• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2005 Fiscal Year Final Research Report Summary

Construction of A Network Security System based on Active Collection of Illegal Access Information

Research Project

Project/Area Number 16300010
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Computer system/Network
Research InstitutionTohoku University

Principal Investigator

NEMOTO Yoshiaki  Tohoku University, Graduate School of Information Sciences, Professor, 大学院・情報科学研究科, 教授 (60005527)

Co-Investigator(Kenkyū-buntansha) KATO Nei  Tohoku University, Graduate School of Information Sciences, Professor, 大学院・情報科学研究科, 教授 (00236168)
WAIZUMI Yuji  Tohoku University, Graduate School of Information Sciences, Lecturer, 大学院・情報科学研究科, 講師 (90333872)
Project Period (FY) 2004 – 2005
KeywordsDistributed Misuse Detection / Communicated Contents Similarity / Automatic Signature Generation / Common Token / Histogram / Clustering
Research Abstract

It is important to early detect a novel illegal access for network security. In order to early detect the access, we developed some anomaly detection techniques which can detect unknown attacks, an early detection technique based on contents similarity of communication and an extracting method of characteristic information of illegal accesses.
On the anomaly detection, we proposed three anomaly detection methods based on our analysis of state change of network traffic when illegal accesses occurred, and achieve the world's highest level of detection accuracy using benchmark database. We also developed a distributed early detection system of diffusion of computer viruses. The detection system uses the traffic occurred which the computer viruses copy themselves to many hosts on the Internet when they diffuse. The system adopts a similarity evaluation method for communication contents using histogram of codes of packet payloads. We confirmed that the system possesses extremely high detection accuracy with very low false positives.
Moreover, we developed an automatic signature generation method using virus samples that were detected by the above system from common tokens of the detected viruses. And we discovered that the common tokes can be used to detect subspecies of viruses which can be detected already created signatures.

  • Research Products

    (12 results)

All 2006 2005

All Journal Article (12 results)

  • [Journal Article] A Simple Response Packet Confirmation Method for DRDoS Detection2006

    • Author(s)
      H.TSUNODA, K.OHTA, A.YAMAMOTO, Y.NEMOTO
    • Journal Title

      Proc. of 8th International Conference on Advanced Communication Technology 1(CDROM)

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] A Simple Response Packet Confirmation Method for DRDoS Detection2006

    • Author(s)
      H.TSUNODA, K.OHTA, A.YAMAMOTO, Y.NEMOTO
    • Journal Title

      Proc.of 8th International Conference on Advanced Communication Technology (CDROM)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] On-Demand Media Streaming to Hybrid Wired/Wireless Networks over Quasi-Geo Stationary Satellite Systems2005

    • Author(s)
      T.Taleb, N.Kato, Y.Nemoto
    • Journal Title

      Elsevier Journal on Computer Networks Vol.47, No.2

      Pages: 287-306

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Recent Trends in IP/NGEO Satellite Communication Systems : Transport, Routing, and Mobility Management2005

    • Author(s)
      T.Taleb, N.Kato, Y.Nemoto
    • Journal Title

      IEEE Wireless Communications Magazine 12・5

      Pages: 63-69

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] A New Network Anomaly Detection Technique Based on Per-flow and Per-service Statistics2005

    • Author(s)
      Y.Waizumi, D.Kudo, N.Kato, Y.Nemoto
    • Journal Title

      in Proc. of Int. Conf. on Computional Intelligence and Security 1

      Pages: 252-259

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures2005

    • Author(s)
      K.Simkhada, H.Tsunoda, Y.Waizumi, Y.Nemoto
    • Journal Title

      The First IEEE International Workshop on Security and Pervasive Multimedia Environments 2

      Pages: 680-685

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Securing Hybrid Wired/Mobile IP Networks from TCP-Flooding Based Denial-of-Service Attacks2005

    • Author(s)
      T.Taleb, H.Nishiyama, N.Kato, Y.Nemoto
    • Journal Title

      in Proc. of IEEE Globecom 1(CDROM)

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] A Dynamic and Efficient MAP Selection for Mobile IPv6 Networks2005

    • Author(s)
      T.Taleb, T.Suzuki, N.Kato, Y.Nemoto
    • Journal Title

      in Proc. of IEEE Globecom 1(CDROM)

    • Description
      「研究成果報告書概要(和文)」より
  • [Journal Article] Recent Trends in IP/NGEO Satellite Communication Systems : Transport, Routing, and Mobility Management2005

    • Author(s)
      T.Taleb, N.Kato, Y.Nemoto
    • Journal Title

      IEEE Wireless Communications Magazine Dec.5

      Pages: 63-69

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] A New Network Anomaly Detection Technique Based on Per-flow and Per-service Statistics2005

    • Author(s)
      Y.Waizumi, D.Kudo, N.Kato, Y.Nemoto
    • Journal Title

      Proc.of Int.Conf.on Computional Intelligence and Security 1

      Pages: 252-259

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] Securing Hybrid Wired/Mobile IP Networks from TCP-Flooding Based Denial-of-Service Attacks2005

    • Author(s)
      T.Taleb, H.Nishiyama, N.Kato, Y.Nemoto
    • Journal Title

      Proc.of IEEE Globecom 1(CDROM)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Journal Article] A Dynamic and Efficient MAP Selection for Mobile IPv6 Networks2005

    • Author(s)
      T.Taleb, T.Suzuki, N.Kato, Y.Nemoto
    • Journal Title

      Proc.of IEEE Globecom 1(CDROM)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 2007-12-13  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi