P R O J E C T 1 WIDE Reliable Multicast 1.1 TV 1 1 TCP WIDE JGN/JB SOI (DV) Reliable Multicast (RM) US Reliable Multicast IETF RMT-WG PGM Digital Fountain FEC Tornado Code Ruby Code 1.2 WIDE
More informationDNS: Domain Name
2012 DNS 2012 8 2 5110B140-4 1 5 1.1..................................... 5 1.2..................................... 6 1.3.................................... 6 2 DNS: Domain Name System 7 2.1...................................
More informationTCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2
Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More informationworm hoihoi
true@sfc.wide.ad.jp / (IDS, Honeypot), Web / : Darknet AS65531 10.0.0.0/8 Prefix longest match next hop AS Internet Customer A 10.1.0.0/16 AS 65531 10.0.0.0/8 Customer B 10.2.0.0/16 ( ) The Team Cymru
More informationA Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
More informationi TCP/IP NIC Intel 3com NIC TCP/IP *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP *1 3
i TCP/IP NIC Intel 3com NIC TCP/IP 78 90 500 *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP 79 80 *1 3 ii IPv4 IPv4 *2 *3 IPv6 5 IPv6 UDP UDP IP UDP IP TCP/IP IPv6 IPv4 TCP/IP IPv6 TCP/IP TCP/IP TCP/IP TCP/IP IPv6
More informationI TCP 1/2 1
I TCP 1/2 1 Transport layer: a birds-eye view Hosts maintain state for each transport endpoint Routers don t maintain perhost state H R R R R H Transport IP IP IP IP IP Copyright(C)2011 Youki Kadobayashi.
More informationuntitled
Section 1 5 6 MRTG 7 Prefix RMON NetFlow NetFlow NetFlow Data Collector DB Subnet B B Router = Exporter Subnet A AS IP Prefix 1 8 Subnet B Router = Exporter AS AS Prefix 2 NetFlow Version 5 AS AS Peer
More informationuntitled
ICMP 0466-XX-1395 t04000aa@sfc.keio.ac.jp 133.113.215.10 (ipv4) 2001:200:0:8803::53 (ipv6) (FQDN: Fully Qualified Domain Name) ( www.keio.ac.jp 131.113.215.10 /MAC ID 00:11:24:79:8e:82 Port Port = = Port
More informationインターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show
syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo ShowNet syslog Proposal of the anomaly detection method analyzing syslog data using Bollinger Bands algorithm on event network Hiroshi Abe 1,2,a) Mikifumi
More informationwide93.dvi
5 161 1 1.1 DDT WG DDT WG 1. \DDT" 2. DDT WG DDT WG 1.2 x ( IP) y ( X.25) x y \x overy" x y 1.1 IP X.25 IP IP IPX Appletalk OSI IP \encapsulation" \encapsulation header" \decapsulation" 163 164 1993 WIDE
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More informationヤマハ ルーター ファイアウォール機能~説明資料~
1 2 3 4 LAN ISDN/ NAT (LAN#) (PP#) (TUNNEL#) + R 5 ----------< >---------- ----------< >---------- 6 IPv6 VPN ping IPsec PPTP ICMP (1) TCP (6) UDP (17) IPv6 (41) AH (51) ESP (50) GRE (47) IPv4
More informationuntitled
()IP OSI ( ) (TCP/IP)TCP UDP ( ) IP + IP TCP / Web TCP/UDP IP / LAN IM xdsl/ () (FAX) 6bit(6556) FAX FAX ( ) UDP/TCP UDP(User Datagram Protocol) CL (Connectionless) TCP(Transmission Control Protocol) CO
More informationPIM-SM,PIM-SSM,PIM-DM,MOSPF ( ) ( ) () ( ) 1 2 MAC (FDB: ) 3 MAC MAC ( ) IP ( ) ( ) 1 2 SDN(Software Defined Network) 1 2 MAC
SDN a),b) c),a) a) a),d) A study of quantitative performance measurement on SDN environment Seiichi YAMAMOTO a),b), Wataru NISHIGATA c),a), Kosuke UEDA a), and Eiji KAWAI a),d) SDN OpenFlow () ryu,trema
More information,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN
DEIM Forum 2018 F1-1 LAN LSTM 112 8610 2-1-1 163-8677 1-24-2 E-mail: aoi@ogl.is.ocha.ac.jp, oguchi@is.ocha.ac.jp, sane@cc.kogakuin.ac.jp,,.,,., LAN,. Android LAN,. LSTM LAN., LSTM, Analysis of Packet of
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationスライド 1
WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client
More informationwide96.dvi
10 245 1 WIDE MAWI WG SNMP WWW WIDE TCP 1. SNMP 2. TCP 247 2 SNMP 2.1 MAWI( NetStat) WIDE NNStat WIDE NOC NNStat SNMP(Simple Network Management Protocol) SNMP SNMP SNMP TCP/IP WWW SNMP SNMP HTML MRTG(Multi
More information1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c
CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification
More informationヤマハ ルーター ファイアウォール機能~説明資料~
1 RT140i #1(PPP) RT105i RTA52i R (PP#) (LAN#) [NAT] R LAN LAN 2 #2() RT300i RTW65b RT140e RT105e (LAN2) R (LAN1) RTA55i R LAN LAN 3 #3(PPPoE) R (LAN#) (PP#) (PP#) LAN ISDN/ LAN 4 RT300i RT105 #4(VPN) R
More information卒研 .PDF
1. ------------------------------------------------------------------------------------------2 2. ---------------------------------------------------------------------------3 2.1 2.2 2.3 OSI 2.4 TCP/IP
More informationMacintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi
3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.
More information1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N
GPU 1 1 2 1, 3 2, 3 (Graphics Unit: GPU) GPU GPU GPU Evaluation of GPU Computing Based on An Automatic Program Generation Technology Makoto Sugawara, 1 Katsuto Sato, 1 Kazuhiko Komatsu, 2 Hiroyuki Takizawa
More informationIEEE e
2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN
More information2-20030509.PDF
JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC
More informationDual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B
root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/
More informationLAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson, et al. LAN P P Peer-to-Peer Gember, et al. UDP HTTP L
LAN PC LAN LAN LAN LAN LAN LAN 1 はじめに WWW World Wide Web Windows WWW Tim Berners Lee THIS IS FOR EVERYONE PC PC LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson,
More informationmain2.dvi
15 WWW 501 1 W4C WG 1 WWW (HTTP[53, 22]) WIDE WWW 1997 3 WIDE WWW WIDE CacheBone WG 2 WWW WG WWW W4C WG 2 WIDE CacheBone 3 4 5 6 WWW 1 W4C WG:WIDE World-Wide Web Cache Working Group 503 2 WIDE CacheBone
More informationIP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2
IP 2010 10 1 1 IP (IP ) 2 IP IP 2.1 IP (IP ) 1 IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 4 1,2 4.1 (Protocol) IP:Internet Protocol) 4.2 internet The Internet (internet)
More informationNo.208_honbun.indd
ISSN 0386-7889 No.208 interview 2016.3 March special issue topics info 1 2 challenge trend Japan Data Communications Association CONTENTS 2016.3 March No.208 foreword 1 interview 2 special issue 8 topics
More informationQoS Intserv diffserv 1998 12 16 Internet Week 98 Internet Week98 1998 Kenjiro Cho, Japan Network Information Center 1 3 QoS Intserv RSVP QoS Diff-serv 2 QoS ISP 3 2.1 FAX LAN WAN LAN WAN Heavy Tail WWW
More informationSEJulyMs更新V7
1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples
More informationContents Part1: TCP Part2: TCP Part3: TCP Part4: Part5: TCP Part6:
TCP Yoshifumi Nishida nishida@csl.sony.co.jp Contents Part1: TCP Part2: TCP Part3: TCP Part4: Part5: TCP Part6: TCP TCP TCP Transmission Control Protocol IP TCP application TCP UDP IP DataLink header IP
More informationIP IP DHCP..
NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................
More information,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation
1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More informationComputer Security Symposium October 2015 DDoS
Computer Security Symposium 2015 21-23 October 2015 DDoS 657-8501 1-1 146t255t@stu.kobe-u.ac.jp kitazono@eedept.kobe-u.ac.jp ozawasei@kobe-u.ac.jp 184-8795 4-2-1 bantao@nict.go.jp nakazato@nict.go.jp 141-0031
More informationSICE東北支部研究集会資料(2017年)
307 (2017.2.27) 307-8 Deep Convolutional Neural Network X Detecting Masses in Mammograms Based on Transfer Learning of A Deep Convolutional Neural Network Shintaro Suzuki, Xiaoyong Zhang, Noriyasu Homma,
More informationuntitled
IPv6 IPv4 I / 9 1 CIDR,, NAT IP IPv6 I / 9 2 I / 9 3 1 CIDR Classless Inter-Domain Routing RFC1519 IPv4 CIDR IPng (=IPv6) I / 9 4 Growth in BGP Route Table 90000 80000 Source: http//www.telstra.net/ ops/bgptable.html
More informationsnortの機能を使い尽くす & hogwashも使ってみる
presented by P snort hogwash snort1.8.2(3) Martin Roesch IDS IDS hogwash snort1.7 FW+NIDS 100M IP IP snort./configure;make su make install configure Flexresp database snmp snmp alert idmef xml smbalert
More information1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2
DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web
More informationTCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More informationC everywhere Aoyama Morikawa Laboratory 2
2004.04.16 1 3C everywhere Aoyama Morikawa Laboratory 2 3C Everywhere Computing everywhere PDA, Contents everywhere XML mp3 1 terabyte 1 zettabyte (10 21 ) Connectivity everywhere 2G/3G/4G LAN DSL, DSRC,
More informationLSM-L3-24設定ガイド(初版)
4 2 IP 3 2 MAC VLAN 1 MAC MAC 4-1 2 4-2 VLAN classification VLAN Learning Filtering Forwarding VLAN classification learning filtering forwarding VLAN Classification 2 : - VLAN - VLAN ID Learning VLAN classification
More informationIAAシステムの現状とその課題
IAA The state of the IAA disaster communication systems Yukimitsu Izawa Masahiko Kimoto Nobuhiko Tada Hiroyuki Ohno Yoichi Shinoda WIDE1995 IAA 1 IAA WIDE 1995 (IAA ) IAA WIDE IAA School of Information
More informationMac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)
Mac OS X Server QuickTime Streaming Server 5.0 Mac OS X Server 10.3 apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. QuickTime Streaming Server Apple Apple Computer, Inc. Apple
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More informationWLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A
DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality
More information1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar
DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationIPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc
iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto
More informationTTC技術書
JJ-20.24 Private Integrated Services Network(PISN)- Signalling protocols for IP-based connections as Inter-PINX Connections 2003 4 23 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE ...5...6...6...6...7...7...7...7...7...7...7...7...7...7
More informationMotivation 3 Motivation 4 (Availability) Keep High Availability Providing Reliable Service (New service, function) Provide new Services, with new func
VPLS daisuke.koshiro@tm.softbank.co.jp 1 Agenda Motivation VPLS VPLS VPLS 2 Motivation 3 Motivation 4 (Availability) Keep High Availability Providing Reliable Service (New service, function) Provide new
More informationC08.PDF
QoS Diffserv 1999 12 14 Internet Week 99 Internet Week 99 1999 kenjiro Cho, Japan Network Information Center 1 DiffServ DiffServ DiffServ DiffServ 2 DiffServ congestion 90 IP IP 3 QoS 3.1 QoS QoSQuality
More information1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student
LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN
More informationSi-R30取扱説明書
IP 317 318 IP 319 322 327 332 335 337 339 339 340 342 DNS ProxyDNS 344 DNS 344 DNS 348 DNS 349 DNS 350 DHCP 352 DHCP 353 DHCP 355 NAT 35 NAT 359 30 34 ID 38 371 374 CBCP 375 CBCP 377 379 380 TA 382 URL
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More informationIP IPv4-IPv6
IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More information1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,
More informationIPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1.
HARK-Binaural Raspberry Pi 2 1,a) 1 1 1 2 3 () HARK 2 HARK-Binaural A/D Raspberry Pi 2 1. [1,2] [2 5] () HARK (Honda Research Institute Japan audition for robots with Kyoto University) *1 GUI ( 1) Python
More informationuntitled
The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD
More informationMicrosoft PowerPoint - css2013_3A4_1_slide.ppt
TCP 再送信タイマ管理の変更による 低量 DoS 攻撃被害の緩和効果 CSS2013 2013 年 10 月 23 日 ( 水 ) 発表 :3A4-1 細井琢朗 ( 東京大学 ) 松浦幹太 ( 東京大学 ) TCP 再送信タイマ 低量 DoS 攻撃 文献 [5] の提案方式 被害のモデル化 元の方式での被害見積り 提案方式の緩和効果 解析的調査 まとめ [5] 細井琢朗 松浦幹太 低量 DoS 攻撃を緩和する
More informationmain.dvi
FDTD S A Study on FDTD Analysis based on S-Parameter 18 2 7 04GD168 FDTD FDTD S S FDTD S S S S FDTD FDTD i 1 1 1.1 FDTD.................................... 1 1.2 FDTD..................... 3 2 S 5 2.1 FDTD
More information22 / ( ) OD (Origin-Destination)
23 2 15 22 / ( ) OD (Origin-Destination) 1 1 2 3 2.1....................................... 3 2.2......................................... 3 2.3.......................................... 5 2.4............................
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 337-87 37 E-mail: {m199,miyoshi}@shibaura-it.ac.jp, olivier.fourmaux@upmc.fr P2P P2P ISP Internet Service
More information橡Ⅲ検証実験編.PDF
.......... 2 ANTI-DO S... 3 2.... 4... 5... 6 DO S... 7 DOS... 8 DDOS... 9... 2... 2... 4 ANTI-DO S... 6 ANTI-DOS... 6 ANTI-DOS... 6 ANTI-DOS... 2 3.... 27... 28... 29... 29... 30... 32... 32... 34 . 3
More informationWeb Social Networking Service Virtual Private Network 84
Promising business utilized five senses information media through the Next Generation Network Toshio ASANO Next Generation Network 2004 11 2010 6,000 3,000 2006 12 2008 83 Web Social Networking Service
More informationPeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW
PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3
More informationtemplate.dvi
XXIII W I D E P R O J E C T 23 OSPF 1 Deep Space One StarBED GARIT VM Nebula 2008 Deep Space One Nerdbox Freaks Nerdbox Freaks StarBED StarBED Deep Space One Nerdbox Freaks DeepSpaceOne StarPOD XBurner
More informationTCP-STAR a) Implementation and Evaluation of TCP-STAR: TCP Congestion Control Method for Satellite Internet Hiroyasu OBATA a), Kazuhiro TAIRA, and Ken
TCP-STAR a) Implementation and Evaluation of TCP-STAR: TCP Congestion Control Method for Satellite Internet Hiroyasu OBATA a), Kazuhiro TAIRA, and Kenji ISHIDA TCP NewReno TCP TCP-STAR TCP-STAR TCP TCP-STAR
More informationwide97.dvi
4 139 1 WIDE MAWI WG MRTG(Multi Router Trac Grapher) WWW NNStat tcpdump - 1. WIDE 2. - 141 2 WIDE 2.1 MAWI WG NetStat WG WIDE WIDE Sun Microsystems NOC WG NNStat tcpdump Cisco NNStat MAC NOC NNStat tcpdump
More informationIPv6 IPv IETF IPv6 2
IPv6 IPv6 2003 2 3 1 IETF IPv6 2 2001, 2002 RIR IPv6 IETF IPv6 3 IETF (1/2) IETF (Internet Engineering Task Force) IPv6 WG 2001 IPng (IP Next Generation) WG IPv6 WG IPng Home Page: http://playground.sun.com/ipng
More information2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4
G-002 R Database and R-Wave Detecting System for Utilizing ECG Data Takeshi Nagatomo Ikuko Shimizu Takeshi Ikeda Akio Sashima Koichi Kurumatani R R MIT-BIH R 90% 1. R R [1] 2 24 16 Tokyo University of
More informationFig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system
Study of Health Monitoring of Vehicle Structure by Using Feature Extraction based on Discrete Wavelet Transform Akihisa TABATA *4, Yoshio AOKI, Kazutaka ANDO and Masataka KATO Department of Precision Machinery
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More information