• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of a method for detecting suspicious communications based on the waiting state of the destination and its application to the construction of secure networks

Research Project

Project/Area Number 19K20268
Research Category

Grant-in-Aid for Early-Career Scientists

Allocation TypeMulti-year Fund
Review Section Basic Section 60070:Information security-related
Research InstitutionNational Institute of Informatics (2022-2023)
Nagoya University (2019-2021)

Principal Investigator

HASEGAWA Hirokazu  国立情報学研究所, ストラテジックサイバーレジリエンス研究開発センター, 特任准教授 (90806051)

Project Period (FY) 2019-04-01 – 2024-03-31
Project Status Completed (Fiscal Year 2023)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2022: ¥780,000 (Direct Cost: ¥600,000、Indirect Cost: ¥180,000)
Fiscal Year 2021: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2020: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2019: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywordsサイバーセキュリティ / ネットワークセキュリティ / 不正通信検知 / マルウェア検知 / SDN / 標的型攻撃対策 / ネットワーク / 不正通信検出 / マルウェア / 正常通信分類 / 仮装環境 / 仮想環境 / 統計分析 / ハニーポット / 情報セキュリティ / セキュアネットワーク
Outline of Research at the Start

近年、様々なサイバー攻撃が発生しており、巧妙な手法の攻撃により深刻な被害が発生する場合もある。これに対し、被害を防ぐための対策として、ネットワーク内の端末がマルウェアに感染した際に、迅速に感染端末を検出する必要がある。本研究では、ネットワーク内で行なわれる通信について、宛先の端末の待受状態や応答通信により不正通信を検出する手法を開発する。これにより感染端末を検出するとともに、この結果を応用し、感染端末を隔離するようなネットワークを自動的に構築する技術の開発を行う。

Outline of Final Research Achievements

Due to the recent serious situation of cyber attacks, we researched methods for efficient detection, response, and countermeasures to suspicious communications in an organization's local network.
A method of detecting suspicious communication in local networks based on the state of the destination terminal of communication was proposed. In addition, by using the results of the method, we have achieved the construction of a secure network that can restrict malware communication in advance by restricting unnecessary communication within the local network.
Furthermore, considering the recent usage pattern of the company network based on the assumption of telecommuting, an access control construction method for VPN connection was proposed. It is based on the evaluation results about the information security perspective trust of each user, and we can obtain suitable access control for each user.

Academic Significance and Societal Importance of the Research Achievements

研究課題名にもしている、宛先の待機状態を活用することで組織内通信から不審な通信を検出する手法を提案し、これを発表した文献はBest Paper Awardの受賞などの評価を得た。
また、不正通信検出の新たな手法により、サイバー攻撃の検知向上の研究で貢献した。さらに、セキュリティレベルの高いネットワークの構築手法の実現により、サイバーセキュリティ一般に貢献した。
これらの成果は、社会問題となっているサイバー攻撃対策の一助となり得る成果である。

Report

(6 results)
  • 2023 Annual Research Report   Final Research Report ( PDF )
  • 2022 Research-status Report
  • 2021 Research-status Report
  • 2020 Research-status Report
  • 2019 Research-status Report
  • Research Products

    (41 results)

All 2024 2023 2022 2021 2020 2019

All Journal Article (6 results) (of which Peer Reviewed: 6 results,  Open Access: 5 results) Presentation (35 results) (of which Int'l Joint Research: 17 results)

  • [Journal Article] Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning2024

    • Author(s)
      Hu Zhenguo、Hasegawa Hirokazu、Yamaguchi Yukiko、Shimada Hajime
    • Journal Title

      IEEE Access

      Volume: 12 Pages: 2648-2659

    • DOI

      10.1109/access.2023.3348234

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Malware Self-Supervised Graph Contrastive Learning with Data Augmentation2023

    • Author(s)
      Yun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Journal Title

      International Journal On Advances in Security

      Volume: 16 Pages: 116-125

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA2023

    • Author(s)
      Hu Zhenguo、Hasegawa Hirokazu、Yamaguchi Yukiko、Shimada Hajime
    • Journal Title

      IEEE Access

      Volume: 11 Pages: 112212-112222

    • DOI

      10.1109/access.2023.3323853

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network2022

    • Author(s)
      Gao Yun、Hasegawa Hirokazu、Yamaguchi Yukiko、Shimada Hajime
    • Journal Title

      IEEE Access

      Volume: 10 Pages: 111830-111841

    • DOI

      10.1109/access.2022.3215267

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Malware Detection Using LightGBM With a Custom Logistic Loss Function2022

    • Author(s)
      Gao Yun、Hasegawa Hirokazu、Yamaguchi Yukiko、Shimada Hajime
    • Journal Title

      IEEE Access

      Volume: 10 Pages: 47792-47804

    • DOI

      10.1109/access.2022.3171912

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Construction of Secure Internal Network with Communication Classifying System Using Multiple Judgment Methods2020

    • Author(s)
      Hirokazu Hasegawa, Yuya Sato, Hiroki Takakura
    • Journal Title

      The International Journal on Advances in Telecommunications

      Volume: 13-3&4 Pages: 21-32

    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Presentation] 機械学習を用いた悪性URLクエリ検知に対するラベル反転攻撃の攻撃耐性評価2024

    • Author(s)
      松波旭, 長谷川皓一, 山口由紀子, 嶋田創
    • Organizer
      電子情報通信学会研究報告, Vol. 123, No. 448, pp. 153-159
    • Related Report
      2023 Annual Research Report
  • [Presentation] プライバシーに配慮した悪性通信検出手法のNII-SOCSベンチマークデータを用いた検討2024

    • Author(s)
      小川剛史, 長谷川皓一, 山口由紀子, 嶋田創
    • Organizer
      電子情報通信学会研究報告, Vol. 123, No. 448, pp. 79-84
    • Related Report
      2023 Annual Research Report
  • [Presentation] On-Demand Clock Boosting for Secure Remote Work System2023

    • Author(s)
      Justus von der Beek, Atsushi Shinoda, Hajime Shimada, Hirokazu Hasegawa
    • Organizer
      In Proceedings of the 12th International Conference on Communications, Computation, Networks and Technologies (INNOV 2023), pp. 8-13
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Feasibility Verification of Access Control System for Telecommuting by Users Reliability Calculation2023

    • Author(s)
      Atsushi Shinoda, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura
    • Organizer
      In Proceedings of the Eighteenth International Conference on Systems and Networks Communications (ICSNC 2023), pp. 16-22
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Design and Implementation of Access Control Method Based on Correlation Among Files2023

    • Author(s)
      Yuki Kodaka, Hirokazu Hasegawa, Hiroki Takakura
    • Organizer
      In proceedings of the 16th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2023), pp. 44-51
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Heterogeneous Network Inspection in IoT Environment with FPGA based Pre-Filter and CPU based LightGBM2023

    • Author(s)
      Zhenguo Hu, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      In proceedings of the 17th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2023), pp. 27-32
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] AI-driven Approach for Access Control List Management2023

    • Author(s)
      Nader Shahata, Hirokazu Hasegawa, Hiroki Takakura
    • Organizer
      In proceedings of the 17th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2023), pp. 52-58
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] プライバシーと悪性通信検知精度の両立を目指した通信ログ匿名加工の検討2023

    • Author(s)
      小川剛史, 長谷川皓一, 山口由紀子, 嶋田創
    • Organizer
      コンピュータセキュリティシンポジウム2023 (CSS2023), pp. 101-108
    • Related Report
      2023 Annual Research Report
  • [Presentation] 悪性通信検知のためのプライバシーに配慮した通信ログ匿名加工の検討2023

    • Author(s)
      小川剛史, 長谷川皓一, 山口由紀子, 嶋田創
    • Organizer
      電子情報通信学会研究報告, Vol. 122, No. 422, ICSS2022-74, pp. 157-162, 2023年3月.
    • Related Report
      2022 Research-status Report
  • [Presentation] Feasibility Verification on Impact of Frequently Access Control Update based on User Reliability2023

    • Author(s)
      Atsushi Shinoda, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura
    • Organizer
      The 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), Abstract Session, February 2023.
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] Proposal for a Granular Access Control Method Based on Similarity of File Accesses Behavior Among Users2023

    • Author(s)
      Yuki Kodaka, Hirokazu Hasegawa, Hiroki Takakura
    • Organizer
      The 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), Abstract Session, February 2023.
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] ユーザ信用度を考慮した動的アクセス制御遅延の環境差検証2022

    • Author(s)
      篠田優, 長谷川皓一, 山口由紀子, 嶋田創, 高倉弘喜
    • Organizer
      電子情報通信学会技術報告, Vol. 122, No. 306, IA2022-66, pp. 91-98, 2022年12月.
    • Related Report
      2022 Research-status Report
  • [Presentation] AndroidアプリのURL自動リンクにおけるフィッシングリスクの分析と対策の実装2022

    • Author(s)
      辻知希, 嶋田創, 山口由紀子, 長谷川皓一
    • Organizer
      コンピュータセキュリティシンポジウム2022, pp. 1194-1201, 2022年10月.
    • Related Report
      2022 Research-status Report
  • [Presentation] e-learning習熟度を活用したセキュリティ対策強化の推薦手法に関する検討2022

    • Author(s)
      長谷川皓一, 高倉弘喜
    • Organizer
      コンピュータセキュリティシンポジウム2022, pp. 1093-1098, 2022年10月.
    • Related Report
      2022 Research-status Report
  • [Presentation] ユーザの信用度を考慮したテレワーク通信へのアクセス制御手法の実装2022

    • Author(s)
      篠田優, 長谷川皓一, 山口由紀子, 嶋田創, 高倉弘喜
    • Organizer
      コンピュータセキュリティシンポジウム2022, pp. 840-847, 2022年10月.
    • Related Report
      2022 Research-status Report
  • [Presentation] 社会情勢分析によるサイバーリスク推定および防御構築支援2022

    • Author(s)
      長谷川皓一, 平井健士, 高倉弘喜
    • Organizer
      コンピュータセキュリティシンポジウム2022, pp. 92-96, 2022年10月.
    • Related Report
      2022 Research-status Report
  • [Presentation] Unsupervised Graph Contrastive Learning with Data Augmentation for Malware Classification2022

    • Author(s)
      Yun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      In Proceedings of the 16th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2022), ISBN: 978-1-68558-007-0, pp. 41-47, October 2022.
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] A Resource Importance Estimation Method Based on Proximity of Hierarchical Position2022

    • Author(s)
      Yingtao Zhou, Hirokazu Hasegawa, Hiroki Takakura
    • Organizer
      In Proceedings of the 5th International Conference on Information Science and Systems (ICISS2022), pp. 83-89, August 2022.
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] 勾配情報変化量を利用したSVMベースのマルウェア検知を標的にする中毒攻撃データの検知2022

    • Author(s)
      嶋田創, 蘇思遠, 長谷川皓一, 山口由紀子
    • Organizer
      情報処理学会研究報告, Vol. 2022-CSEC-98, No. 19, pp. 1-8, 2022年7月.
    • Related Report
      2022 Research-status Report
  • [Presentation] Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network2022

    • Author(s)
      Yun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      In Proceedings of the 12th IEEE International Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2022), pp. 1495-1501, June 2022.
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] 潜在表現の時系列差分を用いた亜種マルウェア検知精度向上の検討2022

    • Author(s)
      篠田優, 嶋田創, 山口由紀子, 長谷川皓一
    • Organizer
      電子情報通信学会研究報告, Vol. 122, No. 86, ICSS2022-4, pp. 19-24, 2022年6月.
    • Related Report
      2022 Research-status Report
  • [Presentation] Towards Network-Wide Malicious Traffic Detection with Power-Effective Hardware NIDS Design (Poster)2022

    • Author(s)
      Zhenguo Hu, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      In Proceedings of the 25th IEEE Symposium on Low-Power and High-Speed Chips (COOLChips 25), Poster 6, pp. 313-314, April 2022.
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] An Importance Estimation Method Based on Resource Lineage2022

    • Author(s)
      Yingtao Zhou, Hirokazu Hasegawa, Hiroki Takakura
    • Organizer
      情報処理学会第84回全国大会
    • Related Report
      2021 Research-status Report
  • [Presentation] 正常ログ残存を前提とするサイバー攻撃推定手法の性能評価2022

    • Author(s)
      熊崎真仁, 長谷川皓一, 山口由紀子, 嶋田創, 高倉弘喜
    • Organizer
      情報処理学会第84回全国大会
    • Related Report
      2021 Research-status Report
  • [Presentation] 通信遮断による標的型攻撃対応のための影響範囲VR可視化システムの開発2022

    • Author(s)
      小森工, 嶋田創, 長谷川皓一
    • Organizer
      情報処理学会第84回全国大会
    • Related Report
      2021 Research-status Report
  • [Presentation] High-Performance Distributed NIDS Cluster Based on Hybrid Detection Platform2021

    • Author(s)
      Zhenguo Hu, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      情報科学技術フォーラム FIT 2021
    • Related Report
      2021 Research-status Report
  • [Presentation] Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function2021

    • Author(s)
      Yun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      Proceedings of the 35th International Conference on Information Networking (ICOIN2021)
    • Related Report
      2020 Research-status Report
    • Int'l Joint Research
  • [Presentation] WAF Signature Generation with Real-Time Information on the Web2020

    • Author(s)
      Masahito Kumazaki, Yukiko Yamaguchi, Hajime Shimada, Hirokazu Hasegawa
    • Organizer
      Proceedings of the 14th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2020)
    • Related Report
      2020 Research-status Report
    • Int'l Joint Research
  • [Presentation] Gradient Boosting Decision Tree Ensemble Learning for Malware Binary Classification2020

    • Author(s)
      Yun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      コンピュータセキュリティシンポジウム2020
    • Related Report
      2020 Research-status Report
  • [Presentation] Web上のリアルタイム情報を利用したWAFシグネチャ生成の初期検討2020

    • Author(s)
      熊崎真仁, 長谷川皓一, 山口由紀子, 嶋田創
    • Organizer
      電子情報通信学会 第50回情報通信システムセキュリティ研究会(ICSS)
    • Related Report
      2019 Research-status Report
  • [Presentation] Rogue AP Detection using Similarity of Backbone Delay Fluctuation Histogram2020

    • Author(s)
      Ziwei Zhang, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      Proceedings of the 34th International Conference on Information Networking (ICOIN2020)
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] 組織内部での攻撃行動を仮想環境へ誘導する挙動分析システム2019

    • Author(s)
      大橋宗治, 長谷川皓一, 山口由紀子, 嶋田創
    • Organizer
      電子情報通信学会 第49回情報通信システムセキュリティ研究会(ICSS)
    • Related Report
      2019 Research-status Report
  • [Presentation] Implementation of MQTT/CoAP Honeypots and Analysis of Observed Data2019

    • Author(s)
      Hajime Shimada, Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi
    • Organizer
      Proceedings of the Thirteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2019)
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] An Evaluation on Feasibility of a Communication Classifying System2019

    • Author(s)
      Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura
    • Organizer
      Proceedings of the Thirteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2019)
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] Rogue Wireless AP Detection using Delay Fluctuation in Backbone Network2019

    • Author(s)
      Ziwei Zhang, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
    • Organizer
      Proceedings of the 43rd Annual International Computers, Software and Applications Conference (COMPSAC 2019)
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research

URL: 

Published: 2019-04-18   Modified: 2025-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi