• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on dynamic network technology capable of automatic recovery and operation maintenance

Research Project

Project/Area Number 17K06455
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Communication/Network engineering
Research Institution防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群)

Principal Investigator

Tanaka Hidema  防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群), 電気情報学群, 教授 (30328570)

Project Period (FY) 2017-04-01 – 2023-03-31
Project Status Completed (Fiscal Year 2022)
Budget Amount *help
¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2021: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2020: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2019: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2017: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Keywords情報セキュリティ / ネットワークセキュリティ / 擬似乱数 / LWE問題 / Integral property / パスワード強度評価 / マルコフ過程 / 視覚秘密分散 / 情報理論的安全性 / BKZアルゴリズム / AS / 位置情報 / 秘密計算 / WOTS+ / 混合整数線形計画法 / 軽量ブロック暗号 / 代数的攻撃手法 / Division Property / 消失誤り訂正符号 / 条件付き閾値秘密分散 / MILP / proxyログ解析 / 機械学習 / Linguistic Approach / サイドチャネル攻撃 / AMP攻撃 / Slow read dos 攻撃 / 仮想環境 / 秘密分散 / セキュアルーティング / トポロジーマップ / 再生成符号 / 代数的手法
Outline of Final Research Achievements

At first, the main purpose was to demonstrate by HW simulations, but due to the change of the affiliated organization and the speed of deployment of SDN technology, the planned research activity was changed significantly. It is mainly based on theoretical results, and is classified into security evaluation methods based on pseudo-randomness, strength evaluation of security technology based on information theory methods and AI technology, and network defense method based on graph theory. There were 21 papers including high-level peer-reviewed international conferences, and 7 conference presentations.

Academic Significance and Societal Importance of the Research Achievements

主たる研究成果は基礎理論にであるものの、実用性や現在のセキュリティ状況を鑑みたテーマを扱っている。ヒューリスティックに安全性が信じられ運用されている技術に関しても安全性の根拠を明らかにしたり、安全性を達成するための条件を明確にするなど、今後のセキュリティ技術の適用や実装に関する知見を提供できたという点で貢献は大きい。

Report

(7 results)
  • 2022 Annual Research Report   Final Research Report ( PDF )
  • 2021 Research-status Report
  • 2020 Research-status Report
  • 2019 Research-status Report
  • 2018 Research-status Report
  • 2017 Research-status Report
  • Research Products

    (25 results)

All 2022 2021 2020 2019 2018 2017

All Journal Article (18 results) (of which Peer Reviewed: 18 results,  Open Access: 1 results) Presentation (7 results) (of which Int'l Joint Research: 3 results)

  • [Journal Article] Improved scheme and evaluation method for progressive visual cryptography2022

    • Author(s)
      Le Thanh Thai Binh、Tanaka Hidema、Watanabe Kohtaro
    • Journal Title

      EURASIP Journal on Information Security

      Volume: 2022 Issue: 1 Pages: 1-13

    • DOI

      10.1186/s13635-022-00136-7

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Experimental Verification of?Estimated Block Size of?BKZ Algorithm Against LWE2021

    • Author(s)
      Takeshige Amane、Kosuge Haruhisa、Tanaka Hidema
    • Journal Title

      Book cover International Conference on Information Systems Security

      Volume: LNCS 13146 Pages: 173-184

    • DOI

      10.1007/978-3-030-92571-0_11

    • ISBN
      9783030925703, 9783030925710
    • Related Report
      2021 Research-status Report
    • Peer Reviewed
  • [Journal Article] Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information2020

    • Author(s)
      Tanaka Hidema、Fukushima Keisuke
    • Journal Title

      Information System Security

      Volume: LNCS 12553 Pages: 221-240

    • DOI

      10.1007/978-3-030-65610-2_14

    • ISBN
      9783030656096, 9783030656102
    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs2018

    • Author(s)
      Mamoru Mimura Hidema Tanaka
    • Journal Title

      Information and Communications Security - 20th International Conference

      Volume: 11149 Pages: 708-718

    • DOI

      10.1007/978-3-030-01950-1_42

    • ISBN
      9783030019495, 9783030019501
    • Related Report
      2018 Research-status Report
    • Peer Reviewed
  • [Journal Article] Reading Network Packets as a Natural Language for Intrusion Detection2018

    • Author(s)
      Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Security and Cryptology ICISC 2017

      Volume: 10779 Pages: 339-350

    • DOI

      10.1007/978-3-319-78556-1_19

    • ISBN
      9783319785554, 9783319785561
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration2017

    • Author(s)
      Kosuge Haruhisa、Tanaka Hidema
    • Journal Title

      Progress in Cryptology - AFRICACRYPT 2017

      Volume: 10239 Pages: 95-113

    • DOI

      10.1007/978-3-319-57339-7_6

    • ISBN
      9783319573380, 9783319573397
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Improvements on Security Evaluation of AES against Differential Bias Attack2017

    • Author(s)
      Haruhisa KOSUGE Hidema TANAKA
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 11 Pages: 2398-2407

    • DOI

      10.1587/transfun.E100.A.2398

    • NAID

      130006191409

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs2017

    • Author(s)
      Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka
    • Journal Title

      2017 12th Asia Joint Conference on Information Security (AsiaJCIS)

      Volume: 1 Pages: 31-37

    • DOI

      10.1109/asiajcis.2017.13

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec2017

    • Author(s)
      Mamoru Mimura, Hidema Tanaka
    • Journal Title

      Computing and Networking (CANDAR) 2017 Fifth International Symposium on

      Volume: 1 Pages: 456-462

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?2017

    • Author(s)
      Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka, Atsuhiro Goto
    • Journal Title

      Computing and Networking (CANDAR) 2017 Fifth International Symposium on

      Volume: 1 Pages: 337-343

    • NAID

      170000176493

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication Environment2017

    • Author(s)
      Shunsuke Tayama, Hidema Tanaka
    • Journal Title

      Computing and Networking (CANDAR) 2017 Fifth International Symposium on

      Volume: 1 Pages: 510-515

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector2017

    • Author(s)
      Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Systems Security

      Volume: 10717 Pages: 146-163

    • DOI

      10.1007/978-3-319-72598-7_9

    • ISBN
      9783319725970, 9783319725987
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Leveraging Man-in-the-middle DoS Attack with?Internal TCP Retransmissions in?Virtual?Network2017

    • Author(s)
      Nguyen Son Duc、Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Systems Security

      Volume: 10717 Pages: 367-386

    • DOI

      10.1007/978-3-319-72598-7_23

    • ISBN
      9783319725970, 9783319725987
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Dark Domain Name Attack: A New Threat to?Domain Name System2017

    • Author(s)
      Munkhbaatar Bold、Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Systems Security

      Volume: 10717 Pages: 405-414

    • DOI

      10.1007/978-3-319-72598-7_25

    • ISBN
      9783319725970, 9783319725987
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] TOPOLOGY MAP ANALYSIS FOR EFFECTIVE CHOICE OF NETWORK ATTACK SCENARIO2017

    • Author(s)
      Hidema Tanaka
    • Journal Title

      International Journal of Computer Networks & Communications

      Volume: vol.9 no.6 Issue: 6 Pages: 101-117

    • DOI

      10.5121/ijcnc.2017.9608

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS2017

    • Author(s)
      Hidema Tanaka
    • Journal Title

      International Journal of Network Security & Its Applications

      Volume: vol.9 no.6 Issue: 6 Pages: 1-11

    • DOI

      10.5121/ijnsa.2017.9601

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Analysis of Slow Read DoS Attack and Communication Environment2017

    • Author(s)
      Shunsuke Tayama, Hidema Tanaka
    • Journal Title

      Mobile and Wireless Technologies 2017

      Volume: 425 Pages: 350-359

    • DOI

      10.1007/978-981-10-5281-1_38

    • ISBN
      9789811052804, 9789811052811
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Study on Effectiveness of Network Attack Using Analysis of Eigenvalue2017

    • Author(s)
      Ayumi Ishimaru, Hidema Tanaka
    • Journal Title

      Mobile and Wireless Technologies 2017

      Volume: 425 Pages: 340-349

    • DOI

      10.1007/978-981-10-5281-1_37

    • NAID

      170000173780

    • ISBN
      9789811052804, 9789811052811
    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Presentation] An analysis of password security risk against dictionary attacks2022

    • Author(s)
      Binh Thanh Thai Le、 Hidema Tanaka
    • Organizer
      The International Symposium on Information Theory and Its Applications 2022
    • Related Report
      2022 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo2019

    • Author(s)
      Hiroki Sato, Mamoru Miura, Hidema Tanaka
    • Organizer
      The 14th Asia Joint Conference on Information Security (AsiaJCIS2019)
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] Verifiable Secret Sharing Scheme Using Hash Values2018

    • Author(s)
      Junta Imai, Mamoru Mimura, Hidema Tanaka
    • Organizer
      CANDAR Workshops 2018
    • Related Report
      2018 Research-status Report
    • Int'l Joint Research
  • [Presentation] 軽量ブロック暗号PiccoloのMILP手法を用いたDivision Propertyの検証2018

    • Author(s)
      佐藤 寛樹、三村 守、田中 秀磨
    • Organizer
      コンピュータセキュリティシンポジウム2018
    • Related Report
      2018 Research-status Report
  • [Presentation] 排他的論理和を用いた消失訂正符号に基づく条件付き閾値秘密分散2017

    • Author(s)
      今井淳太, 三村守, 田中秀磨
    • Organizer
      第16回 情報科学技術フォーラム(FIT 2017)
    • Related Report
      2017 Research-status Report
  • [Presentation] DNS水責め攻撃効果に関する一考察2017

    • Author(s)
      ムンフバートル ボルド, 三村守 ,田中秀磨
    • Organizer
      第16回 情報科学技術フォーラム(FIT 2017)
    • Related Report
      2017 Research-status Report
  • [Presentation] 排他的論理和を用いた条件付き閾値秘密分散の構築2017

    • Author(s)
      今井淳太, 三村守, 田中秀磨
    • Organizer
      第40回情報理論とその応用シンポジウム (SITA2017)
    • Related Report
      2017 Research-status Report

URL: 

Published: 2017-04-28   Modified: 2024-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi