Shinsuke Miwa

Shinsuke Miwa
  • Doctor of Information Science
  • Chief Senior Researcher at National Institute of Information and Communications Technology

About

39
Publications
3,713
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
156
Citations
Introduction
How we can get reproducible experiments on hybrid simulation/emulation/real HW. We have to define seemless metrix for simulation/emulation/real HW to estimate reproducibility.
Current institution
National Institute of Information and Communications Technology
Current position
  • Chief Senior Researcher
Additional affiliations
April 2021 - April 2021
National Institute of Information and Communications Technology
Position
  • Senior Researcher
Education
April 1995 - March 1999

Publications

Publications (39)
Conference Paper
Deep packet inspection (DPI) is a basic monitoring technology, which realizes network traffic control based on application payload. The technology is used to prevent threats (e.g., intrusion detection systems, firewalls) and extract information (e.g., content filtering systems). Moreover, transport layer security (TLS) monitoring is required becaus...
Conference Paper
Full-text available
With the rapid advance of network virtualization technology which realizes SDN (Software Defined Network) and Cloud computing, current networking environment has become more flexible, diversified and complex. At the same time, complex networking environment sometimes imposes a great burden on network administrators for coping with complicated filte...
Conference Paper
Full-text available
With rising popularization of Android application, third party of APK market has become attractive target of attackers. There have been many research efforts on analyzing APK malware and malformed advertisement. However, so far, the empirical study of the large number of APKs distributed by third party market has not been discussed in detail. In th...
Article
In this paper we present a framework for evaluating wireless network performance through emulation. The framework uses a hybrid design in which the PHY layer is represented by a probabilistic model, whereas the MAC layer is executed as a functional module. Actual network applications and protocols are employed in order to create realistic test cond...
Conference Paper
Full-text available
Given the high importance of communication for disaster management and recovery operations, it is essential to develop solutions for restoring network connectivity after natural catastrophes. We have used a disaster emulation framework built on top of the large-scale network testbed StarBED in order to virtually recreate a series of disaster condit...
Conference Paper
Full-text available
Disaster situations require resilient ICT systems in order to provide as good as possible communication conditions in such catastrophic circumstances. The resiliency verification of ICT systems is however difficult, because reproducing large-scale disaster conditions in production networks is impossible without affecting their users. In this paper...
Conference Paper
Full-text available
Wireless devices are widely used today to access the Internet, despite the intermittent network connectivity they often provide, especially in mobile circumstances. The paradigm of Delay/Disruption Tolerant Networks (DTN) can be applied in such cases to improve the user experience. In this paper we present a network testbed for DTN applications and...
Conference Paper
Full-text available
Wireless networks offer the opportunity for the users to move as they use the network in scenarios such as voice and video communication, search-and-rescue operations, etc. User mobility typically takes place in inhabited areas, hence it is subject to constraints regarding the road and building infrastructure in those areas. In this paper we propos...
Article
Full-text available
In this paper we present the design and implementation of a framework for hybrid experiments that integrates a real-world wireless testbed with a wireless network emulation testbed. The real-world component of the framework, that we call "physical realm", can be used for those experiment aspects that are difficult to perform through emulation, such...
Article
Full-text available
In this paper we present a series of experiments that evaluate the performance of two DTN implementations, DTN2 and IBR-DTN, in urban mobility scenarios. The experiments were carried out on the wireless network emulation testbed named QOMB, which was extended to support such DTN evaluations. Our quantitative assessment verified the basic behavior o...
Conference Paper
We always have possibilities of being involved in various network troubles because of system misconfigurations and trouble by natural disasters, etc. So evaluations of network technologies under these situations are important. We are developing a framework for emulating environments with failures and evaluating technologies for recovering from them...
Conference Paper
StarBED is a network testbed begun in 2002 focused on running actual program code for software and hardware implementations. As hardware technologies develops, its facilities such as PCs and network equipments have been updated and we additionally developed SpringOS, a software support suite consisting of numerous program modules. The performance o...
Conference Paper
Full-text available
Scalable and reliable experiment support software needs to be developed to enable construction of large-scale experiment environments and experiments on the environment. The number of management servers in an experiment environment is generally less than the number of experiment nodes. This creates one-to-many communication when transferring data s...
Conference Paper
Full-text available
With the rapid popularization of cloud computing, mobile devices and high speed Internet, recent security incidents have become more complicated which imposes a great burden on network administrators. In this paper we propose an integration and simplification method of log strings obtained by many kinds of computer devices: memory, socket and file....
Conference Paper
Full-text available
The central IPv4 address pool managed by Internet Assigned Numbers Authority (IANA) was depleted in January 2011. Nevertheless, almost all nodes on the Internet still continue communicating with each other by using Internet protocol version 4 (IPv4). Since IPv4 addresses have been employed for a long time, it is difficult to immediately shift netwo...
Conference Paper
Full-text available
In the real Internet, various types of problems are encountered. Before integrating new technologies into the Internet, developers should understand the behavior of these technologies in the event of fault occurrence. Researchers conduct experiments on network testbeds to evaluate new technologies, but the main focus of the evaluations done so far...
Article
There are several name resolution proposals such as SRV-RR and mDNS, which provide application layer identifiers to describe service resources in the Internet. However, ordinary network applications can't leverage the identifiers offered by these approaches. The reason simply comes from the fact that almost every network softwares are constructed u...
Article
As network technologies have been infiltrated into our daily life, reliability of networks and technologies which compose them is important. In order to guarantee them to be safe, various network experiments are performed and researchers discuss these methodologies to improve them. We have developed and managed StarBED; large-scale general purpose...
Conference Paper
Full-text available
There are two types of network traffic in experimental environments. One is traffic which is derived from target elements and the other one is background traffic which is derived from surrounding elements. There is very little knowledge on the relationships between new elements and existing elements; therefore, surrounding elements that seem to hav...
Article
Full-text available
Building an experimental network within a testbed has been a tiresome process for experimenters, due to the complexity of the physical resource assignment and the configuration overhead. Also, the process could not be expedited across testbeds, because the syntax of a configuration file varies depending on specific hardware and software. Re-configu...
Article
Full-text available
New technologies that will be introduced to the Internet should be practically tested for effectiveness and for side effects. A realistic environment that simulates the Internet is needed to experimentally test such technologies, which will be widely deployed on the Internet. To support experimentation in a realistic, Internet-like environment, we...
Conference Paper
Full-text available
Hands-on experiences are indispensable to train IT operators. However, it is often difficult to conduct hands-on practices in many locations due to lack of resources such as PCs and network equipments. The cost of gathering lecturers and participants at one hands-on site is another possible problem in this situation. Utilization of remotely located...
Article
Recent viruses, worms, and bots, called malwares, have to be analyzed their behaviors for drawing out countermeasures against them. To avoid any impacts to/from the Internet, analyzing environments should be isolated from the Internet. In this paper, we defined the levels of containing malwares, also estimated our developed isolated sandboxes accor...
Article
Full-text available
Recently, rapid advances of CPU processor make it possible to provide illusion that several operating systems is running at the same time, in multiplex way. Particularly, transferring visualized OS technology called live migration, which moves virtual machine from one physical machine to another is promising technology for effective resource utiliz...
Conference Paper
Full-text available
One of the significant requirements for testing a software implementation of an inter-AS DDoS countermeasure is to measure the performance of the implementation in a large scale topology with typical DDoS tools and traffic. Ideally, an emulated inter-AS topology with same scale of the real Internet will provide similar characteristics of the real I...
Conference Paper
Full-text available
Recent viruses, worms, and bots, called malwares, often have anti-analysis functions such as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized environments. We discuss how malwares can be kept alive in an analyzing environment by disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet...
Article
Full-text available
Recent viruses, worms, and bots, called malwares, often have anti-analysis functions such as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized environments. We discuss how malwares can be kept alive in an analyzing environment by disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet...
Article
To analyze security incidents and verify security measures, an environment is required that enables the user to track and analyze phenomena caused by attacks, while taking the interaction among systems into consideration. However, security incidents have recently been growing more and more complex due to an increase in scale, simultaneous incidents...
Thesis
Full-text available
On the Internet, oppotunities for various business dealings to take place has grown significantly in the last few years. These dealings are taking place internationally and on round the clock basis, because the Internet has the following characteristics: connected internationally, and 24-hour available. Therefore, the international settlements are...
Article
Today, the changes and additions to services on the Internet must be tested for certain level of correctness before they are actually deployed. So many approaches are proposed to make network experiments. We describe the nature of network experiments, i.e., the elements that constitute them, and the relationships between stages in developing the te...
Article
Full-text available
New technologies that will be introduced to the Internet should be practically tested for effectiveness and for side effects. A realistic environment that simulates the Internet is needed to experimentally test such technologies, which will be widely deployed on the Inter- net. To support experimentation in a realistic, Internet-like environ- ment,...

Network

Cited By