Suguru Yamaguchi

Nara Institute of Science and Technology, Ikuma, Nara, Japan

Are you Suguru Yamaguchi?

Claim your profile

Publications (18)0 Total impact

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Sketches have been considered as an efficient and scalable structure for processing massive data. In this work, we propose a sketch-based method for detecting anomalies in network traffic. The method divides an IP traffic stream into sub-streams using the sketches and detects anomalies in the sub-streams based on a time-frequency analysis of the sub-stream's entropies. The paper shows detection and false positive rates of the method that was evaluated with real-world 150 Mbps traffic collected at the United States and Japan transit link.
    The 9th International Conference on Future Internet Technologies (CFI2014); 06/2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: With rain-related hazards, it is difficult to forecast and prepare for it due to the decline in the availability and reliability of global daily weather reports. Therefore, we need to make use of available unconventional commercial weather instruments to provide supplementary information to existing systems. A more accurate and reliable weather forecast can then be made due to the prompt availability of information from ubiquitous devices. As smartphones become a widely used device, we propose a conceptual design of a multi-device ground weather observation network using smartphones and other sensors. In this paper, we first investigate the differences between smartphone-based sensors and other sensors to determine issues to address for big data on global weather information. In our experiments, we found that the data quality differs among devices in a very small area of 100 m grid.
    2014 IEEE International Instrumentation and Measurement Technology Conference (I2MTC); 05/2014
  • Junya Niwa, Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: The development of wireless technologies, such as 3G and Wi-Fi, and the rapid growth of mobile devices equipped with sensors have enabled the practical use of Mobile Participatory Sensing (MPS). By gathering and utilizing sensor data using mobile devices, the deployment cost of services can be reduced. In the context of MPS, it is important to establish a method of storing and locating sensor data collected by millions of mobile devices. In this paper, the development of a sensor data repository system for a large-scale MPS platform is proposed. By storing sensor information in the mobile device's storage, the storage cost can be distributed. The proposed method of tracking the acquisition locations of sensor data can reduce management costs. In addition, a cache mechanism that can minimize duplicate transmissions of sensor data from mobile devices due to overlapping queries is introduced. Based on a two-day simulation, the proposed method can reduce the management cost of the acquisition locations by 80%. Furthermore, the cache method can reduce the transmission of duplicated sensor data on mobile devices.
    Proceedings of The Second ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC2013); 08/2013
  • Kazuya Okada, Takeshi Okuda, Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: Location aware information delivery is useful application, which automatically distribute information such as weather forecast, disaster information and advertisement to a user based on their location. Users' devices have to send their location to application provider, since there is no way for the provider to identify the devices' location. For this reason, service providers have to collect devices' location by themselves, there are no public service or infrastructure available for the purpose. In this paper, we propose Location based Multicast, which is implemented fully on the Internet. The multicast forwards a packet based on a users' location and area. We present new IPv6 multicast address for the LBM. We call the address GALMA, Geographically Aggregately Location based Multicast Address. GALMA has hierarchical area specification and route aggregation in its structure like nicest IP address. Users' device generates the address and joins the multicast network, then the device is ready to receives location aware information to that area. Also, we present a deployment design of LBM routing based on LISP scheme. LBM provides open platform for the services, thereby service providers do not care location information of user by themselves.
    Proceedings of the 2013 IEEE Workshop of Pervasive Internet of Things and Smart Cities(PITSaC 2013); 03/2013
  • Manabu Hirano, D.W. Chadwick, Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper shows the design and implementation of a Role Based Access Control (RBAC) mechanism for securing a hypervisor called BitVisor. BitVisor is a small hypervisor that provides security functions like encryption services for I/O devices in its hypervisor-layer. BitVisor enforces security functions without the help of guest OSs, but it only supports a static configuration file for machine set up. Consequently, we employ the RBAC system called PERMIS, a proven implementation of an RBAC policy decision engine and credential validation service, in order to provide dynamic configuration control. By using PERMIS, we can write finer grained authorization policies and can dynamically update them for the security-purpose hypervisor.
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on; 01/2013
  • Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: The IP Multimedia Subsystem (IMS) is constantly evolving to meet the growth of mobile services and Internet applications. One major security problem of the IMS is flooding attacks. There are many works that have been proposed to detect such attacks. However, generally, the detection systems trigger many alarms and most of them are false positives. These false alarms impact the quality of the detection. In this paper, we first present a method to improve the detection accuracy of SIP flooding detection in IMS by using a trust model. The trust value is calculated by a communication activity between a caller and a callee. By this algorithm, the trust value of an attacker is lower than a legitimate user because it does not have real human activities. To evaluate the proposed method, we integrate the trust model with three SIP flooding attack detection algorithms: Cumulative sum, Hellinger distance, and Tanimoto distance. The system is evaluated by using a comprehensive traffic dataset that consists of varying legitimate and malicious traffic patterns. The experimental results show that the trust integration method can reduce false alarms and improve the accuracy of the flooding attack detection algorithms.
    Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual; 01/2013
  • Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: The IP Multimedia Subsystem (IMS) supports many kinds of multimedia services and is constantly evolving to meet the growth of mobile services and Internet applications. However, the security specifications of IMS networks do not provide any features to protect the system against Denial of Service (DoS) attacks, so a malicious attack can block the system by congesting a core service of IMS. To address the DoS attack problem, we propose an anomaly-based detection system using the Tanimoto distance to identify deviations in the traffic. We use a modified moving average approach to select a threshold. We also propose using a momentum oscillator to detect a slightly increasing attack. We evaluated the ability of our technique to detect attacks using a comprehensive synthetic data set containing various malicious traffic. Experimental results show that our technique accurately identified attacks and has the flexibility to deal with many types of attack patterns.
    Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on; 01/2012
  • Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, the information systems in our society have been growing and changed dramatically with its scale, cloud computing services and security management requirement. This changes forces us to develop new scheme of information system management. This paper gives summary of his invited talk at NETSAP2011.
    11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings; 01/2011
  • Source
    Engineering the Computer Science and IT, 10/2009; , ISBN: 978-953-307-012-4
  • [Show abstract] [Hide abstract]
    ABSTRACT: The emerging mobile WiMAX (IEEE 802.16e) has gained serious attention as a means of providing wireless broadband access to mobile users. 802.16e supports high data rates and QoS for various applications, and is thus a powerful contender for next generation wireless access technology. On the other hand, IEEE 802.11 a/b/g/n have already been widely used to provide high data rates in a limited area. Therefore, in the near future, 802.16e and 802.11 will co-exist and a multi-homed mobile station (MS) will be likely to execute many handovers (HOs) due to free movement among 802.16e's hotzones and 802.11's hotspots. Many studies of HO decision criteria for 802.11 have been conducted but, so far, HO decision criteria for 802.16e have not yet been sufficiently studied, in particular that for MS-initiated HO in 802.16e. In this paper, we propose MS-initiated HO decision criteria for VoIP over 802.16e considering wireless link condition and congestion state of the 802.16e network, i.e, CINR and MS queue length. Our simulation results show that the combined use of MS queue length and CINR can be a proper MS-initiated HO decision criterion for VoIP over 802.16e.
    Communications, Computers and Signal Processing, 2009. PacRim 2009. IEEE Pacific Rim Conference on; 09/2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: In the near future, wireless local area networks (WLANs) will overlap to provide continuous coverage over a wide area. In such ubiquitous WLANs, a mobile node (MN) freely moves between WLANs with different IP subnets during VoIP communication. However, existing methods cannot sufficiently maintain VoIP quality during handover due to changes of IP address and inappropriate execution of handover. To solve these problems, in our previous paper, we proposed and implemented a seamless handover method employing multi-path transmission and a handover trigger based on frame retries. However, we have not sufficiently shown the effectiveness of our proposed method in a practical environment. Therefore, in this paper, we focus on the two features of our proposed method, i.e., frame retries and multi-path transmission, and present a detailed evaluation of our proposed method in a real environment.
    Communications, Computers and Signal Processing, 2009. PacRim 2009. IEEE Pacific Rim Conference on; 09/2009
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Virtual machine monitors (VMMs), also called hypervisors, can be used to construct a trusted computing base (TCB) enhancing the security of existing operating systems. The complexity of a VMM-based TCB causes the high risk of security vulnerabilities. Therefore, this paper proposes a two-step execution mechanism to reduce the complexity of a VMM-based TCB. We propose a method to separate a conventional VMM-based TCB into the following two parts: (1) A thin hypervisor with security services and (2) A special guest OS for security preprocessing. A special guest OS performing security tasks can be executed in advance. After shutting down the special guest OS, a hypervisor obtains preprocessing security data and next boots a target guest OS to be protected. Thus, the proposed two-step execution mechanism can reduce run-time codes of a hypervisor. This paper shows a design, a prototype implementation and measurement results of lines of code using BitVisor, a VMM-based TCB we have developed.
    Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on; 07/2009
  • Source
    Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi
    IPSJ Digital Courier 01/2008; DOI:10.2197/ipsjdc.4.114
  • Takeshi Okuda, Suguru Yamaguchi
    Journal of Information Processing 01/2008; 16:157-164. DOI:10.2197/ipsjjip.16.157
  • Source
    Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi
    [Show abstract] [Hide abstract]
    ABSTRACT: Our proposed simple device authentication framework (1) aims to provide device-oriented authentication and authorization mechanisms for non-PC Internet-ready information appliances. The purpose of the framework is to prevent device spoofing, and to restrict unauthorized access to the device in a future ubiquitous network. We have developed the novel smart card software to achieve peer to peer device-oriented PKI authentication and authorization on the secure tamper-resistant smart card. We assume that the smart card will be attached to a device such as an information appliance. In this paper, we show the prototype implementation of authentication middleware using our novel smart card software and the IKEv1 program. The IKEv1 program cooperates with our novel smart card software to achieve peer to peer production-level identity authentication for devices. Thus, our framework and its application shown in this paper will help to realize secure ubiquitous computing for Internet-ready home appliances.
    2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan; 01/2007
  • [Show abstract] [Hide abstract]
    ABSTRACT: In future ubiquitous networks, devices that accept any connections over a network will need to verify the identity of a connecting peer to prevent device spoofing. In this paper, we propose an authentication framework not for human beings, but for devices. The proposed Simple Device Authentication Framework has the advantages of realizing both production-level identity using serial numbers initialized by the manufacturer, and owner-level personalized device attributes set up by users. Our proposed framework employs smart card technology to add an authentication function to a device such as an information appliance with a poor user interface. We have implemented the core component of this framework- novel smart card software and its configuration tools- to achieve device-oriented authentication.
    Wireless, Mobile and Multimedia Networks, 2006 IET International Conference on; 12/2006
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Many peoples are using the Internet and many types of devices have emarged. In this situation, a single user wants to continue to work in anytime and anywhere. Current contents service targets specific devices, so that it cannot support many different types of devices. To realize continuous and transparent services, we propose a new model of ASP. In our proposed model, User Agent and Application Agent can work together to provide service continuity and device transparency. Then, we implemented a prototype based on this model and evaluated our model. As a conclution, our model could provide continuous and device transparent service. 1
  • Kiyohiko Okayama, Suguru Yamaguchi, Hideo Miyahara
    [Show abstract] [Hide abstract]
    ABSTRACT: To provide reliable Internet service, in addition to a computer operating as a server, it is necessary to have a steady running gateway for connection between networks. If a problem arises with this equipment, early and fast recovery service is essential. However, due to fast Internet expansion and increasing complexity of problems, at the current stage problem management is neither fast nor accurate, which contributes to overload of network managers. The SPLICE/NM system described in this article was designed to assist managers by automating the recovery operations. The main point of SPLICE/NM is that managers can use a programming language to describe operations performed at their terminals, and the work automation is achieved by recording scripts generated by managers. In addition to techniques aimed at automation of problem management, the article describes design methods suitable for Internet applications of SPLICE/NM. © 2000 Scripta Technica, Syst Comp Jpn, 31(9): 89–99, 2000
    Systems and Computers in Japan 08/2000; 31:89-99. DOI:10.1002/1520-684X(200008)31:93.0.CO;2-2

Publication Stats

16 Citations

Institutions

  • 2000–2014
    • Nara Institute of Science and Technology
      • Graduate School of Information Science
      Ikuma, Nara, Japan
  • 2009
    • Kyushu Institute of Technology
      • Faculty of Computer Science & Systems Engineering
      Kitakyūshū, Fukuoka, Japan
  • 2006
    • Toyota National College of Technology
      • Department of Information and Computer Engineering
      Koromo, Aichi, Japan