高トラフィック観測・分析法に関する技術調査

Size: px
Start display at page:

Download "高トラフィック観測・分析法に関する技術調査"

Transcription

1

2 Contents PC IPv DoS DoS DDoS IDS IDS IDS Anomaly Anomaly

3 LPF IPv6 IX Reflector Pulsing DoS LAN N N N

4 1. DoS DoS

5 2 3 4 DoS DoS 5 IDS

6

7 ATM 1995 Vern Paxson [1] [1][2][3] 2.1. [1] ATM [1] IP - 4 -

8 Tcplib [Danzig et al 1992][2] TCP TELNET TCP FTP FTP - 5 -

9 FTP FTP 1 2 FTP TELNET [3] [3] - 6 -

10 FFT FFT Fast Fourier Transform FFT Fractional Gaussian Noise FFT Whittle H(Hurst) [3] 3-7 -

11 for [4] 4 6 IP SNMP - 8 -

12

13 - 10 -

14 3. Firewall IDS

15 IPv SNMP: Simple Network Management Protocol MIB: Management Information Base

16 [5] [6]

17 Attacker Back bone Victim 5 a) DDoS b) c) DDoS 4.7 WIDE

18 NLANR (National Laboratory for Applied Network Research)[7] vbns (very high performance Backbone Network Service) CAIDA (the Cooperative Association for Internet Data Analysis)[8] Skitter[9] WIDE MAWI (Measurement and Analysis on the WIDE Internet) WG[10] IP AGURI[11][12] PAM (Passive and Active measurement Workshop) [13] ACM SIGCOMM Internet measurement conference (Special Interest Group on Data Communications) [14] PC PC UNIX OS libpcap[15] tcpdump[16] libpcap tcpdump Agilent 64 UDP 50,

19 CPU Memory OS VIA C MHz 512M FreeBSD 4.8 Release 6 pcap tcpdump count tcpdump dropped by kernel Pcap dropped by kernel OS

20 C IDS [17][18] systematic

21 7 [17] 10 IETF PSAMP (Packet Sampling) WG[19] MIB RFC DoS [6][20]

22 34 Hours ms 5 Seconds [21]

23 1 (1ms-100ms) 1 1 Internet-Draft IETF [22] [11] [12] IP IP IPv6 IPv6 IPv6-20 -

24 SNORT IPv6 IPv6 IPv6 Snort IDS IPv6 128 IP IPv6 Snort IPv6 IPv6 Snort IPv IPv6 Snort IPv6 IPv6 IPv6 IPv6 (detection plug-in preprocessor ) IPv6 (output plug-in) Snort IP syslog SNMP Trap Syslog IP syslog IPv6 IPv6 Snort PostgreSQL 7.4 IPv6 IPv6 SNMP Trap snort IPv6 [23] IPv6 SNMP IPv6 SNMP IPv6 IPv6 IPv6 IPv6 IETF IPv6 RFC [24][25][26][27][28]

25 Internet-Drafts IPv6 Mobile IPv6 IPSec IPv6 IPv6 IPv6 NETWORLD + INTEROP 2003 TOKYO IPv6 Show Case [29] SNMP IPv6 Show Case SNMP IPv6 SNMP net-snmp [30] IPv6 IPv

26

27 4. 11 IPv

28 4.1. [31] DDoS DNS 230% 30% DDoS DDoS DNS DDOS 3 RTT RTT USC: RTT 120ms CodeRed NIMDA RTT DDoS RTT DNS DDoS DNS

29 4.2. DoS DoS DoS DoS DoS DoS DoS DoS DoS [32] TCP / ICMP / UDP 90% ICMP

30 TTL [32] ICMP ECHO DDoS [33] DDoS DoS

31 1 TCP SYN (to open port) TCP SYN (to closed port) TCP ACK TCP DATA TCP RST TCP NULL ICMP ECHO Request ICMP TS Request UDP pkt (to open port) UDP pkt (to closed port) TCP SYN/ACK TCP RST (ACK) TCP RST (ACK) TCP RST (ACK) no response TCP RST (ACK) ICMP Echo Reply ICMP TS Reply protocol dependent ICMP Port Unreach DoS IP ISP A) B) (Uniformity)

32 SYN-flood Syn-ack Syn-ack TCP-RST TCP ICMP Anderson-Darling DNS BGP IP AS DoS DoS

33 (unsolicited response) 4.3. [34] (Intrusion Detection System : IDS) IDS (NN) IDS IDS

34 IDS IDS IDS IDS MultiLayer Perceptron(MLP) IDS Jake Neural Network Intrusion Detector (NNID)[35] CPU Kymie The Application Of Neural Networks To UNIX Computer Security[36] Anup K. Ghosh Detecting Anomalous and Unknown Intrusions Against Programs[37] James Cannady Artificial Neural Networks for Misuse Detection[38] Probe DoS

35 Zheng Zhang HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification[39] UDP Flood MLP Self Organizing Map(SOM) IDS Peter Lichodzijewski Host-Based Intrusion Detection Using Self-Organizing Maps[40] SOM SOM Anup K. Ghosh Elman Networks MLP Detecting Anomalous and Unknown Intrusions Against Programs Learning Program Behavior Profiles for Intrusion Detection[41] IDS IDS IDS IDS MLP IDS ( ) IDS IDS

36 4.4. IDS Anomaly IDS(Intrusion Detection System) IDS IDS IDS IDS [42] Anomaly (Multivariate) (SPICE ) IDS IDS IDS ( IP Port) IDS IDS IP

37 IDS Snort SPADE[43] IP Port IDS SYN FIN IDS Krugel Service Specific Anomaly Detection for Network Intrusion Detection[44] GET HEAD Matthew C. Mahoney PHAD ALAD [45] PHAD ALAD PHAD ALAD Carol Taylor NATE [46]

38 NATE IDS IDS IP SYN FIN SYN FIN IP Sekar Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusion [47] W. Lee Mining in a data-flow environment: Experience in network intrusion detection [48] Anomaly IDS IDS

39 4.5. [49] OSPF BGP BGP OSPF private peering

40 2. BGP OSPF peering (BGP-MIB OSPF-MIB ) peering

41 LPF(Low Pass Filter) LPF LPF v in LPF vout LPF v v = v out v in out IPv6 IX JGN-IPv6 NSPIXP6[50] IPv IPv6 ( ) 1 14 LPF LPF

42 14 IX 4.7. CSIRT (Computer Security Incident Response Team) CSIRT IETF INCH WG[51] [52] [53] DoS Reflector DRDoS(Distributed Reflection DoS)

43 DoS DoS Reflector Source IP Reflector Source IP [54][55][56] 15 DDoS DDoS reflection SYN flooding attack Source IP IP SYN SYN TCP 3way SYN/ACK SYN Source IP( ) Reflector 3way ACK SYN/ACK SYN/ACK SYN ACK SYN/ACK SYN 3 4 SYN/ACK Reflector

44 Reflector Reflector 16 TCP-SYN 17 A R TCP-SYN R V SYN-ACK V X A TCP-SYN PPS Y V R V R RST A R SYN flood A R V RST 16 TCP-SYN

45 A V 17 Reflector DDoS Pulsing DoS DoS DeS(Degradation of Service) DoS DeS DoS DoS Pulsing DoS Queue Queue TCP TCP [57] 18 Pulse TCP l1 Queue

46 Queue Queue l2 l2 TCP Queue TCP Slow Start TCP Slow Start T TCP TCP 18 Pulsing DoS 4.9. DoS DoS

47 False Positive 19 Anomaly DOS

48 - 45 -

49 LAN

50 Catal 2950G-24 econ-sw6f Catal 2950G-24 Phbox1 econ-sw5f econ- Phbox2 Catal 2950G-24 FS716TXV2 Catalyst G econ-sw4f FS708XL Catalyst2924 Catalyst2924 Catal 2924LX Cisco7204 FPD econ-sw3f Catal 2950G-24 econ-sw2f M/C M/C Catalyst3512XL Apple Talk M/C Corega SW-HUB85W-8L Catalyst3512XL F Catalyst4006 PD CenterCom FS702FCL PD PD F FS724XJ x10 Catal 2924LX M/C PD CenterCom FS708XL PD F F M/C chuzai1 Com SuperStackII SW LAN SW-HUB SNMP 13node phbox LAN phbox2 430 LAN SW-HUB SNMP SW-HUB Ether

51 Port 1 phbox sec F FTP WWW Mail

52 FFT Wavelet 5.3. P2P

53 8 LAN LAN

54 LAN SW-HUB SW-HUB Proxy Proxy ( )

55 ( ) LAN 5.5. POP ( )

56 ( ) SW-HUB P P SW-HUB (Byte) (Byte)

57 - 54 -

58 - 55 -

59 [58][59] IP AS(Autonomous System) 1 AS

60 Top N 1 D(N) 1 Top N D ( N) = Number of packets in TopN group slot Number of packets slot Top N Top N Top 3 D(3) IP Top N

61 21 22 Top N D(N) T TH DT-(N) T T DT+(N) T TH DT-(N) DT+(N) Stable? T t 22 Stability N D(N) Top N N N 2 32 IPv4-58 -

62 Top N 2 N D ( N + 1) D( N) < C Top N N+1 C N+1 C 1% Top N N=14 23 Top N N 22 DT-(N) 2 N N DT-(N) N N

63 N N DT-(N) m 2 ( 1 i m Ni ) ,000 Ni X Y N N DT-(N) 24 10,

64 25 N N m N N N N N m m N N

65 IP TCP

66 N N

67 27 N 28 N

68 29 30 m N m 5, 10, 20, 30, 40, 50 IP m=5 m m= m N

69 30 m N N N 31 N N

70 pkt 32 ( 1000pkt )

71 33 34 N N N 33 N 30,000pkts

72 34 N 30,000pkts 6.2. IP IP IP TTL(Time To Live) ID(Identification) TCP UDP

73 ,000pkt 1000pkt Internet Intranet 35 IP N IP N 10 IP IP (D)DoS 35 IP 36 IP IP N IP

74 36 IP 37 IP TTL TTL TTL OS IP IP TTL IP TTL DDoS

75 37 TTL 38 IP ID N 1 Top 1 1% ID ID TopN

76 38 ID 39 TCP Intranet Web(HTTP) (SMTP)

77 39 TCP 40 TCP Intranet TCP 40 TCP

78 41 TCP TCP TCP TCP N OS TCP IP ID TCP

79 42 43 TCP TCP N

80 43 44 UDP TCP UDP N 44 UDP

81 45 UDP UDP UDP 45 UDP IP N

82 46 IP 47 IP IP N N 47 IP

83 48 TTL N 48 TTL 49 ID 49 ID

84 50 TCP N 50 TCP 51 TCP TCP N 51 TCP

85 52 TCP TCP

86 54 TCP UDP

87 55 UDP 56 UDP UDP 56 UDP

88 IP IP TCP TCP TTL TCP TTL 6.4. TCP Flooding

89 TCP Pulsing DoS DeS Top N TCP Finger printing N 57 TCP TCP ACK TCP

90 57 TCP TCP AR(Ack-Rst)

91 58 (slot1 slot50) Inside Outside AR Outside

92 Outside.210 Inside SYN Half Open SW-HUB

93

94 7. IEEE Network July/August ASIC ASIC NP ASIC NP NP NP NP [60][61] NP NP [62] NP IDS

95 - 92 -

96 WIDE

97

98 WIDE Project, URL

99 1 V. Paxson and S. Floyd, Wide-Area Traffic: The Failure of Poisson Modeling.IEE E/ACM Transactions on Networking, Vol. 3 No. 3, pp , June P. Danzig and S. Jamin, tcplib: A Library of TCP Internetwork Traffic Charact eristics, Report CS-SYS-91-01, Computer Science Department, University of South ern California, 1991, Available via FTP to catatina.usc.edu as pub/jamin/tcplib/tcpl ib.tar.z 3 V. Paxson, Fast,Approximate Synthesis of Fractional Gaussian Noise for Genera ting Self-Similar Network Traffic. Computer Communications Review, V. 27 N. 5, October 1997, pp Paul Barford, Jeffery Kline, David Plonka and Amos Ron "A Signal Analysis of Network Traffic Anomalies", Proceedings of ACM SIGCOMMInternet Measuremen t Workshop M. Robinson, J. Mirkovic, M. Schnaider, S Michel and P. Reiher, Challenges an d Principles of DDoS Defense, submitted to SIGCOMM Rocky K.C. Chang, Hong Kong Polytechnic University, Defending against Floodi ng-based Distributed Denial-of-Service Attacks: Tutorial, IEEE Communications M agazine October The National Laboratory for Applied Network Research, 8 The Cooperative Association for Internet Data Analysis, 9 Huffaker, B., Fomenkov, M., Moore, D., claffy, k., Macroscopic analyses of the in frastructure: measurement and visualization of Internet connectivity and performa nce, Proceedings of PAM MAWI (Measurement and Analysis on the WIDE Internet), p/wg/active/217_mawi.html 11 Kenjiro Cho, Ryo Kaizaki, Akira Kato, Aguri: An Aggregation-Based Traffic Pr ofiler, Quality of Future Internet Services,Coimbre,Portugal,September, Ryo Kaizaki, Osamu Nakamura, Jun Murai, Characteristics of Denial of Servi ce sttacks on Internet using AGURI, The International Conference on Informatio n Networking 2003 Proceedings (vol.1),jeju Korea, Feb PAM2004, April 19-20, 2004, Antibes Juan-les-Pins, France, 4.org/ 14 Internet Measurement Conference 2004, Sponsored by ACM SIGCOMM and in cooperation with USENIX, October 25-27, 2004, Taormina, Sicily, Italy, w.icir.org/vern/imc/

100 15 Steve MaCanne, Craig Leres, Van Jacobson, Network Research Group. Packet Capturing Library, Lawrence Berkeley National Laboratory. ftp:// cap.tar.z 16 tcpdump, 17 K. C. Claffy, G. C. Polyzos, and H-W Braun. Application of Sampling Methodol ogies to Network Traffic Characterisation. In Proceedings of ACM SIGCOMM'93, San Francisco, CA, September (p 65) 18 K.C. Claffy, G.C. Polyzos, and H.-W. Braun. "Application of Sampling Methodol ogies to Network Traffic Characterization", Computer Communication Review, 23 (4): , October IETF WG, Packet Sampling (psamp), arter.html 20 Stefan Savage et.al at, Estimating Global Denial-of-Service Activity NANOG2 2, May 20-22, 2001 Scottsdale, AZ 21 Zhi-Li Zhang, Vinay J. Ribeiro, Sue Moon, and Christophe Diot, Small-Time Sc aling Behaviors of Internet Backbone Traffic: An Empirical Study, the Proceeding s of IEEE INFOCOM 2003, April Glenn MANSFIELD Keeni, The Managed Object Aggregation MIB, work in p rogress, July Management Infromation Base for IP Version 6: Textual Convensions and Gen ral Group, D. Haskin, S. Onishi, Dec. 1998, RFC IP Version 6 Management Information Base for the Transmission Control Prot ocol, M. Daniele, Dec. 1998, RFC IP Version 6 Management Information Base for the User Datagram Protocol, M. Daniele, Dec. 1998, RFC Management Infromation Base for IP Version 6: Textual Convensions and Gen ral Group, D. Haskin, S. Onishi, Dec. 1998, RFC Management Infromation Base for IP Version 6: ICMPv6 Group, D. Haskin, S. Onishi, Dec. 1998, RFC IP Version 6 Management Information Base for the Multicast Listener Discove ry Protocol, B. Haverman, R. Worzella, Jan. 2001, RFC NETWORLD + INTEROP 2003 TOKYO,IPv6 Show Case, p/events/ni2003/_exhibit/_project/ipv6.html 30 net-snmp,

101 31 Kun-chan Lan, Alefiya Hussain and Debojyoti Dutta, The Effect of Malicious T raffic on the Network, In the Proceedings of PAM 2003, April 6-8, La Jolla 32 Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework f or Classifying Denial of Service Attacks. In Proceedings of the ACM SIGCOMM C onference, Karlsruhe, Germany, ACM. August, D. Moore, G. Voelker & S. Savage., "Inferring Internet Denial-of-Service Activit y", USENIX Security Symp, Hussam O.mousa,A Survey and Analysis of Neural Netwrk approaches to Intr usion Detection, SANS institute, 2002/11/12 35 Jake Ryan(1), Meng-Jang Lin(2), and Risto Miikkulainen(1) (2002). Intrusion D etection With Neural Networks, In Jordan, M. I., Kearns, M. J., and Solla, S. A. (editors) Advances in Neural Information Processing Systems 10 (NIPS'97, Denve r, CO), Cambridge, MA: MIT Press, Kymie Tan, The Application Of Neural Networks To UNIX Computer Security Proc. Int. Conf. Neural Networks, ICNN Anup K. Ghosh, James Wanken, Frank Charron, Detectiong Anomalous and U nknown Intrusions Against Programs, Reliable Software Technol., Sterling, VA, US A 38 Cannady, J., Artificial Neural Networks for Misuse Detection, Proceedings of t he 1998 National Information Systems Security Conference (NISSC'98) October Arlington, VA. 39 Zheng Zhang, JunLi C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a H ierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification, Proceedings of the 2001 IEEE, Workshop on Infor mation Assurance and Security, United States Military Academy, West Point, NY, 5-6 June, Peter Lichodzijewski, A. Nur Zincir-Heywood, Malcolm I.Heywood, "Host-Based In trusion Detection Using Self-Organizing Maps", 14th Annual Canadian Informatio n Technology Security Symposium, May Anup K. Ghosh, Aaron Schwartzbard, and Michael Schatz, "Learning Program Behavior Profiles for Intrusion Detection", Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring 42 Review of Anomaly-based Network Intrusion Detection Jonathan Werrett, 2003/ 05/26, 43 Stuart Staniford, James A. Hoagland, and Joseph M. McAlerny. SPADE, Retrieve d May 20th 2003 from the World Wide Web: ice/

102 44 Christopher Krugel, Thomas Toth, and Engin Kirda. Service Specific Anomaly Dete ction for Network Intrusion Detection Proceedings of the ACM Symposium on Appli ed Computing, Matthew C. Mahoney and Philip K. Chan. Learning Nonstarationary Models of No rmal Network Traffic for Detecting Novel Attacks. Proceedings of the Eighth Internati onal Conference of Knowledge Discovery and Data Mining, pp , Retrieve d May 21st 2003 from the World Wide Web: 46 Carol Taylor and Jim Alves-Foss. NATE - Network Analysis of Anomalous Traf fic Events, A Low-Cost Approach. Proceedings of the New Security Paradigms Wo rkshop '01, pp 89-96, September R. Sekar, A. Gupta, J. Frullo, T. Shanbhad, A. Tiwari, H. Yang, and S. Zhou. Specification-based Anomaly Detection: A New Approach for Detectiong Network I ntrusions. Proceedings of the ACM Conference on Computer and Communications Security 2002, November W. Lee, S. J. Stolfo, and K. W. Mok. Mining in a data-flow environment: Expe rience in network intrusion detection. Proceedings of the ACM SIGKDD Internatio nal Conference on Knowledge Discovery & Data Mining (KDD-99), K.Koide, G.Mansfield Keeni, G.Kitagata and N.Shiratori, ``DCAA: A Dynamic Constrained Adaptive Aggregation method for Effective Network Traffic Informatio n Summarization,'' IEICE Transactions on Communications Special Issue on IPv6 Technology (to be appeared in 2004). 50 NSPIXP6: 51 Extended Incident Handling (inch) WG, arter.html 52 Yuri Demchenko, Hiroyuki Ohno, Glenn M Keeni, Requirements for Format for INcident information Exchange (FINE), work in progress, October, 2003, ww.ietf.org/internet-drafts/draft-ietf-inch-requirements-02.txt 53 J. Meijer, R. Danyliw, Y. Demchenko, The Incident Data Exchange Format Dat a Model and XML Implementation, work in progress, September 29, 2003, Steve Gibson, ``DRDoS'', 55 Vern Paxson, ``An Analysis of Using Reflectors for Distributed Denial-of-Servic e Attacks'', Computer Communication Review 31(3),July Rodney Denno ``A Next-Generation DoS Attack: Distributed Reflection'', Aleksandar Kuzmanovic, Edward W. Knightly, Low-Rate TCP-Targeted Denial

103 of Service Attacks, Proceedings of ACM SIGCOMM 2003, August 25-29, S. Uhlig and O. Bonaventure, "Implications of interdomain traffic characterist ics on traffic engineering", European Transactions on Telecommunications, special issue on traffic engineering, B. Quoitin, S. Tandel, S. Uhlig, and O. Bonaventure, "Interdomain Traffic Engi neering with Redistribution Communities", Preprint submitted to Elsevier Science 60 Mohammad Peyravian, Gordon Davis, and Jean Calvignac, Search Engine Im plications for network Processor Efficiency, IEEE Network July/August Frank T. Hady, Tony Bock, Mason Cabat, Jim Chu, Jeff Meinecke, Ken Oliver, and Wes Talarek, Platform Level Support for High Throughput Edge Application s: The Twin Cities Prototype, IEEE Network July/August Ying-Dar Lin and Yi-Neng Lin, Shun-Chin Yang and Yu-Sheng Lin, DiffServ Edge Routers over Network Processors: Implementation and Evaluation, IEEE Ne twork July/August

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó 1 2011 5 11 lumeta internet mapping http://www.lumeta.com http://www.cheswick.com/ches/map/ 2 / 43 ( ) 3 / 43 (Kenjiro Cho) WIDE 1984 ( ) OS 1993 1996 ( ) (QoS ) 2001 ( ) 2004 ( ) QoS 4 / 43 (Internet

More information

2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP

2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP 1.,.. 2 OSI,,,,,,,,, TCP/IP,, IP, ICMP, ARP, TCP, UDP, FTP, TELNET, ssh,,,,,,,, IP,,, 3 OSI OSI(Open Systems Interconnection: ). 1 OSI 7. ( 1) 4 ( 4),,,,.,.,..,,... 1 2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP,

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

ルータ(IPv6)掲示用池田.PDF

ルータ(IPv6)掲示用池田.PDF JEITA IPv6 - IPv6-1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 2 1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 3 (1) 4 2 (2) IP(Internet Protocol - - A A 5 (3) IPv6 AP AP TCP IP TCP IP 6 3 TCP/IP(v6) TELNET FTP TFTP

More information

3. LISP B EID RLOC ETR B 4. ETR B ITR A 1: LISP 5. ITR A B EID RLOC 6. A SYN 7. ITR A ITR A B EID RLOC SYN ITR A RLOC ETR B RLOC 8. ETR B SYN ETR B B

3. LISP B EID RLOC ETR B 4. ETR B ITR A 1: LISP 5. ITR A B EID RLOC 6. A SYN 7. ITR A ITR A B EID RLOC SYN ITR A RLOC ETR B RLOC 8. ETR B SYN ETR B B L-020 SYN Cookies Locator/ID Separation Protocol Locator/ID Separation Protocol implementation considering SYN Cookies Watanabe Takaya Takashi Imaizumi 1. AS Autonomous System ISP IETF Locator/ID Separation

More information

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of

More information

TCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)

TCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18) 3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments

More information

橡c03tcp詳説(3/24修正版).PDF

橡c03tcp詳説(3/24修正版).PDF 1 1 2 TCP 1 3 TCP 9 4 TCP 15 5 21 6 TCP 25 7 27 TCP 1 TCP Windows98 Linux Solaris TCP(Transmission Control Protocol) IP TCP UDP UDP TCP UDP TCP 1 TCP RFC793 RFC2581 TCP 4-1 - DataLink header IP header

More information

untitled

untitled 25: Part ( ) Chief Technology Officer mshindo@fivefront.com SNMP MRTG HP/OV RMON INTERNET WEEK 2006/12/08 Copyright 2006 Fivefront Corporation, All Rights Reserved. 2 1 SNMP IfInUcastPkts, IfOutUcastPkts

More information

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF. 2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

total-all-nt.dvi

total-all-nt.dvi XI W I D E P R O J E C T 1 WIDE Reliable Multicast 1.1 TV 1 1 TCP WIDE JGN/JB SOI (DV) Reliable Multicast (RM) US Reliable Multicast IETF RMT-WG PGM Digital Fountain FEC Tornado Code Ruby Code 1.2 WIDE

More information

DNS: Domain Name

DNS: Domain Name 2012 DNS 2012 8 2 5110B140-4 1 5 1.1..................................... 5 1.2..................................... 6 1.3.................................... 6 2 DNS: Domain Name System 7 2.1...................................

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

worm hoihoi

worm hoihoi true@sfc.wide.ad.jp / (IDS, Honeypot), Web / : Darknet AS65531 10.0.0.0/8 Prefix longest match next hop AS Internet Customer A 10.1.0.0/16 AS 65531 10.0.0.0/8 Customer B 10.2.0.0/16 ( ) The Team Cymru

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

i TCP/IP NIC Intel 3com NIC TCP/IP *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP *1 3

i TCP/IP NIC Intel 3com NIC TCP/IP *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP *1 3 i TCP/IP NIC Intel 3com NIC TCP/IP 78 90 500 *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP 79 80 *1 3 ii IPv4 IPv4 *2 *3 IPv6 5 IPv6 UDP UDP IP UDP IP TCP/IP IPv6 IPv4 TCP/IP IPv6 TCP/IP TCP/IP TCP/IP TCP/IP IPv6

More information

I TCP 1/2 1

I TCP 1/2 1 I TCP 1/2 1 Transport layer: a birds-eye view Hosts maintain state for each transport endpoint Routers don t maintain perhost state H R R R R H Transport IP IP IP IP IP Copyright(C)2011 Youki Kadobayashi.

More information

untitled

untitled Section 1 5 6 MRTG 7 Prefix RMON NetFlow NetFlow NetFlow Data Collector DB Subnet B B Router = Exporter Subnet A AS IP Prefix 1 8 Subnet B Router = Exporter AS AS Prefix 2 NetFlow Version 5 AS AS Peer

More information

untitled

untitled ICMP 0466-XX-1395 t04000aa@sfc.keio.ac.jp 133.113.215.10 (ipv4) 2001:200:0:8803::53 (ipv6) (FQDN: Fully Qualified Domain Name) ( www.keio.ac.jp 131.113.215.10 /MAC ID 00:11:24:79:8e:82 Port Port = = Port

More information

インターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show

インターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo ShowNet syslog Proposal of the anomaly detection method analyzing syslog data using Bollinger Bands algorithm on event network Hiroshi Abe 1,2,a) Mikifumi

More information

wide93.dvi

wide93.dvi 5 161 1 1.1 DDT WG DDT WG 1. \DDT" 2. DDT WG DDT WG 1.2 x ( IP) y ( X.25) x y \x overy" x y 1.1 IP X.25 IP IP IPX Appletalk OSI IP \encapsulation" \encapsulation header" \decapsulation" 163 164 1993 WIDE

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 2 3 4 LAN ISDN/ NAT (LAN#) (PP#) (TUNNEL#) + R 5 ----------< >---------- ----------< >---------- 6 IPv6 VPN ping IPsec PPTP ICMP (1) TCP (6) UDP (17) IPv6 (41) AH (51) ESP (50) GRE (47) IPv4

More information

untitled

untitled ()IP OSI ( ) (TCP/IP)TCP UDP ( ) IP + IP TCP / Web TCP/UDP IP / LAN IM xdsl/ () (FAX) 6bit(6556) FAX FAX ( ) UDP/TCP UDP(User Datagram Protocol) CL (Connectionless) TCP(Transmission Control Protocol) CO

More information

PIM-SM,PIM-SSM,PIM-DM,MOSPF ( ) ( ) () ( ) 1 2 MAC (FDB: ) 3 MAC MAC ( ) IP ( ) ( ) 1 2 SDN(Software Defined Network) 1 2 MAC

PIM-SM,PIM-SSM,PIM-DM,MOSPF ( ) ( ) () ( ) 1 2 MAC (FDB: ) 3 MAC MAC ( ) IP ( ) ( ) 1 2 SDN(Software Defined Network) 1 2 MAC SDN a),b) c),a) a) a),d) A study of quantitative performance measurement on SDN environment Seiichi YAMAMOTO a),b), Wataru NISHIGATA c),a), Kosuke UEDA a), and Eiji KAWAI a),d) SDN OpenFlow () ryu,trema

More information

,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN

,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN DEIM Forum 2018 F1-1 LAN LSTM 112 8610 2-1-1 163-8677 1-24-2 E-mail: aoi@ogl.is.ocha.ac.jp, oguchi@is.ocha.ac.jp, sane@cc.kogakuin.ac.jp,,.,,., LAN,. Android LAN,. LSTM LAN., LSTM, Analysis of Packet of

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

スライド 1

スライド 1 WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client

More information

wide96.dvi

wide96.dvi 10 245 1 WIDE MAWI WG SNMP WWW WIDE TCP 1. SNMP 2. TCP 247 2 SNMP 2.1 MAWI( NetStat) WIDE NNStat WIDE NOC NNStat SNMP(Simple Network Management Protocol) SNMP SNMP SNMP TCP/IP WWW SNMP SNMP HTML MRTG(Multi

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 RT140i #1(PPP) RT105i RTA52i R (PP#) (LAN#) [NAT] R LAN LAN 2 #2() RT300i RTW65b RT140e RT105e (LAN2) R (LAN1) RTA55i R LAN LAN 3 #3(PPPoE) R (LAN#) (PP#) (PP#) LAN ISDN/ LAN 4 RT300i RT105 #4(VPN) R

More information

卒研 .PDF

卒研 .PDF 1. ------------------------------------------------------------------------------------------2 2. ---------------------------------------------------------------------------3 2.1 2.2 2.3 OSI 2.4 TCP/IP

More information

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi 3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.

More information

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N GPU 1 1 2 1, 3 2, 3 (Graphics Unit: GPU) GPU GPU GPU Evaluation of GPU Computing Based on An Automatic Program Generation Technology Makoto Sugawara, 1 Katsuto Sato, 1 Kazuhiko Komatsu, 2 Hiroyuki Takizawa

More information

IEEE e

IEEE e 2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN

More information

2-20030509.PDF

2-20030509.PDF JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC

More information

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/

More information

LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson, et al. LAN P P Peer-to-Peer Gember, et al. UDP HTTP L

LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson, et al. LAN P P Peer-to-Peer Gember, et al. UDP HTTP L LAN PC LAN LAN LAN LAN LAN LAN 1 はじめに WWW World Wide Web Windows WWW Tim Berners Lee THIS IS FOR EVERYONE PC PC LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson,

More information

main2.dvi

main2.dvi 15 WWW 501 1 W4C WG 1 WWW (HTTP[53, 22]) WIDE WWW 1997 3 WIDE WWW WIDE CacheBone WG 2 WWW WG WWW W4C WG 2 WIDE CacheBone 3 4 5 6 WWW 1 W4C WG:WIDE World-Wide Web Cache Working Group 503 2 WIDE CacheBone

More information

IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2

IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 IP 2010 10 1 1 IP (IP ) 2 IP IP 2.1 IP (IP ) 1 IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 4 1,2 4.1 (Protocol) IP:Internet Protocol) 4.2 internet The Internet (internet)

More information

No.208_honbun.indd

No.208_honbun.indd ISSN 0386-7889 No.208 interview 2016.3 March special issue topics info 1 2 challenge trend Japan Data Communications Association CONTENTS 2016.3 March No.208 foreword 1 interview 2 special issue 8 topics

More information

QoS Intserv diffserv 1998 12 16 Internet Week 98 Internet Week98 1998 Kenjiro Cho, Japan Network Information Center 1 3 QoS Intserv RSVP QoS Diff-serv 2 QoS ISP 3 2.1 FAX LAN WAN LAN WAN Heavy Tail WWW

More information

SEJulyMs更新V7

SEJulyMs更新V7 1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples

More information

Contents Part1: TCP Part2: TCP Part3: TCP Part4: Part5: TCP Part6:

Contents Part1: TCP Part2: TCP Part3: TCP Part4: Part5: TCP Part6: TCP Yoshifumi Nishida nishida@csl.sony.co.jp Contents Part1: TCP Part2: TCP Part3: TCP Part4: Part5: TCP Part6: TCP TCP TCP Transmission Control Protocol IP TCP application TCP UDP IP DataLink header IP

More information

IP IP DHCP..

IP IP DHCP.. NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

Computer Security Symposium October 2015 DDoS

Computer Security Symposium October 2015 DDoS Computer Security Symposium 2015 21-23 October 2015 DDoS 657-8501 1-1 146t255t@stu.kobe-u.ac.jp kitazono@eedept.kobe-u.ac.jp ozawasei@kobe-u.ac.jp 184-8795 4-2-1 bantao@nict.go.jp nakazato@nict.go.jp 141-0031

More information

SICE東北支部研究集会資料(2017年)

SICE東北支部研究集会資料(2017年) 307 (2017.2.27) 307-8 Deep Convolutional Neural Network X Detecting Masses in Mammograms Based on Transfer Learning of A Deep Convolutional Neural Network Shintaro Suzuki, Xiaoyong Zhang, Noriyasu Homma,

More information

untitled

untitled IPv6 IPv4 I / 9 1 CIDR,, NAT IP IPv6 I / 9 2 I / 9 3 1 CIDR Classless Inter-Domain Routing RFC1519 IPv4 CIDR IPng (=IPv6) I / 9 4 Growth in BGP Route Table 90000 80000 Source: http//www.telstra.net/ ops/bgptable.html

More information

snortの機能を使い尽くす & hogwashも使ってみる

snortの機能を使い尽くす & hogwashも使ってみる presented by P snort hogwash snort1.8.2(3) Martin Roesch IDS IDS hogwash snort1.7 FW+NIDS 100M IP IP snort./configure;make su make install configure Flexresp database snmp snmp alert idmef xml smbalert

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

C everywhere Aoyama Morikawa Laboratory 2

C everywhere Aoyama Morikawa Laboratory 2 2004.04.16 1 3C everywhere Aoyama Morikawa Laboratory 2 3C Everywhere Computing everywhere PDA, Contents everywhere XML mp3 1 terabyte 1 zettabyte (10 21 ) Connectivity everywhere 2G/3G/4G LAN DSL, DSRC,

More information

LSM-L3-24設定ガイド(初版)

LSM-L3-24設定ガイド(初版) 4 2 IP 3 2 MAC VLAN 1 MAC MAC 4-1 2 4-2 VLAN classification VLAN Learning Filtering Forwarding VLAN classification learning filtering forwarding VLAN Classification 2 : - VLAN - VLAN ID Learning VLAN classification

More information

IAAシステムの現状とその課題

IAAシステムの現状とその課題 IAA The state of the IAA disaster communication systems Yukimitsu Izawa Masahiko Kimoto Nobuhiko Tada Hiroyuki Ohno Yoichi Shinoda WIDE1995 IAA 1 IAA WIDE 1995 (IAA ) IAA WIDE IAA School of Information

More information

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用) Mac OS X Server QuickTime Streaming Server 5.0 Mac OS X Server 10.3 apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. QuickTime Streaming Server Apple Apple Computer, Inc. Apple

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality

More information

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

TTC技術書

TTC技術書 JJ-20.24 Private Integrated Services Network(PISN)- Signalling protocols for IP-based connections as Inter-PINX Connections 2003 4 23 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE ...5...6...6...6...7...7...7...7...7...7...7...7...7...7

More information

Motivation 3 Motivation 4 (Availability) Keep High Availability Providing Reliable Service (New service, function) Provide new Services, with new func

Motivation 3 Motivation 4 (Availability) Keep High Availability Providing Reliable Service (New service, function) Provide new Services, with new func VPLS daisuke.koshiro@tm.softbank.co.jp 1 Agenda Motivation VPLS VPLS VPLS 2 Motivation 3 Motivation 4 (Availability) Keep High Availability Providing Reliable Service (New service, function) Provide new

More information

C08.PDF

C08.PDF QoS Diffserv 1999 12 14 Internet Week 99 Internet Week 99 1999 kenjiro Cho, Japan Network Information Center 1 DiffServ DiffServ DiffServ DiffServ 2 DiffServ congestion 90 IP IP 3 QoS 3.1 QoS QoSQuality

More information

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN

More information

Si-R30取扱説明書

Si-R30取扱説明書 IP 317 318 IP 319 322 327 332 335 337 339 339 340 342 DNS ProxyDNS 344 DNS 344 DNS 348 DNS 349 DNS 350 DHCP 352 DHCP 353 DHCP 355 NAT 35 NAT 359 30 34 ID 38 371 374 CBCP 375 CBCP 377 379 380 TA 382 URL

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

IP IPv4-IPv6

IP IPv4-IPv6 IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

IPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1.

IPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1. HARK-Binaural Raspberry Pi 2 1,a) 1 1 1 2 3 () HARK 2 HARK-Binaural A/D Raspberry Pi 2 1. [1,2] [2 5] () HARK (Honda Research Institute Japan audition for robots with Kyoto University) *1 GUI ( 1) Python

More information

untitled

untitled The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD

More information

Microsoft PowerPoint - css2013_3A4_1_slide.ppt

Microsoft PowerPoint - css2013_3A4_1_slide.ppt TCP 再送信タイマ管理の変更による 低量 DoS 攻撃被害の緩和効果 CSS2013 2013 年 10 月 23 日 ( 水 ) 発表 :3A4-1 細井琢朗 ( 東京大学 ) 松浦幹太 ( 東京大学 ) TCP 再送信タイマ 低量 DoS 攻撃 文献 [5] の提案方式 被害のモデル化 元の方式での被害見積り 提案方式の緩和効果 解析的調査 まとめ [5] 細井琢朗 松浦幹太 低量 DoS 攻撃を緩和する

More information

main.dvi

main.dvi FDTD S A Study on FDTD Analysis based on S-Parameter 18 2 7 04GD168 FDTD FDTD S S FDTD S S S S FDTD FDTD i 1 1 1.1 FDTD.................................... 1 1.2 FDTD..................... 3 2 S 5 2.1 FDTD

More information

22 / ( ) OD (Origin-Destination)

22 / ( ) OD (Origin-Destination) 23 2 15 22 / ( ) OD (Origin-Destination) 1 1 2 3 2.1....................................... 3 2.2......................................... 3 2.3.......................................... 5 2.4............................

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 337-87 37 E-mail: {m199,miyoshi}@shibaura-it.ac.jp, olivier.fourmaux@upmc.fr P2P P2P ISP Internet Service

More information

橡Ⅲ検証実験編.PDF

橡Ⅲ検証実験編.PDF .......... 2 ANTI-DO S... 3 2.... 4... 5... 6 DO S... 7 DOS... 8 DDOS... 9... 2... 2... 4 ANTI-DO S... 6 ANTI-DOS... 6 ANTI-DOS... 6 ANTI-DOS... 2 3.... 27... 28... 29... 29... 30... 32... 32... 34 . 3

More information

Web Social Networking Service Virtual Private Network 84

Web Social Networking Service Virtual Private Network 84 Promising business utilized five senses information media through the Next Generation Network Toshio ASANO Next Generation Network 2004 11 2010 6,000 3,000 2006 12 2008 83 Web Social Networking Service

More information

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3

More information

template.dvi

template.dvi XXIII W I D E P R O J E C T 23 OSPF 1 Deep Space One StarBED GARIT VM Nebula 2008 Deep Space One Nerdbox Freaks Nerdbox Freaks StarBED StarBED Deep Space One Nerdbox Freaks DeepSpaceOne StarPOD XBurner

More information

TCP-STAR a) Implementation and Evaluation of TCP-STAR: TCP Congestion Control Method for Satellite Internet Hiroyasu OBATA a), Kazuhiro TAIRA, and Ken

TCP-STAR a) Implementation and Evaluation of TCP-STAR: TCP Congestion Control Method for Satellite Internet Hiroyasu OBATA a), Kazuhiro TAIRA, and Ken TCP-STAR a) Implementation and Evaluation of TCP-STAR: TCP Congestion Control Method for Satellite Internet Hiroyasu OBATA a), Kazuhiro TAIRA, and Kenji ISHIDA TCP NewReno TCP TCP-STAR TCP-STAR TCP TCP-STAR

More information

wide97.dvi

wide97.dvi 4 139 1 WIDE MAWI WG MRTG(Multi Router Trac Grapher) WWW NNStat tcpdump - 1. WIDE 2. - 141 2 WIDE 2.1 MAWI WG NetStat WG WIDE WIDE Sun Microsystems NOC WG NNStat tcpdump Cisco NNStat MAC NOC NNStat tcpdump

More information

IPv6 IPv IETF IPv6 2

IPv6 IPv IETF IPv6 2 IPv6 IPv6 2003 2 3 1 IETF IPv6 2 2001, 2002 RIR IPv6 IETF IPv6 3 IETF (1/2) IETF (Internet Engineering Task Force) IPv6 WG 2001 IPng (IP Next Generation) WG IPv6 WG IPng Home Page: http://playground.sun.com/ipng

More information

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4 G-002 R Database and R-Wave Detecting System for Utilizing ECG Data Takeshi Nagatomo Ikuko Shimizu Takeshi Ikeda Akio Sashima Koichi Kurumatani R R MIT-BIH R 90% 1. R R [1] 2 24 16 Tokyo University of

More information

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system Study of Health Monitoring of Vehicle Structure by Using Feature Extraction based on Discrete Wavelet Transform Akihisa TABATA *4, Yoshio AOKI, Kazutaka ANDO and Masataka KATO Department of Precision Machinery

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information