• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on Histogram Database for DetectingNetwork Attacks

Research Project

Project/Area Number 22500093
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Media informatics/Database
Research InstitutionKyushu University

Principal Investigator

YAOKAI Feng  九州大学, 大学院・システム情報科学研究院, 助教 (60363389)

Co-Investigator(Kenkyū-buntansha) AKIFUMI Makinouchiakifumi  久留米工業大学, 工学部, 教授 (30221576)
Project Period (FY) 2010 – 2012
Project Status Completed (Fiscal Year 2012)
Budget Amount *help
¥4,290,000 (Direct Cost: ¥3,300,000、Indirect Cost: ¥990,000)
Fiscal Year 2012: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2011: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2010: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Keywordsデータベースシステム / 分散型スキャン攻撃 / ヒストグラムデータベース / サイバー攻撃 / 異常検知 / ネットワークセキュリティ / ネットワーク攻撃 / 低レート攻撃 / 通常時挙動モード / ヒストグラム
Research Abstract

By this study, it was made clear that the network attacks can be detected by checking the characteristic features of the packet traffics. As a concrete approach, we proposed a novel approach based on normal behavior mode for fast detection of distributed port scans in darknets. In this approach, the number of sources is counted in each time unit and a histogram is built for each of the monitored ports. Then, a normal behavior mode for each port can be extracted from the histogram of this port. At last, this normal behaviormode can be used to detectabnormal behaviors in the real network traffics. The related papers havebeen accepted by an internal conference and the Journal of Information Processing of IPJS.

Report

(4 results)
  • 2012 Annual Research Report   Final Research Report ( PDF )
  • 2011 Annual Research Report
  • 2010 Annual Research Report
  • Research Products

    (10 results)

All 2013 2012 2011

All Journal Article (4 results) (of which Peer Reviewed: 4 results) Presentation (6 results)

  • [Journal Article] A Behavior-Based Method for Detecting Distributed Scan Attacks in Darknets2013

    • Author(s)
      Ya o k a i Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi
    • Journal Title

      Journal of Information Processing

      Volume: Vo l.2 1 ,No.3 Pages: 1-12

    • NAID

      110009579909

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Behavior-Based Method for Detecting Distributed Scan Attacks in Darknets2013

    • Author(s)
      Yaokai Feng(馮尭楷)
    • Journal Title

      Journal of Information Processing

      Volume: 21(3) Pages: 1-12

    • NAID

      110009579909

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Evaluation of Partially-dimensional Range Queries in Large OLAP Datasets2011

    • Author(s)
      Ya o k a i FENG, Kunihiko KANEKO, Akifumi MAKINOUCHI
    • Journal Title

      International Journal of Data Mining, Modelling and Management

      Volume: Vol. 3, No. 2 Pages: 150-171

    • NAID

      120005133094

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Ag+-tree: an Index Structure for Range- aggregation Queries in Data Warehouse Environmentsh2011

    • Author(s)
      Ya o k a i Feng, Akifumi Makinouch
    • Journal Title

      International Journal of Database Theory and Application

      Volume: Vol. 4, No.2 Pages: 51-64

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Presentation] A Behavior-based Detection Method for Outbreaks of Low-rate Attacks2012

    • Author(s)
      馮尭〓
    • Organizer
      The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012)
    • Place of Presentation
      トルコIzmir市(発表確定)
    • Year and Date
      2012-07-16
    • Related Report
      2011 Annual Research Report
  • [Presentation] 挙動に基づく同時多発低レート攻撃の検知案および実験検証2012

    • Author(s)
      フォン ヤオカイ, 堀 良彰, 櫻井 幸一, 竹内 純一
    • Organizer
      第17回情報通信システムセキュリティ研究会 (ICSS2012)
    • Year and Date
      2012-03-16
    • Related Report
      2012 Final Research Report
  • [Presentation] 挙動に基づく同時多発低レート攻撃の検知案および実験検証2012

    • Author(s)
      馮尭〓
    • Organizer
      第17回情報通信システムセキュリティ研究会
    • Place of Presentation
      東京機械振興会館
    • Year and Date
      2012-03-16
    • Related Report
      2011 Annual Research Report
  • [Presentation] Ya o k a i Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchis2012

    • Author(s)
      Ya o k a i Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi
    • Organizer
      The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2012)
    • Related Report
      2012 Final Research Report
  • [Presentation] How to Design Kansei Retrieval Systems?2012

    • Author(s)
      Ya o k a i Feng, Seiichi Uchida
    • Organizer
      The 11th International Conference on Web-Age Information Management (WAIM2010)
    • Related Report
      2012 Final Research Report
  • [Presentation] A Behavior-based Detection Method for Outbreaks of Low-rate Attacks2012

    • Author(s)
      Yaokai Feng (馮尭楷)
    • Organizer
      12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2012)
    • Place of Presentation
      Izmir, Turkey
    • Related Report
      2012 Annual Research Report

URL: 

Published: 2010-08-23   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi