• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Next Generation Automatic Trace Back System for Broad Unlawful Access Based on Time-Series Analysis of Trafic Patterns

Research Project

Project/Area Number 14380172
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field 情報システム学(含情報図書館学)
Research InstitutionTohoku University

Principal Investigator

NEMOTO Yoshiaki  Tohoku University, Graduate School of information Sciences, Professor, 大学院・情報科学研究科, 教授 (60005527)

Co-Investigator(Kenkyū-buntansha) OHTA Kohei  Cyber Solutions Inc., Senior Researcher, ソリューションズ, 主任研究員
KATO Nei  Tohoku University, Graduate School of Information Sciences, Professor, 大学院・情報科学研究科, 教授 (00236168)
Project Period (FY) 2002 – 2003
Project Status Completed (Fiscal Year 2003)
Budget Amount *help
¥6,300,000 (Direct Cost: ¥6,300,000)
Fiscal Year 2003: ¥2,100,000 (Direct Cost: ¥2,100,000)
Fiscal Year 2002: ¥4,200,000 (Direct Cost: ¥4,200,000)
KeywordsDenial of Service / Traffic Patten / Quadratic Problem / Auto Regressive / IP Spoofing / Trace Back / DoS攻 / 自動追跡 / SNMP / DoS(Denial of Service) / 時系列解析
Research Abstract

Denial of Service (DoS) attack is the threat of an information society and difficult to defense. In order to avoid the damage by the DoS attacks, it is necessary to trace back the attack path because of IP spoofing of attackers hosts. In this research, we proposed a new concept that can overcome the IP spoofing problem, based on Traffic Pattern which is change in packet numbers over time.
We first constructed a monitoring system for Traffic Patterns. Then we proposed a new algorithm to detect the DoS attacks and trace back the attack path using Traffic Patterns. The detecting algorithm adopts a predicti6n method and achieves high detection accuracy. And the trace back algorithm is based on quadratic problem which can solve the combinatorial problem among the Traffic Patterns.
Our experiments showed that the Traffic Pattern concept can trace back the attack path and overcome the IP spoofing problem.

Report

(3 results)
  • 2003 Annual Research Report   Final Research Report Summary
  • 2002 Annual Research Report
  • Research Products

    (20 results)

All Other

All Publications (20 results)

  • [Publications] 和泉 勇治, 宇津江 康太, 加藤 寧, 根元 義章: "リンクの輻輳状態を考慮した動的なミラーサーバ選択方式"情報処理学会論文誌. 45. 65-73 (2004)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] H.TSUNODA, K.OHTA, N.KATO, Y.NEMOTO: "Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management"IEEE Journal on Selected Areas in Communications. (to be published).

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] 角田 裕, 太田 耕平, 加藤 寧, 根元 義章: "TTL情報を用いたLEO衛星ネットワークにおけるTCPの誤再送回避手法"電子情報通信学会論文誌. J86-B. 1570-1577 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Tarik TALEB, Nei Kato, Yoshiaki Nemoto: "Neighbors-buffering-based video-on-demand architecture"Image Communication. 18. 515-520 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] 油川 良太, 太田 耕平, 加藤 寧, 根元 義章: "分散型ネットワークモニタリングによる不正アクセス早期検出システム"電子情報通信学会論文誌. J86-B. 410-418 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] 坂口 薫, 和泉 勇治, 太田 耕平, 加藤 寧, 根元 義章: "2次計画法に基づいたトラヒックパターンの比較によるDoSの追跡"電子情報通信学会論文誌. J86-B. 1295-1303 (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Y.Waizumi, K.Utsue, N.Kato, Y.Nemoto: "Dynamic Mirror Server Selection Method with consideration about Congestion of Link"IPSJ TRANS. 45. 65-73 (2004)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] H.TSUNODA, K.OHTA, N.KATO, Y.NEMOTO: "Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management"IEEE Journal of Selected Areas in Communications. (to be published).

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] Tarik TLEB, Nei Kato, Yoshiaki Nemoto: "Neighbors-buffering-based video-on-demand architecture"Image Communication. 18. 515-520 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] R.ABURAKAWA, K.OHTA, N.KATO, Y.NEMOTO: "An Early Warning System for Illegal Access based on Distributed Network Monitoring"IEICE Trans on Info.and Comm.. J86-B. 410-418 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] K.SAKAGUCHI, Y.WAIZUMI, K.OHTA, N.KATO, Y.NEMOTO: "Tracing DDoS Attacks by comparing Traffic Patterns Based on Quadratic Problem"IEICE Trans on Info.and Comm.. J86-B. 1295-1303 (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2003 Final Research Report Summary
  • [Publications] 和泉 勇治, 宇津江 康太, 加藤 寧, 根元 義章: "リンクの輻輳状態を考慮した動的なミラーサーバ選択方式"情報処理学会論文誌. Vol.45 No.1. 65-73 (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] Hiroshi TSUNODA, Kohei OHTA, Nei KATO, Yoshiaki Nemoto: "Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management"IEEE Journal on Selected Areas in Communications. (印刷中). (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] Tarik TALEB, Nei Kato, Yoshiaki Nemoto: "Neighbors-buffering-based video-on demand architecure"IEEE Journal on Selected Areas in Communications. (印刷中). (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] 油川 良太, 太田 耕平, 加藤 寧, 根元 義章: "分散型ネットワークモニタリングによる不正アクセス早期検出システム"電子情報通信学会論文誌B. Vol.J86-B No.3. 410-418 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] 金丸 朗, 和泉 勇治, 太田 耕平, 加藤 寧, 根元 義章: "マルチステージ型分散トラヒックモニタリングシステムの提案と評価"電子情報通信学会論文誌B. Vol.J85-B No.2. 1285-1294 (2002)

    • Related Report
      2003 Annual Research Report
  • [Publications] 坂口 薫, 和泉 勇治, 太田 耕平, 加藤 寧, 根元 義章: "2次計画法に基づいたトラヒックパターンの比較によるDoSの追跡"電子情報通信学会論文誌B. Vol.J85-B No.8. 1295-1903 (2002)

    • Related Report
      2003 Annual Research Report
  • [Publications] 坂口 薫: "2次計画法に基づいたトラヒックパターンの比較によるDoSの追跡"電子情報通信学会論文誌(B). J85・B・7. 1295-1303 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 金丸 朗: "マルチステージ型分散トラヒックモニタリングシステムの提案と評価"電子情報通信学会論文誌(B). J85・B・7. 1285-1294 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 油川 良太: "分散型ネットワークモニタリングによる不正アクセス早期検出システム"電子情報通信学会論文誌(B). (印刷中). (2003)

    • Related Report
      2002 Annual Research Report

URL: 

Published: 2002-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi