Updated on 2024/07/19

 
NAKAMURA Yutaka
 
Scopus Paper Info  
Total Paper Count: 0  Total Citation Count: 0  h-index: 5

Citation count denotes the number of citations in papers published for a particular year.

Job
Professor
E-mail
メールアドレス
Laboratory
1-1 Sensui-cho, Tobata-ku, Kitakyushu-shi, Fukuoka
External link

Research Interests

  • Internet operation

  • Network security

  • Network monitoring

Research Areas

  • Informatics / Information security

  • Informatics / Computer system

Degree

  • Nara Institute of Science and Technology  -  Doctor of Engineering   2001.03

Biography in Kyutech

  • 2023.04
     

    Kyushu Institute of Technology   Information Technology Infrastructure Management Headquarters   Information Science and Technology Center   Professor  

  • 2022.04
     

    Kyushu Institute of Technology   Information Technology Infrastructure Management Headquarters   Information Science and Technology Center   Professor  

  • 2022.04
    -
    2024.03
     

    Kyushu Institute of Technology   Information Technology Infrastructure Management Headquarters  

  • 2022.04
    -
    2024.03
     

    Kyushu Institute of Technology   Information Technology Infrastructure Management Headquarters  

  • 2020.04
    -
    2022.03
     

    Kyushu Institute of Technology   Organization for Information Infrastructure   Information Science and Technology Center   Professor  

  • 2019.06
    -
    2020.03
     

    Kyushu Institute of Technology   Information Science Center   Professor  

  • 2007.04
    -
    2019.05
     

    Kyushu Institute of Technology   Information Science Center   Associate Professor  

▼display all

Papers

  • A Management System for Institute-Public IP Addresses Reviewed

    Satoh Akihiro, Toda Tetsuya, Wada Sujiro, Fukuda Yutaka, Nakamura Yutaka

    Journal for Academic Computing and Networking ( Academic eXcange for Information Environment and Strategy )   27 ( 1 )   167 - 173   2023.11

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)

    DOI: 10.24669/jacn.27.1_167

    CiNii Research

    Other Link: https://kyutech.repo.nii.ac.jp/records/2000303

  • Editor's Message to Special Issue of “the Internet and Operation Technologies for Considering to a New Normal” Reviewed

    Nakamura Yutaka

    Journal of Information Processing ( Information Processing Society of Japan )   30 ( 0 )   250 - 250   2022.01

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.2197/ipsjjip.30.250

    CiNii Research

    Other Link: https://www.jstage.jst.go.jp/article/ipsjjip/30/0/30_250/_pdf

  • A word-level analytical approach for identifying malicious domain names caused by dictionary-based dga malware Reviewed

    Satoh A., Fukuda Y., Kitagata G., Nakamura Y.

    Electronics (Switzerland)   10 ( 9 )   2021.05

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.3390/electronics10091039

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85122394614&origin=inward

  • An approach for identifying malicious domain names generated by dictionary-based DGA bots Reviewed

    Satoh A., Nakamura Y., Fukuda Y., Nobayashi D., Ikenaga T.

    IEICE Transactions on Information and Systems ( The Institute of Electronics, Information and Communication Engineers )   E104.D ( 5 )   669 - 672   2021.01

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    <p>Computer networks are facing serious threats from the emergence of sophisticated new DGA bots. These DGA bots have their own dictionary, from which they concatenate words to dynamically generate domain names that are difficult to distinguish from human-generated domain names. In this letter, we propose an approach for identifying the callback communications of DGA bots based on relations among the words that constitute the character string of each domain name. Our evaluation indicates high performance, with a recall of 0.9977 and a precision of 0.9869.</p>

    DOI: 10.1587/transinf.2020NTL0001

    Scopus

    CiNii Article

    CiNii Research

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85106744554&origin=inward

  • Clustering Malicious DNS Queries for Blacklist-Based Detection Reviewed

    SATOH Akihiro, NAKAMURA Yutaka, NOBAYASHI Daiki, SASAI Kazuto, KITAGATA Gen, IKENAGA Takeshi

    IEICE Transactions on Information and Systems   102 ( 7 )   1404 - 1407   2019.01

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1587/transinf.2018EDL8211

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/130007671324

  • A Cause-Based Classification Approach for Malicious DNS Queries Detected through Blacklists Reviewed

    Satoh A., Nakamura Y., Fukuda Y., Sasai K., Kitagata G.

    IEEE Access   7   142991 - 143001   2019.01

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1109/ACCESS.2019.2944203

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85077740083&origin=inward

  • Estimating the Randomness of Domain Names for DGA Bot Callbacks Reviewed

    Satoh A., Nakamura Y., Nobayashi D., Ikenaga T.

    IEEE Communications Letters   22 ( 7 )   1378 - 1381   2018.04

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1109/LCOMM.2018.2828800

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85045761161&origin=inward

  • 九州工業大学における 情報セキュリティ対策の取り組みについて

    中村 豊, 佐藤 彰洋, 福田 豊, 和田 数字郎

    インターネットと運用技術シンポジウム(IOT) 2017   2017.12

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Research paper (other academic)

  • 次世代ファイアーウォール機器の評価検証について

    中村豊, 佐藤 彰洋

    インターネットと運用技術シンポジウム(IOT) 2016   2016.12

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Research paper (other academic)

  • A flow-based detection method for stealthy dictionary attacks against Secure Shell Reviewed

    Satoh A., Nakamura Y., Ikenaga T.

    Journal of Information Security and Applications   21   31 - 41   2015.04

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1016/j.jisa.2014.08.003

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84951910026&origin=inward

  • A new approach to identify user authentication methods toward SSH dictionary attack detection Reviewed

    Satoh A., Nakamura Y., Ikenaga T.

    IEICE Transactions on Information and Systems   E98D ( 4 )   760 - 768   2015.04

     More details

  • Campus WiFi upgrades at Kyushu Institute of Technology

    IEICE technical report. Internet Architecture   114 ( 495 )   119 - 124   2015.03

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110010018761

  • 九州工業大学における全学セキュア・ネットワークの導入について (インターネットアーキテクチャ)

    中村 豊, 福田 豊, 佐藤 彰洋

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 ( 一般社団法人電子情報通信学会 )   114 ( 495 )   113 - 118   2015.03

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    九州工業大学では、2014年9月に3キャンパス一斉にネットワーク環境を更新し、コアスイッチを40Gbps,戸畑および飯塚キャンパス間接続を40Gbpsとする全学セキュア・ネットワークシステムを導入した。全学セキュア・ネットワークシステムでは、大学とSINETへの接続境界点に学外公開IPへのアクセス制御を行うファイアーウォールを導入し、さらに各キャンパス毎に部局を収容可能なキャンパスファイアーウォールを導入した。また、各キャンパス内のコアスイッチは40Gbpsインタフェースを用いたバーチャルシャーシ構成による構築を行った。本報告では、これらのシステムを導入するにあたっての経緯や、事前調査、準備事項などについて述べる。

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110010018760

  • 九州工業大学における全学セキュア・ネットワークの導入について (技術と社会・倫理)

    中村 豊, 福田 豊, 佐藤 彰洋

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 ( 一般社団法人電子情報通信学会 )   114 ( 494 )   113 - 118   2015.03

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    九州工業大学では、2014年9月に3キャンパス一斉にネットワーク環境を更新し、コアスイッチを40Gbps,戸畑および飯塚キャンパス間接続を40Gbpsとする全学セキュア・ネットワークシステムを導入した。全学セキュア・ネットワークシステムでは、大学とSINETへの接続境界点に学外公開IPへのアクセス制御を行うファイアーウォールを導入し、さらに各キャンパス毎に部局を収容可能なキャンパスファイアーウォールを導入した。また、各キャンパス内のコアスイッチは40Gbpsインタフェースを用いたバーチャルシャーシ構成による構築を行った。本報告では、これらのシステムを導入するにあたっての経緯や、事前調査、準備事項などについて述べる。

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110010017412

  • Lightweight approach to detect drive-by download attacks based on file type transition Reviewed

    Shindo Y., Satoh A., Nakamura Y., Iida K.

    CoNEXT Student Workshop 2014 - Proceedings of the 2014 Workshop   28 - 30   2014.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1145/2680821.2680826

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84920496548&origin=inward

  • Message from doctoral symposium co-chairs

    Nakamura Y., Yang H.

    Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 ( Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 )   2012.11

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (bulletin of university, research institution)

    DOI: 10.1109/SAINT.2012.82

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84867945518&origin=inward

  • SSH dictionary attack detection based on flow analysis Reviewed

    Satoh A., Nakamura Y., Ikenaga T.

    Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012   51 - 59   2012.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/SAINT.2012.16

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84867932244&origin=inward

  • SSH Brute Force Attack Detection based on Flow Features Analysis

    SATOH Akihiro, NAKAMURA Yutaka, IKENAGA Takeshi

    IEICE technical report. Information networks ( The Institute of Electronics, Information and Communication Engineers )   111 ( 346 )   73 - 78   2011.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    SSH brute force attack has become more seriously, so administrators are desired to implement its countermeasures. In the traditional ways, the SSH brute force attack has been detected by analyzing access logs and network traffic. However, the former way must check a huge quantity of the logs in all servers, and the latter cannot find victims of the attacks. To solve these problems, we propose SSH brute force attack detection based on the flow features analysis. As the experimental results, we showed to be able to identify the attacks and their victims.

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110009466509

  • SSH Brute Force Attack Detection based on Flow Features Analysis

    SATOH Akihiro, NAKAMURA Yutaka, IKENAGA Takeshi

    111 ( 346 )   73 - 78   2011.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/10031106800

  • B-16-15 Study of Comparison Method at Candidate List with Scan Detection Method Based on Multi-Point Observation

    Higashijima Kei, Nobayashi Daiki, Nakamura Yutaka, Ikenaga Takeshi, Abe Shunji, Urusitani Shigeo, Yamada Shigeki

    Proceedings of the IEICE General Conference ( The Institute of Electronics, Information and Communication Engineers )   2011 ( 2 )   2011.02

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110008577486

  • A network reconfiguration scheme against misbehaving nodes Reviewed

    Nobayashi D., Sera T., Ikenaga T., Nakamura Y., Hori Y.

    Proceedings - Conference on Local Computer Networks, LCN   424 - 431   2010.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/LCN.2010.5735755

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=79955025771&origin=inward

  • Message from the C3NET 2010 Workshop organizers

    Nakamura Y., Kim H., Yamanoue T.

    Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 ( Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 )   2010.11

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (bulletin of university, research institution)

    DOI: 10.1109/SAINT.2010.94

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=78649278876&origin=inward

  • Access point evaluation using packet transfer ratio in multihop wireless networks Reviewed

    Nobayashi D., Nakamura Y., Ikenaga T., Hori Y., Nakamura K., Ishinishi H., Kaizaki S.

    2009 International Conference on Information Networking, ICOIN 2009   2009.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=77951440715&origin=inward

  • Design and Implementation of Reputation Mechanism for Multihop Wireless Network Reviewed

    NOBAYASHI Daiki, NAKAMURA Yutaka, IKENAGA Takeshi, HORI Yoshiaki, NAKAMURA Katsuichi, ISHINISHI Hiroshi, KAIZAKI Syuuji

    The IEICE transactions on communications B ( The Institute of Electronics, Information and Communication Engineers )   92 ( 7 )   1061 - 1071   2009.07

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110007337803

  • Development of Single Sign-On System with Hardware Token and Key Management Server Reviewed

    Daiki Nobayashi,Yutaka Nakamura,Takeshi Ikenaga,Yoshiaki Hori

    IEICE Transactions on Information Systems   E92-D ( 5 )   826 - 835   2009.05

     More details

    Language:English   Publishing type:Research paper (other academic)

  • Access Point Evaluation with Packet Transfer Ratio in Multihop Wireless Network Reviewed

    Daiki Nobayashi,Yutaka Nakamura,Takeshi Ikenaga,Yoshiaki Hori,Katsuichi Nakamura,Hiroshi Ishinishi,Syuuji Kaizaki

    The International Conference on Information Networking 2009 (ICOIN 2009)   2009.01

     More details

    Language:English   Publishing type:Research paper (other academic)

    Thailand   Chiang Mai   2009.01  -  2009.01

  • Development of Single Sign-On system with hardware token and key management server Reviewed

    Nobayashi D., Nakamura Y., Ikenaga T., Hori Y.

    IEICE Transactions on Information and Systems   E92-D ( 5 )   826 - 835   2009.01

     More details

  • Autonomous Reliable Wireless Mesh Network Using a Neighboring Access Point Evaluation Mechanism Reviewed

    Daiki Nobayashi,Yutaka Nakamura,Takeshi Ikenaga,Yoshiaki Hori,Katsuichi Nakamura,Hiroshi Ishinishi,Syuuji Kaizaki

    The Third International Workshop on Self-Organizing System (IWSOS 2008)   2008.12

     More details

    Language:English   Publishing type:Research paper (other academic)

    Austria   Vienna   2008.12  -  2008.12

  • B-16-2 Collaborated Link Evaluation with 2 Hop Neighbor Access Points

    Nobayashi Daiki, Nakamura Yutaka, Ikenaga Takeshi, Hori Yoshiaki, Ishinishi Hiroshi, Kaizaki Shuuji

    Proceedings of the Society Conference of IEICE ( The Institute of Electronics, Information and Communication Engineers )   2008 ( 2 )   2008.09

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110007116438

  • A Preliminary Study and Modeling of Signature Generation System based on Distributed Sensors

    KOBAYASHI TAKEFUMI, IIDA KATSUYOSHI, NAKAMURA YUTAKA, IKENAGA TAKESHI

    70 ( 0 )   313 - 314   2008.03

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006864004

  • Traffic Statistics Collecting Method for Automatic Creation of Anomaly Signature

    70 ( 0 )   311 - 312   2008.03

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006864003

  • Collaborated Link Evaluation with Packet Transfer Ratio in Multihop Wireless Network

    NOBAYASHI Daiki, NAKAMURA Yutaka, IKENAGA Takeshi, HORI Yoshiaki, ISHINISHI Hiroshi, KAIZAKI Syuuji

    IEICE technical report ( The Institute of Electronics, Information and Communication Engineers )   107 ( 525 )   97 - 102   2008.03

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    Multihop Wireless Network provides flexible network architecture to be enable adding one or more Access Points (APs) to expand its service area for users. In this context, reliability of each AP effects on reliability Multihop Wireless Network backbone because many APs form a large backbone network. In order to achieve high reliability of Multihop Wireless Network, we focus on a self-organizing evaluation scheme by cooperated neighbor access points. In our scheme, each access point is evaluated by its neighbors to monitor packet forwarding behavior. In this paper, we propose a link characteristic evaluation scheme by exchanging packet transfer rates among cooperated neighbors. It provides a useful measure to detect anomaly links for achieving high reliable Multihop Wireless Network.

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006936416

  • Evaluation model of anomaly traffic detection mechanism with distributed sensors and its performance analysis

    KOBAYASHI Takefumi, IIDA Katuyoshi, NAKAMURA Yutaka, IKENAGA Takeshi

    IEICE technical report ( The Institute of Electronics, Information and Communication Engineers )   107 ( 524 )   347 - 352   2008.03

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    There expands the damage caused by computer infections such as worms on the Internet so that its countermeasure must be prepared. However, human operations are insufficient due to wide-spreading variety of anomaly traffic. Therefore, we must provide an automatic anomaly detection mechanism for new anomaly traffic. Such a mechanism requires the evaluation model to quantitatively decide some parameters. In this paper, we propose an evaluation model and we investigate the impact of some parameters on performance metrics such as the detection accuracy. The model is for the anomaly traffic caused by infections such as worms. Therefore, we use distributed sensors to detect the propagation process of the anomaly traffic. Through computer simulations, we numerically analyze our model to construct a framework of future automatic anomaly detection mechanisms.

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006933568

  • B-16-8 Development of Neighbor Access Point Evaluation Mechanism for Reliable Multihop Wireless Network

    Nobayashi Daiki, Nakamura Yutaka, Ikenaga Takeshi, Hori Yoshiaki, Ishinishi Hiroshi, Kaizaki Shuuji

    Proceedings of the IEICE General Conference ( The Institute of Electronics, Information and Communication Engineers )   ( 2 )   2008.03

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006871161

  • Proposal hierarchial distributed management model for wide area network

    Higashijima Kei, Nakamura Yutaka, Ikenaga Takashi, Iida Katsuyoshi

    Record of Joint Conference of Electrical and Electronics Engineers in Kyushu ( Committee of Joint Conference of Electrical, Electronics and Information Engineers in Kyushu )   2008 ( 0 )   600 - 600   2008.01

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    DOI: 10.11527/jceeek.2008.0.600.0

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/130005033348

  • Development of single sign-on system with hardware token and key management server Reviewed

    Nobayashi D., Nakamura Y., Ikenaga T., Hori Y.

    Second International Conference on Systems and Networks Communications, ICSNC 2007   2007.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/ICSNC.2007.31

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=47849120040&origin=inward

  • Access Point Evaluation with Packet Transfer Ratio in Multihop Wireless Network

    NOBAYASHI Daiki, NAKAMURA Yutaka, IKENAGA Takeshi, HORI Yoshiaki, ISHINISHI Hiroshi

    IEICE technical report ( The Institute of Electronics, Information and Communication Engineers )   107 ( 222 )   37 - 42   2007.09

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    Wireless LAN has been deployed widely to provide inexpensive access network for end systems. Especially Multiop Wireless Network (MWN) has received much attention. For deploying MWN, Access Points (APs) should provide high reliability to enable availability. However, an access point does not always work well. An access point may be down with power outage or be malfunction by means of various reasons including attacked by malicious persons. In order to keep availability of MWN, the network should work autonomously to treat appropriately an access point without reliability. In this paper, we propose an access point evaluation system to evaluate its reliability. In our scheme, each access point attempt to evaluate its neighbor access point to collaborate with other access points which is one or more neighbors of target one. Furthermore, each access points exchange the evaluation result and attempt to use to control the MWN. We carry out evaluation of our proposed scheme by using of simulations to confirm its effectiveness.

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006420517

  • Development of Single Sign-On System with Hardware Token and Key Management Server Reviewed

    Daiki Nobayashi,Yutaka Nakamura,Takeshi Ikenaga,Yoshiaki Hori

    The Second International Conference on Systems and Networks Communications (ICSNC2007)   2007.08

     More details

    Language:English   Publishing type:Research paper (other academic)

    France   French Riviera   2007.08.26  -  2007.08.31

  • Neighbor Node Evaluation with Packet Forwarding Ratio in Multihop Wireless Network

    Nobayashi Daiki, Nakamura Yutaka, Ikenaga Takeshi, Hori Yoshiaki

    Record of Joint Conference of Electrical and Electronics Engineers in Kyushu ( Committee of Joint Conference of Electrical, Electronics and Information Engineers in Kyushu )   2007 ( 0 )   325 - 325   2007.01

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    DOI: 10.11527/jceeek.2007.0.325.0

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/130004609145

  • B-16-1 Safety Web Basic Authentication with Key Management Server

    Nobayashi Daiki, Nakamura Yutaka, Ikenaga Takeshi, Hori Yoshiaki

    Proceedings of the Society Conference of IEICE ( The Institute of Electronics, Information and Communication Engineers )   2006 ( 2 )   2006.09

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006212110

  • Development of Single Sign-On System with Hardware Token and Key Management Server

    NOBAYASHI Daiki, NAKAMURA Yutaka, IKENAGA Takeshi

    ( Information Processing Society of Japan (IPSJ) ) 19   7 - 12   2006.05

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    With the growth of the Internet, various types of services, such as World Wide Web (WWW), File Transfer Protocol (FTP), remote login, etc., are widely expanded. Consequently, it is difficult for users to manage all the authentication information, e.g., user ID/password pairs, keys, and certificates, since the authentication information has been increased to use those services. Therefore, Single Sign-On (SSO) system, which makes all the services available for a user by only one-time authentication, has been developed. However, existing systems cannot provide all the SSO services for any kinds of services on the Internet even if the service provider deploys the SSO server. Therefore, in this paper, we propose a new SSO system with hardware token and key management server to improve the safety and the convenience. Furthermore, we implement the proposed system, and show its effectiveness through evaluation.

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110004822739

  • Development of Single Sign-On System with Hardware Token and Key Management Server

    NOBAYASHI Daiki, NAKAMURA Yutaka, IKENAGA Takeshi

    IEICE technical report ( The Institute of Electronics, Information and Communication Engineers )   106 ( 62 )   7 - 12   2006.05

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    With the growth of the Internet, various types of services, such as World Wide Web (WWW), File Transfer Protocol (FTP), remote login, etc., are widely expanded. Consequently, it is difficult for users to manage all the authentication information, e.g., user ID/password pairs, keys, and certificates, since the authentication information has been increased to use those services. Therefore, Single Sign-On (SSO) system, which makes all the services available for a user by only one-time authentication, has been developed. However, existing systems cannot provide all the SSO services for any kinds of services on the Internet even if the service provider deploys the SSO server. Therefore, in this paper, we propose a new SSO system with hardware token and key management server to improve the safety and the convenience. Furthermore, we implement the proposed system, and show its effectiveness through evaluation.

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110004741032

  • Special section on internet technology VI Reviewed

    Nagami K., Shionozaki A., Thierry E., Imaizumi H., Maeda K., Yamazaki K., Nagahashi K., Watanabe K., Okamura K., Tsuru M., Nakamura M., Atarashi R., Wakikawa R., Yamaguchi S., Fujisaki T., Kadobayashi Y., Nakamura Y., Esaki H.

    IEICE Transactions on Communications   E89-B ( 4 )   2006.04

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1093/ietcom/e89-b.4.1043

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=33646243220&origin=inward

  • NAS: The NAIST user authorization management system for network accesses in consideration of system administration volunteers Reviewed

    Ichikawa M., Nakamura Y., Kawai E., Fujikawa K., Sunahara H.

    Proceedings ACM SIGUCCS User Services Conference   118 - 121   2005.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1145/1099435.1099462

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=77954495678&origin=inward

  • NAS: The NAIST user Authorization management System for Network Accesses in Consideration of System Administration Volunteers Reviewed

    Motohiro Ichikawa,Yutaka Nakamura,Eiji Kawai,Kazutoshi Fujikawa,Hideki Sunahara

    ACM SIGUCCS Fall 2005 Conference   118 - 121   2005.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    USA   Montreray, CA   2005.11.06  -  2005.11.09

  • Detection Method for Anomaly Traffic Based on Alternations of Destination Hosts Reviewed

    FUJII Satoshi, NAKAMURA Yutaka, FUJIKAWA Kazutoshi, SUNAHARA Hideki

    The IEICE transactions on communications B ( The Institute of Electronics, Information and Communication Engineers )   88 ( 10 )   1922 - 1933   2005.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110003224038

  • 通信先ホスト数の変化に注目した異常トラヒック自動検出手法の提案と評価 Reviewed

    藤井聖,中村豊,藤川和利,砂原秀樹

    電子情報通信学会   J88-B ( 10 )   1922 - 1933   2005.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)

    代表的研究業績

  • Networked telepresence system using web browsers and omni-directional video streams Reviewed

    Ishikawa T., Yamazawa K., Sato T., Ikeda S., Nakamura Y., Fujikawa K., Sunahara H., Yokoya N.

    Proceedings of SPIE - The International Society for Optical Engineering   5664   380 - 387   2005.07

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1117/12.586582

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=21944448865&origin=inward

  • A NETWORKED TELEPRESENCE SYSTEM FOR CARS AND ITS TRANSMISSION ISSUE Reviewed

    Kazutoshi Fujikawa,Kazumasa Yamazawa,Tomoya Ishikawa,Yuichi Butsuen,Tomokazu Sato,Yutaka Nakamura,Hideki Sunahara,Naokazu Yokoya

    Proceedings of 11th Annual Euromedia Conference 2005   119 - 123   2005.04

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    France   Toulouse   2005.04.11  -  2005.04.13

  • A networked telepresence system for cars and its transmission issue Reviewed

    Fujikawa K., Yamazawa K., Ishikawa T., Butsuen Y., Sato T., Nakaramura Y., Sunahara H., Yokoya N.

    EUROMEDIA 2005 - 11th Annual Scientific Conference on Web Technology, New Media Communications and Telematics Theory Methods, Tools and Applications   119 - 123   2005.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84898882183&origin=inward

  • Web-based telepresence system using omni-directional video streams Reviewed

    Yamazawa K., Ishikawa T., Sato T., Ikeda S., Nakamura Y., Fujikawa K., Sunahara H., Yokoya N.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3333   45 - 52   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    DOI: 10.1007/978-3-540-30543-9_7

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=35048855070&origin=inward

  • KUPF: 2-Phase selection model of classification records Reviewed

    Kakiuchi M., Morishima N., Nakamura Y., Fujikawa K., Sunahara H.

    Proceedings - 2003 Symposium on Applications and the Internet Workshops, SAINT 2003   262 - 265   2003.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/SAINTW.2003.1210169

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84943763150&origin=inward

  • A WWW server benchmark system in IPv6 environment Reviewed

    Nakayama T., Nakamura Y., Sunahara H.

    Proceedings - 2003 Symposium on Applications and the Internet Workshops, SAINT 2003   258 - 261   2003.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/SAINTW.2003.1210168

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84943808133&origin=inward

  • Future of Ultra High Speed Network : Summary of Research for the Future Program "Integrated Network Architecture for Advanced Multimedia Application Systems"

    MIYAHARA Hideo, SHIMOJO Shinji, NISHIO Shojiro, TAMURA Shin-ichi, IKEDA Katsuo, KAMAE Tsuneyoshi, TATSUMI Haruyuki, TAKADA Toshihiro, MIZUSHIMA Hiroshi, MURATA Masayuki, MURAOKA Yoichi, NOGUCHI Sho-ichi, FUJIWARA Hiroshi, AIBARA Reiji, OHTA Masataka, ICHII Shingo, OIE Yuji, FUJIKAWA Kenji, NAKAYAMA Masaya, USHIJIMA Kazuo, NAKAMURA Yutaka

    ( Information Processing Society of Japan (IPSJ) ) 2   2002.02

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)

    CiNii Article

    Other Link: https://ci.nii.ac.jp/naid/110006381289

  • The design and implementation of a kernel monitoring system for network servers Reviewed

    Nakamura Y., Shimojo S., Kawai E., Yamaguchi S., Sunahara H.

    Proceedings - 2002 Symposium on Applications and the Internet, SAINT 2002   14 - 15   2002.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/SAINT.2002.994435

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84950131822&origin=inward

  • Development of a WWW server management support system Reviewed

    Nakamura Y., Shimojo S., Kawai E., Yamaguchi S., Sunahara H.

    Proceedings - 2002 Symposium on Applications and the Internet Workshops, SAINT 2002   99 - 106   2002.01

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)

    DOI: 10.1109/SAINTW.2002.994560

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84950148500&origin=inward

  • An analysis of WWW server status by packet monitoring Reviewed

    Nakamura Y., Chinen K., Yamaguchi S., Sunahara H.

    IEICE Transactions on Information and Systems   E83-D ( 5 )   1012 - 1019   2000.01

     More details

    Language:English   Publishing type:Research paper (scientific journal)

    Scopus

    Other Link: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=0034187027&origin=inward

▼display all

Conference Prsentations (Oral, Poster)

  • 九州工業大学における全学セキュア・ネットワークの更新(2019年度における更新について)

    中村豊, 佐藤彰洋, 福田豊, 和田数字郎, 岩崎宣仁

    第48回インターネットと運用技術研究会 

     More details

    Event date: 2020.03.02 - 2020.03.03   Language:Japanese  

  • ネットワークセキュリティ機器の評価に関する考察

    中村豊, 佐藤彰洋, 福田豊, 和田数字郎

    インターネットと運用技術シンポジウム2019 

     More details

    Event date: 2019.12.05 - 2019.12.06   Language:Japanese  

  • ネットワーク セキュリティ機器の評価環 境構築

    中村豊

    インターネットと運用技術シンポジウム2018 

     More details

    Event date: 2018.12.06 - 2018.12.07   Language:Japanese  

  • ブラックリストに基づく検出の効率化に向けた悪性DNSクエリ分類手法

    佐藤彰洋

    インターネットと運用技術シンポジウム2018 

     More details

    Event date: 2018.12.06 - 2018.12.07   Language:Japanese  

  • 九州工業大学における情報セキュリティ対策の取り組みについて

    中村豊

    インターネットと運用技術シンポジウム2017 

     More details

    Event date: 2017.12.07 - 2017.12.08   Language:Japanese  

  • 次世代ファイアーウォール機器の評価検証について

    中村豊

    インターネットと運用技術シンポジウム2016  情報処理学会 インターネットと運用技術研究会

     More details

    Event date: 2016.12.01 - 2016.12.02   Language:Japanese  

  • 2ホップ隣接アクセスポイントと連携した多数決に基づく協調型リンク評価手法の検討

    野林大起

    電子情報通信学会 2008年ソサイエティ大会 

     More details

    Event date: 2008.09.16 - 2008.09.19   Language:Japanese  

  • 大規模広域ネットワーク環境における階層型分散情報管理アーキテクチャの構築

    東島慶

    電気関係学会九州支部連合大会 

     More details

    Event date: 2008.09   Language:Japanese  

  • 隣接アクセスポイントを自律的に評価するマルチホップ無線ネットワークの研究開発

    野林大起

    電子情報通信学会 2008年総合大会 

     More details

    Event date: 2008.03.18 - 2008.03.21   Language:Japanese  

  • マルチホップ無線網におけるパケット到達率を用いた協調型リンク評価手法

    野林大起

    電子情報通信学会 技術研究報告 

     More details

    Event date: 2008.03.06 - 2008.03.07   Language:Japanese  

  • 分散センサーによる異常トラヒック検出機構の評価モデルと性能解析

    小林武史

    ネットワークシステム研究会, 電子情報通信学会 

     More details

    Event date: 2008.03.06 - 2008.03.07   Language:Japanese  

  • 自動シグネチャ生成システムにおけるトラヒック情報収集方式に関する検討

    東島慶

    情報処理学会第70 回全国大会 

     More details

    Event date: 2008.03   Language:Japanese  

  • センサーからの情報に基づいたシグネチャ自動生成システムのモデル化と基礎検討

    小林武史

    第70回情報処理学会全国大会, 情報処理学会 

     More details

    Event date: 2008.03   Language:Japanese  

  • マルチホップ無線網におけるパケット転送率を用いた隣接ノード評価手法

    野林大起

    電気関係学会九州支部連合大会 

     More details

    Event date: 2007.09.18 - 2007.09.19   Language:Japanese  

  • マルチホップ無線網における周辺ノードとの連携による隣接ノード評価手法

    野林大起

    電子情報通信学会 技術研究報告 

     More details

    Event date: 2007.09   Language:Japanese  

  • 認証情報管理サーバを用いたWebアクセスの高信頼化

    野林大起

    電子情報通信学会 2006年ソサイエティ大会 

     More details

    Event date: 2006.09.19 - 2006.09.22   Language:Japanese  

  • ハードウェアトークンと鍵管理サーバを用いたシングルサインオンシステムの開発

    野林大起

    電子情報通信学会 技術研究報告 

     More details

    Event date: 2006.05.24   Language:Japanese  

  • sFlowによるトラヒック監視システムの提案

    奈良先端科学技術大学院大学 情報科学研究科

    情報処理学会(DICOCO2005) 

     More details

    Event date: 2005.07.06 - 2005.07.08   Language:Japanese  

▼display all

Honors and Awards

  • 優秀ポスター賞

    情報処理学会インターネットと運用技術研究会   2019.12.06

    中村豊

     More details

    Country:Japan

  • 山下記念研究賞

    情報処理学会   2019.03.15

    中村豊

     More details

    Country:Japan

  • インターネットと運用技術シンポジ ウム(IOTS2018) アラクサラネットワークス賞

    情報処理学会インターネットと運用技術研究会   2018.12.07

    中村豊

     More details

    Country:Japan

  • インターネットと運用技術シンポ ジウム(IOTS2018) 優秀論文賞

    情報処理学会インターネットと運用技術研究会   2018.12.07

    佐藤彰洋,中村豊,小倉光 貴,野林大起,池永全志

     More details

    Country:Japan

  • 優秀プレゼンターション賞

    一般社団法人情報処理学会 インターネットと運用技術研究会   2017.12.08

    中村 豊

     More details

    Country:Japan

  • 藤村記念ベストプラクティス賞

    情報処理学会インターネットと運用技術研究会   2017.06.29

    中村豊,佐藤彰洋,福田豊, 和田数字郎

     More details

    Country:Japan

  • 論文誌編集活動感謝状

    電子情報通信学会情報・システムソサイエティ   2017.05.14

    中村豊

     More details

    Country:Japan

  • 優秀プレゼンテーション賞

    一般社団法人情報処理学会 インターネットと運用技術研究会   2016.12.02

    中村 豊

     More details

    Country:Japan

  • 活動功労賞

    一般社団法人電子情報通信学会 通信ソサイエティ   2016.09.21

    中村 豊

     More details

    Country:Japan

  • Certificate of Apprication, In recognition for outstanding service to COMPSAC

    IEEE Computer Society   2013.07.25

    Yutaka Nakamura

     More details

    Country:Japan

▼display all

Grants-in-Aid for Scientific Research

  • ステルシーSSH辞書攻撃のフローベース検出手法に関する研究

    Grant number:25330154  2013.04 - 2016.03   基盤研究(C)

  • パケットモニタリングを用いたDNSトラヒック解析による異常検知に関する研究

    Grant number:22700078  2010.04 - 2012.03   若手研究(B)

  • 分散モニタリングによる大規模オーバレイネットワークの自立制御に関する研究

    Grant number:19024062  2007.04 - 2009.03   特定領域研究

  • ネットワーク浸透のための融合技術と進化のための情報ダイナミクスに関する研究

    Grant number:18100001  2006.04 - 2011.03   基盤研究(S)

  • 分散モニタリングシステムによる大規模オーバレイネットワークの自律制御に関する研究

    Grant number:18049063  2006.04 - 2007.03   特定領域研究

  • 過去のトラヒックパターンに基づく異常トラヒック検出システムの設計と実装

    Grant number:17700063  2005.04 - 2007.03   若手研究(B)

▼display all

Activities of Academic societies and Committees

  • IEEE CS   COMPSAC 2019 Symposia NCIW: Networks, Communications, Internet & Web Technologies Program Comittee  

    2018.07 - 2019.07

  • IEEE CS   COMPSAC 2018 Symposia NCIW: Networks, Communications, Internet & Web Technologies Program Comittee  

    2017.07 - 2018.07

  • IEEE CS   ADMNET 2017: The 4th IEEE International COMPSAC Workshop on Architecture, Design, Deployment and Management of Networks and Applications Program Comit  

    2016.07 - 2017.07

  • IEEE CS   COMPSAC 2017 Symposia NCIW: Networks, Communications, Internet & Web Technologies Program Comittee  

    2016.07 - 2017.07

  • The institue of electronics, information and communication engineers (IEICE)  

    2016.04 - 2017.04

  • IEEE CS   COMPSAC 2016 Workshop ADMNET 2016  

    2015.07 - 2016.07

  • IEEE CS   COMPSAC 2016 TAIN: COMPSAC Symposium on Technologies and Applications of the Internet program committee  

    2015.07 - 2016.07

  • Information Processing Society of Japan (IPSJ)  

    2015.04 - 2020.03

  • The institue of electronics, information and communication engineers (IEICE)  

    2012.04 - 2016.04

▼display all