128 results on '"Shingo, Ata"'
Search Results
2. Efficient 3D-RSS map estimation method based on area classification
- Author
-
Takahiro Matsuda, Azusa Danjo, and Shingo Ata
- Subjects
Estimation ,Computer science ,business.industry ,RSS ,Tensor completion ,Pattern recognition ,computer.file_format ,Artificial intelligence ,business ,computer - Published
- 2021
3. Foot-surface-structure analysis using a smartphone-based 3D foot scanner
- Author
-
Masashi Kawasumi, Shingo Ata, Kazuhiko Yamashita, Mitsuru Sato, and Tomoko Yamashita
- Subjects
Male ,Orthodontics ,Scanner ,Foot surface ,Structure analysis ,biology ,Foot ,business.industry ,Biomedical Engineering ,Biophysics ,biology.organism_classification ,Video image ,Risk evaluation ,Valgus ,Foot structure ,Humans ,Regression Analysis ,Medicine ,Female ,Smartphone ,Hallux Valgus ,business ,Metatarsal Bones ,Foot (unit) - Abstract
1 Background A thorough understanding of the influence of the foot skeletal structure on hallux valgus (HV) is required for HV prevention. We developed a system using a 3D foot scanner on a smartphone to clarify the relationships between foot features and HV risk. Methods Two-dimensional video images were recorded on a smartphone, sent to a computer or cloud server, and used to construct a 3D foot-feature model, considering 10 foot features associated with HV. The participants (419 individuals, aged 40–89 years) stood with their toes 12 cm apart and heels 8 cm apart during video recording. The height and weight were measured for body-mass index calculation. Results Age-dependent foot-feature variations were observed slightly for males and distinctively for females. For females, the great toe–first metatarsal head–heel (GFH) angle associated with HV increased with age, i.e., the GFH angle increased with age, suggesting that HV increased with age. Multiple regression analysis revealed that the features determining the GFH angle are the second toe–heel–navicular angle, bone distance axis, and transverse arch length and height. The adjusted coefficients of determination were 0.54 and 0.52 for males and females, respectively. Conclusion This approach enables simple foot structure assessment for HV risk evaluation.
- Published
- 2021
4. Analysis of skeletal characteristics of flat feet using three-dimensional foot scanner and digital footprint
- Author
-
Tomoko, Yamashita, Kazuhiko, Yamashita, Mitsuru, Sato, Masashi, Kawasumi, and Shingo, Ata
- Subjects
Male ,Biomaterials ,Anthropometry ,Radiological and Ultrasound Technology ,Foot ,Linear Models ,Biomedical Engineering ,Humans ,Female ,Radiology, Nuclear Medicine and imaging ,General Medicine ,Flatfoot ,Body Height - Abstract
Background Flat feet increase the risk of knee osteoarthritis and contribute to frailty, which may lead to worse life prognoses. The influence of the foot skeletal structure on flat feet is not yet entirely understood. Footprints are often used to evaluate feet. However, footprint-based measurements do not reflect the underlying structures of feet and are easily confounded by soft tissue. Three-dimensional evaluation of the foot shape can reveal the characteristics of flat feet. Therefore, foot shape evaluations have garnered increasing research interest. This study aimed to determine the correlation between the three-dimensional (3D) features of the foot and the measurement results of footprint and to predict the evaluation results of flat feet from the footprint based on the 3D features. Finally, the three-dimensional characteristics of flat feet, which cannot be revealed by footprint, were determined. Methods A total of 403 individuals (40–89 years) participated in this study. The proposed system was developed to identify seven skeletal features that were expected to be associated with flat feet. The loads on the soles of the feet were measured in a static standing position and with a digital footprint device. Specifically, two footprint indices were calculated: the Chippaux–Smirak index (CSI) and the Staheli index (SI). In the analysis, comparisons between male and female measurement variables were performed using the Student’s t test. The relationships between the 3D foot features and footprint index parameters were determined by employing the Pearson correlation coefficient. Multiple linear regression was utilized to identify 3D foot features that were strongly associated with the CSI and SI. Foot features identified as significant in the multivariate regression analysis were compared based on a one-way analysis of variance (ANOVA) with Tukey’s post hoc test. Results The CSI and SI were highly correlated with the instep height (IH) and navicular height (NH) of the 3D foot scanning system and were also derived from multiple regression analysis. In addition to the NH and IH, the indicators of the forefoot, transverse arch width, and transverse arch height were considered. In the flat foot group with CSI values above 62.7%, NH was 13.5% (p p = 0.01) for females, and the axis of the bone distance was 5.3% (p = 0.05) for males and 4.9% (p = 0.10) for females. In particular, for CSI values above 62.7% and NH values below 13%, the axis of the bone distance was large and the foot skeleton was deformed. Conclusions Decreased navicular bone height could be evaluated with the 3D foot scanning system even when flat feet were not detected from the footprint. The results indicate that the use of quantitative indices for 3D foot measurements is important when evaluating the flattening of the foot. Trial registration number UMIN000037694. Name of the registry: University Hospital Medical Information Network Registry. Date of registration: August 15, 2019.
- Published
- 2022
5. Heat Stroke Prevention in Hot Specific Occupational Environment Enhanced by Supervised Machine Learning with Personalized Vital Signs
- Author
-
Takunori Shimazaki, Daisuke Anzai, Kenta Watanabe, Atsushi Nakajima, Mitsuhiro Fukuda, and Shingo Ata
- Subjects
Hot Temperature ,Heat Stroke ,Chemical technology ,vital sensing ,WBGT ,heat stroke prevention ,supervised machine learning ,TP1-1185 ,Heat Stress Disorders ,Biochemistry ,Article ,Atomic and Molecular Physics, and Optics ,Body Temperature ,Analytical Chemistry ,Humans ,Electrical and Electronic Engineering ,Instrumentation - Abstract
Recently, wet-bulb globe temperature (WBGT) has attracted a lot of attention as a useful index for measuring heat strokes even when core body temperature cannot be available for the prevention. However, because the WBGT is only valid in the vicinity of the WBGT meter, the actual ambient heat could be different even in the same room owing to ventilation, clothes, and body size, especially in hot specific occupational environments. To realize reliable heat stroke prevention in hot working places, we proposed a new personalized vital sign index, which is combined with several types of vital data, including the personalized heat strain temperature (pHST) index based on the temperature/humidity measurement to adjust the WBGT at the individual level. In this study, a wearable device was equipped with the proposed pHST meter, a heart rate monitor, and an accelerometer. Additionally, supervised machine learning based on the proposed personalized vital index was introduced to improve the prevention accuracy. Our developed system with the proposed vital sign index achieved a prevention accuracy of 85.2% in a hot occupational experiment in the summer season, where the true positive rate and true negative rate were 96.3% and 83.7%, respectively.
- Published
- 2022
6. Optimizing functional split of baseband processing on TWDM-PON based fronthaul network
- Author
-
Masayuki Murata, Masayuki Kashima, Yoshihiro Nakahira, Shingo Ata, and Go Hasegawa
- Subjects
Optimization problem ,business.industry ,Computer science ,05 social sciences ,Latency (audio) ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Passive optical network ,0508 media and communications ,Wavelength-division multiplexing ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Baseband ,business ,5G ,Computer network ,Efficient energy use - Abstract
One of the major shortcomings of Centralized Radio Access Networks (C-RAN) is that the large capacity is required for fronthaul network between Remote Radio Heads (RRHs) and central office with baseband unit (BBU) pool. Possible solutions are to introduce lower-cost networking technology for fronthaul network, such as Time and Wavelength Division Multiplexing Passive Optical Network (TWDM-PON), and to introduce functional split, that moves some baseband processing functions to cell site to decrease the utilization of the fronthaul network. In this paper, we construct the mathematical model for selecting function split options of baseband processing to minimize the power consumption of TWDM-PON based fronthaul network. In detail, we formulate the optimization problem for minimizing the total power consumption of fronthaul network in terms of the capacity of TWDM-PON, the number of RRHs in each cell site, server resources, latency constraints, the amount of traffic from each RRH, physical/virtual server power consumption characteristics. Numerical examples are shown for confirming the correctness of the proposed model and for presenting the effect of resource enhancement methods on the capacity and energy efficiency of the system.
- Published
- 2020
7. Quantification and Visualization of Reliable Hemodynamics Evaluation Based on Non-Contact Arteriovenous Fistula Measurement
- Author
-
Rumi Iwai, Takunori Shimazaki, Yoshifumi Kawakubo, Kei Fukami, Shingo Ata, Takeshi Yokoyama, Takashi Hitosugi, Aki Otsuka, Hiroyuki Hayashi, Masanobu Tsurumoto, Reiko Yokoyama, Tetsuya Yoshida, Shinya Hirono, and Daisuke Anzai
- Subjects
Arteriovenous Shunt, Surgical ,Heart Rate ,Renal Dialysis ,Arteriovenous Fistula ,Hemodynamics ,Humans ,hemodialysis ,hemodynamics ,arteriovenous fistula ,non-contact measurement ,Electrical and Electronic Engineering ,Biochemistry ,Instrumentation ,Atomic and Molecular Physics, and Optics ,Analytical Chemistry - Abstract
The condition of arteriovenous fistula (AVF) blood flow is typically checked by using auscultation; however, auscultation should require a qualitative judgment dependent on the skills of doctors, and further attention to contact infection is required. For these reasons, this study developed a non-contact and non-invasive medical device to measure the pulse wave of AVFs by applying optical imaging technology. As a first step toward realization of the quantification judgment based on non-contact AVF measurement, we experimentally validated the developed system, whereby the hemodynamics of 168 subjects were visually and quantitatively evaluated based on clinical tests. Based on the evaluation results, the fundamental statistical characteristics of the non-contact measurement, including the average and median values, and distribution of measured signal-to-noise power ratio, were demonstrated. The clinical test results contributed to the future construction of quantified criteria for the AVF condition with the non-contact measurement.
- Published
- 2022
8. A Device Identification Method Based on Combination of Multiple Information
- Author
-
Nobuyuki Nakamura, Shingo Ata, Taketsugu Yao, Yuki Imamura, and Ikuo Oka
- Subjects
Identification methods ,Identification (information) ,Similarity (geometry) ,Computer science ,business.industry ,Control (management) ,Limit (mathematics) ,Data mining ,Cluster analysis ,Internet of Things ,business ,computer.software_genre ,computer - Abstract
Recently, security issues have become more serious with the spread of IoT devices. To reduce the security risks when using communication devices, network administrators should know detailed information of all devices connected in the network and control them accordingly. Although there are many studies about identifying devices based on information from the network, there is a limit to improving the accuracy of device identification by using a single identification method.In this paper, we propose a new method to improve the accuracy of device identification by using a combination of results from multiple identification methods. We define a new index, called similarity, between multiple devices by using the results from multiple identification methods and identify devices based on the similarity. The results of evaluations for communication devices connected to a real network show that our method can improve the accuracy of device identification by 23.0 percent.
- Published
- 2020
9. An Automatic Error Identification Method in Call Control Protocol Using Levenshtein Distance
- Author
-
Taketsugu Yao, Yasubumi Chimura, Shingo Ata, Nobuyuki Nakamura, and Keishu Umoto
- Subjects
Protocol (science) ,Session Initiation Protocol ,Voice over IP ,business.industry ,computer.internet_protocol ,Computer science ,Interoperability ,Levenshtein distance ,computer.software_genre ,Call control ,Identification (information) ,Data mining ,business ,computer ,Error identification - Abstract
As the number of IP-based telephony-like voice over IP (VoIP) users increases, interoperability of devices will become much more important to achieve smooth communications between arbitrary pairs of devices. To this end, detection and analysis of communication failures are key issues for validating interoperability. However, current failure (error) detections must be manually confirmed, which requires significant effort. Therefore, an automatic error-identification method is necessary. A straightforward approach can be considered that involves using a learning-based algorithm (e.g., k-nearest-neighbor-based classification) to identify errors; however, it is difficult to collect useful training data to achieve high identification accuracy. Since the number of conditions that we can prepare for in advance to collect training data is quite a bit less than that in a real environment, many errors may be misidentified when such cases are not included in the training data. To solve this problem, we propose a method which considers the characteristics of message sequences in a VoIP session control protocol (i.e., Session Initiation Protocol) by applying a similar approach of editing the distance between strings. Experiments using real environment data show that our method can improve the accuracy of identifying errors that are not included in the training data and enable administrators to collect new training data for unknown errors.
- Published
- 2020
10. Realization of mobility-controlled flying router in information-centric networking
- Author
-
Masayuki Murata, Shingo Ata, Yuhao Gao, Suyong Eum, and Taku Kitagawa
- Subjects
Router ,Routing protocol ,Computer Networks and Communications ,business.industry ,Computer science ,010102 general mathematics ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,01 natural sciences ,Telecommunications network ,Information-centric networking ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,0101 mathematics ,Routing (electronic design automation) ,business ,Host (network) ,Information Systems ,Computer network - Abstract
Constructing a large-scale network in outdoor fields with wired or wireless antennas involves a huge deployment cost. New devices, called movable routers, are able to realize the networks at a low cost. Recently, a large number of internet of things nodes have been deployed into the networks in outdoor fields. In the current communication network, users intend to communicate with devices without knowing where they are, but the current network still focuses on device locations, complicating configuration and implementation of the network. In this study, we design an architecture called router-movable information-centric networking (RMICN) to realize content-based communication instead of host-based communication, for facilitating communications between disjointed networks using movable routers. We incorporate information-centric networking technologies in the design of the system for the naming scheme and the strategy layer, enabling device control over the movable routers, called flying routers. In the simulation results, we show that RMICN can further reduce the response time of content requests compared with delay-tolerant networking. Furthermore, we present a proof-of-concept implementation of the architecture to confirm the feasibility of the design.
- Published
- 2018
11. Channel Selection Metric by the Number of Users and SNR in WLAN
- Author
-
Ikuo Oka, Taiga Okutate, and Shingo Ata
- Subjects
Range (mathematics) ,Polynomial ,Computer science ,Metric (mathematics) ,Delay analysis ,Function (mathematics) ,Algorithm ,Carrier sense multiple access with collision avoidance ,Selection (genetic algorithm) ,Computer Science::Information Theory ,Communication channel - Abstract
In this paper, a channel selection metric is presented for WLAN. It is based on SNR and the number of users. A delay time is employed to define metric of channel selection. Nth-order polynomials are introduced to obtain a polynomial metric in a tractable form. The advantage of formulation is that more parameters other than SNR or the number of users can be added to metric without taking up complex delay analysis. Numerical results are presented to demonstrate metric as a function of SNR and the number of users. The effective range of metric is discussed with a difference between the polynomial and delay time metrics.
- Published
- 2019
12. Probability Distribution Analysis of Backoff Time with Frozen Backoff in CSMA/CA
- Author
-
Shingo Ata, Ikuo Oka, and Koki Samoto
- Subjects
business.industry ,Computer science ,Maximum likelihood ,Transmission rate ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer Science::Performance ,Computer Science::Networking and Internet Architecture ,Wireless ,Probability distribution ,business ,Algorithm ,Carrier sense multiple access with collision avoidance ,Analysis method ,Degradation (telecommunications) - Abstract
Recently, in wireless communications a transmission rate degradation due to the increase of traffic becomes a serious problem. To deal with this problem, the number of users is an important parameter. To the estimation of the number of users, a probability distribution of backoff is applicable with the maximum likelihood approach. In this paper, an analysis method is proposed to derive the probability distribution of backoff considering frozen backoff in time axis. The analysis and simulation results are compared to show the validity the proposed method.
- Published
- 2019
13. Compact CAR: Low-Overhead Cache Replacement Policy for an ICN Router
- Author
-
Suyong Eum, Atsushi Ooka, Shingo Ata, and Masayuki Murata
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Router ,Hardware_MEMORYSTRUCTURES ,Computer Networks and Communications ,CPU cache ,Computer science ,business.industry ,media_common.quotation_subject ,020206 networking & telecommunications ,Content delivery network ,Context (language use) ,02 engineering and technology ,020202 computer hardware & architecture ,Computer Science - Networking and Internet Architecture ,Information-centric networking ,Content centric networking ,0202 electrical engineering, electronic engineering, information engineering ,Cache ,Electrical and Electronic Engineering ,Function (engineering) ,business ,Software ,media_common ,Computer network - Abstract
Information-centric networking (ICN) has gained attention from network research communities due to its capability of efficient content dissemination. In-network caching function in ICN plays an important role to achieve the design motivation. However, many researchers on in-network caching have focused on where to cache rather than how to cache: the former is known as contents deployment in the network and the latter is known as cache replacement in an ICN element. Although, the cache replacement has been intensively researched in the context of web-caching and content delivery network previously, the conventional approaches cannot be directly applied to ICN due to the fine granularity of cacheable items in ICN, which eventually changes the access patterns. In this paper, we argue that ICN requires a novel cache replacement algorithm to fulfill the requirements in the design of high performance ICN element. Then, we propose a novel cache replacement algorithm to satisfy the requirements named Compact CLOCK with Adaptive Replacement (Compact CAR), which can reduce the consumption of cache memory to one-tenth compared to conventional approaches., Comment: 15 pages, 29 figures, submitted to Computer Communications
- Published
- 2018
14. Scalable Cache Component in ICN Adaptable to Various Network Traffic Access Patterns
- Author
-
Atsushi Ooka, Shingo Ata, Eum Suyong, and Masayuki Murata
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,020202 computer hardware & architecture ,Smart Cache ,Information-centric networking ,Component (UML) ,Scalability ,Content centric networking ,0202 electrical engineering, electronic engineering, information engineering ,Cache ,Electrical and Electronic Engineering ,business ,Software ,Computer network ,Active networking - Published
- 2018
15. Management of Information, Communications, and Networking: from the Past to the Future
- Author
-
Shingo Ata and Toshio Tonouchi
- Subjects
Information management ,Knowledge management ,Computer Networks and Communications ,Computer science ,business.industry ,Long-haul communications ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Communications system ,Communications management ,Control communications ,Information and Communications Technology ,Systems management ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Electrical and Electronic Engineering ,business ,Telecommunications ,computer ,Software - Published
- 2017
16. 16th IFIP/IEEE International Symposium on Integrated Network Management (IM 2019) - Experience Session
- Author
-
Betser, Joe, Fung, Carol, Clemm, Alexander, François, Jérôme, Shingo, Ata, Badonnel, Rémi, Moura, Giovane, The Aerospace Corporation, Virginia Commonwealth University (VCU), Ludwig Maximilian University [Munich] (LMU), Resilience and Elasticity for Security and ScalabiliTy of dynamic networked systems (RESIST), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Networks, Systems and Services (LORIA - NSS), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Osaka University [Osaka], SIDN Labs, and IEEE
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2019
17. Design and Implementation of Tracking System for Moving Objects in Information-Centric Networking
- Author
-
Masayuki Murata, Tatsuya Tanaka, Shingo Ata, and Suyong Eum
- Subjects
Service (systems architecture) ,Data processing ,Focus (computing) ,SIMPLE (military communications protocol) ,Computer science ,business.industry ,media_common.quotation_subject ,Tracking system ,Information-centric networking ,business ,Function (engineering) ,Computer network ,media_common ,Data transmission - Abstract
Recently, Information-Centric Networking (ICN) attracts attention as the communication infrastructure for the Internet of Things (IoT) environment that requires various device cooperation and the mobility environment where an address frequently changes. By using “control”, “management”, and “data processing” in the network, ICN is expected not only as a simple data transfer but also an information distribution infrastructure with service provision function. However, many ICN researches focus on accessing static content with a name, and an ICN architecture that provides dynamic services has not been sufficiently researched. In order to develop network functions that realize dynamic services in ICN, we design and implement the tracking system for moving objects with ICN. We implement the designed system and conduct operation experiments using actual equipment, and confirm that ICN can realize a dynamic video distribution service that tracks a moving object based on the designed system and ICN has the possibility as an information distribution infrastructure with dynamic service provision function.
- Published
- 2019
18. PSK and QAM Classification by Likelihood under Unknown SNR Condition
- Author
-
Ikuo Oka, Shinji Nishijima, and Shingo Ata
- Subjects
QAM ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Algorithm - Published
- 2016
19. Exact Analysis for Error Probability of Max-Log-MAP Decoding in Sequence Dependent Channels
- Author
-
Riku Iwanaga, Shingo Ata, Tadashi Tomizuka, and Ikuo Oka
- Subjects
Sequence ,020206 networking & telecommunications ,Probability density function ,02 engineering and technology ,Trellis (graph) ,Intersymbol interference ,Bit (horse) ,Probability of error ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Mathematics - Abstract
An exact analysis is presented for bit error probability of Max-Log-MAP decoding in sequence dependent channels. In the channels, an average bit error probability is derived by averaging the bit error probability of fixed sequence over all sequences, however, it causes the exponential complexity increase with a sequence length.In this paper, a new method is proposed for the averaging operation in the exact error probability analysis of Max-Log-MAP decoding. It is based on the integration of the probability density function (pdf’s) of merging path metrics at every trellis transition. An illustrative example of bit error probability is shown for 2-state intersymbol interference channels.
- Published
- 2018
20. On the Use of Naming Scheme for Controlling Flying Router in Information Centric Networking
- Author
-
Masayuki Murata, Yuhao Gao, Shingo Ata, Suyong Eum, and Taku Kitagawa
- Subjects
Scheme (programming language) ,Router ,021103 operations research ,Computer science ,business.industry ,Control (management) ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,Base station ,Information-centric networking ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,computer.programming_language ,Computer network - Abstract
Recently, Information-Centric Networking (ICN), is attracting attention as a network capable of flexible communication especially in IoT mobility environments. As a research on flexible controls in ICN, we have been involved in a movable router using Unmanned Aerial Vehicles (UAVs) or drones (called Flying Routers (FRs)) to realize communication in disjoint networks. In previous studies, control of Flying Routers was targeted reactively where FRs move according to the events on receiving Interest or Data. However, in order to realize a collaborative movement strategy such as content retrieval in consideration of cooperation by multiple FRs, more strategic ways which directly control FRs according to decision of path optimization. For this purpose, in this paper, we design a communication control system which strategically controls FRs by sending explicit Interests. We incorporates ICN technologies in the design of the system: naming scheme and strategy layer, which enable flexible control over FRs. Furthermore, we present a Proof-of-Concept (PoC) implementation of the system to confirm the feasibility of the design.
- Published
- 2018
21. Automation of Network Operations by Cooperation between Anomaly Detections and Operation Logs
- Author
-
Shingo Ata, Naoki Yoshida, Tsunemasa Hayashi, and Hiroki Nakayama
- Subjects
Service (systems architecture) ,Honeypot ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Intrusion detection system ,Computer security ,computer.software_genre ,Network operations center ,Automation ,020202 computer hardware & architecture ,Network management ,Information and Communications Technology ,Server ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer - Abstract
Recently, network management becomes therefore more important to save a safe and secure ICT infrastructure. Since it is difficult to take appropriate actions against rapid, complicated, and diversed variation of behaviors in networking and service systems, conventional network management heavily relies on highly expertised operators. Automation of the management of ICT infrastructure is now a big challenging for future networks due to shortage of experts in network operations and management. In this paper, we propose a new framework for automating operations and management of ICT infrastructure, by combination of both networking/system incidents and records of operations. Our framework mainly focuses on the integration of various types of log data (e.g., alerts, flow analysis, access logs, command execution logs, etc.). As a proof of concept (PoC), we demonstrate an implementation of our framework by using honeypots and ssh-based agents.
- Published
- 2017
22. Identification of communication devices from analysis of traffic patterns
- Author
-
Ikuo Oka, Nobuyuki Nakamura, Hiroki Kawai, and Shingo Ata
- Subjects
Computer science ,business.industry ,Network packet ,Cognitive neuroscience of visual object recognition ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,Variety (cybernetics) ,Identification (information) ,Server ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Electronics ,010306 general physics ,Internet of Things ,business ,Computer network - Abstract
Recently, variety of communication devices such as printers, IP telephones, network cameras are used widely, with the support of networking in consumer electronics. As a spread of IoT (Internet of Things), the number of embed devices are significantly increasing, however, such devices have lack of capability on security. It is therefore desirable that a network identifies these devices to take appropriate operations. In this paper, we propose an identification method of communication devices from monitoring patterns of traffic, here we use statistical metrics such as packet inter-arrival time or packet size, and we apply a machine learning for the identification. Through evaluations using real traffic, we show that our method can achieve over 90% of identification to 9 commiunication devices.
- Published
- 2017
23. High-Speed Design of Conflictless Name Lookup and Efficient Selective Cache on CCN Router
- Author
-
Masayuki Murata, Kazunari Inoue, Atsushi Ooka, and Shingo Ata
- Subjects
Router ,Computer Networks and Communications ,Computer science ,business.industry ,Bloom filter ,Content-addressable memory ,Core router ,One-armed router ,Content centric networking ,Cache ,Electrical and Electronic Engineering ,Architecture ,business ,Software ,Computer network - Published
- 2015
24. SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet
- Author
-
Akira Wada, Shingo Ata, Xuan Liu, Chun-Jen Chung, Tianyi Xing, Deep Medhi, Yasuhiro Sato, Dijiang Huang, and Parikshit Juluri
- Subjects
Flow control (data) ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Testbed ,Scalability ,Network virtualization ,The Internet ,Provisioning ,business ,Virtual network ,Computer network - Abstract
A flexible, scalable, and robust framework that enables fine-grained flow control under fixed or dynamic policies while addressing trustworthiness as a built-in network level functionality is a desirable goal of the future Internet. Furthermore, the level of trustworthiness may possibly be different from one network to another. It is also desirable to provide user-centric or service-centric routing capabilities to achieve service-oriented traffic controls as well as trust and policy management for security. Addressing these aspects, we present the SeRViTR (Secure and Resilient Virtual Trust Routing) framework. In particular, we discuss the goal and scope of SeRViTR, its implementation details, and a testbed that enables us to demonstrate SeRViTR. We have designed protocols and mechanisms for policy and trust management for SeRViTR and show a validation on the functional implementation of several SeRViTR components to illustrate virtual domains and trust level changes between virtual domains that are achieved under SeRViTR protocols. Going from implementation to testbed, we demonstrate SeRViTR in a virtual network provisioning infrastructure called the Geo-distributed Programmable Layer-2 Networking Environment (G-PLaNE) that connects three institutions spanning the US and Japan.
- Published
- 2014
25. Analysis of Popularity Pattern of User Generated Contents and Its Application to Content-Aware Networking
- Author
-
Masayuki Murata, Shingo Ata, and Tatsuya Tanaka
- Subjects
Multimedia ,Computer science ,End user ,Control (management) ,User-generated content ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Popularity ,World Wide Web ,Identification (information) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Cluster analysis ,computer - Abstract
In recent years, social multimedia sharing services such as YouTube, which share User Generated Content (UGC) have become much attracted. An efficient control of UGC is one of important roles to achieve, e.g., an optimized placement of advertisements for end users, or content-aware caching control for improving the utilization of network resources. For this reason, it is effective to forecast the future popularity of the content as early as possible, so that we can take a proactive action to highly popular contents. In this paper, we propose a method to classify the popularity of UGCs in real time using K-means clustering, and analyze tendencies led by popularity patterns.We then propose a method to identify UGCs which are expected to be popular in future, by taking both the initial part of popularity patterns and actual counts of content retrieves into consideration. Our experimental results show that the accuracy of identification of popular UGCs can be increased around 10% by considering the initial part of popularity patterns.
- Published
- 2016
26. FOREWORD
- Author
-
Shingo Ata, Hiroaki Harai, Noriaki Kamiyama, Tomohiko Yagyu, Keisuke Ishibashi, Yuki Koizumi, Chikara Ohta, Fumio Teraoka, and Yuichi Ohsita
- Subjects
World Wide Web ,Information-centric networking ,Computer Networks and Communications ,Computer science ,Special section ,Electrical and Electronic Engineering ,Software - Published
- 2019
27. A study on micro level traffic prediction for energy-aware routers
- Author
-
Yasuto Kuroda, Shingo Ata, Yuji Yano, Ikuo Oka, Kazunari Inoue, Sou Koyano, and Hisashi Iwamoto
- Subjects
Router ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Volume (computing) ,Power (physics) ,Reduction (complexity) ,Hardware_INTEGRATEDCIRCUITS ,General Earth and Planetary Sciences ,Architecture ,business ,Electrical efficiency ,Energy (signal processing) ,General Environmental Science ,Computer network ,Power control - Abstract
For green networking, Sliced Router Architecture was proposed, which controls the power consumption of routers by adjusting the routers' performance on the basis of the volume of traffic. In this architecture, traffic prediction is used for appropriate power control of router. For obtaining the efficient gain of power reduction, we need to consider the impact of overestimation or underestimation. In this paper, we propose a traffic prediction method by considering the impact of overestimate and underestimate on power efficiency and processing performance of Sliced Router Architecture. We evaluate our method by trace-driven simulations with real traffic, we show that our approach can control the power consumption of Sliced Router without significant performance degradation.
- Published
- 2013
28. Integrated Management in the Age of Big Data, Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2015)
- Author
-
Badonnel, Rémi, Jin, Xiao, Shingo, Ata, Turck, Filip, voicu, groza, Raniery Paula dos Santos, Carlos, Management of dynamic networks and services (MADYNES), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Networks, Systems and Services (LORIA - NSS), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), IBM Thomas J. Watson Research Center, IBM, Osaka University [Osaka], Department of Information Technology(INTEC) - IBCN, Universiteit Gent = Ghent University [Belgium] (UGENT), University of Ottawa [Ottawa], Instituto de Informática da UFRGS (UFRGS), Universidade Federal do Rio Grande do Sul [Porto Alegre] (UFRGS), IFIP/IEEE, Remi Badonnel and Jin Xiao and Shingo Ata and Filip de Turck and Voicu Groza and Carlos dos Santos, Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), and Universiteit Gent = Ghent University (UGENT)
- Subjects
Big Data ,Integrated Network Management ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Network and Service Management ,Cloud Computing ,ComputingMilieux_MISCELLANEOUS ,Software-Defined Networking - Abstract
International audience
- Published
- 2015
29. Introducing delete feature for unnecessary data to content-hash based distributed archive system
- Author
-
Yutaka Yasuda, Ikuo Oka, and Shingo Ata
- Subjects
Computer science ,Feature (computer vision) ,Distributed data store ,Content (measure theory) ,Hash function ,Data mining ,computer.software_genre ,Data structure ,computer - Published
- 2013
30. Deterministic Packet Buffer System with Multi FIFO Queues for the Advanced QoS
- Author
-
Yasuto Kuroda, Koji Yamamoto, Shingo Ata, Yuji Yano, Hisashi Iwamoto, and Kazunari Inoue
- Subjects
Circular buffer ,Computer Networks and Communications ,Computer science ,Network packet ,Quality of service ,Distributed computing ,Electrical and Electronic Engineering ,Fifo queue ,Memory controller ,Software ,Buffer (optical fiber) - Published
- 2013
31. Error Performance Analysis of Modified Viterbi Decoding for Interferences
- Author
-
Shingo Ata, Yu Morishima, and Ikuo Oka
- Subjects
Viterbi decoder ,Computer science ,Media Technology ,Sequential decoding ,Electrical and Electronic Engineering ,Algorithm ,Soft output Viterbi algorithm ,Computer Science Applications - Published
- 2013
32. Resource Name-Based Routing in the Network Layer
- Author
-
Masayuki Murata, Shingo Ata, and Haesung Hwang
- Subjects
Routing protocol ,Static routing ,Dynamic Source Routing ,Computer Networks and Communications ,business.industry ,Computer science ,Strategy and Management ,Distributed computing ,Policy-based routing ,Enhanced Interior Gateway Routing Protocol ,Routing domain ,Link-state routing protocol ,Hardware and Architecture ,business ,Hierarchical routing ,Information Systems ,Computer network - Abstract
New network architectures and routing technologies are being proposed to reflect the changes in the current trend of Internet communication that are becoming more and more resource-centric; the demand for the hierarchically structured resource in the network is emphasized, not the location of the resource. Therefore, routing by the resource rather than routing by the conventional Internet protocol address is more suitable for the future Internet with some attractive advantages such as reducing the burden of resolving identifier to location and achieving higher scalability by using a provider-independent addressing structure. In this paper, we propose resource name-based routing within the routers in the network layer since te ardware architecture should also be able to support the paradigm shift from host-centric to resource-centric communication. Through evaluating the required network architecture and memory size in routers, we show the feasibility of resource name-based routing by using fully qualified domain names (FQDN) as an example of describing structured information. Using approximately 700 million existing FQDNs, the evaluation result shows that resource name-based routing is feasible even when considering the limitations of ternary content addressable memory size in routers.
- Published
- 2012
33. Retrieving information with autonomously-flying routers in information-centric network
- Author
-
Masayuki Murata, Shingo Ata, and Taku Kitagawa
- Subjects
Router ,Routing protocol ,Static routing ,business.industry ,Computer science ,Distributed computing ,05 social sciences ,Policy-based routing ,050801 communication & media studies ,Electronic mail ,0508 media and communications ,Routing domain ,0502 economics and business ,One-armed router ,050211 marketing ,Routing (electronic design automation) ,business ,Computer network - Abstract
Information-Centric Networking (ICN) enables retrieval of content with various controls using flexibility of a content name, which is treated as a routing information. In existing works, however, data processings on end nodes or routers are mainly considered. Therefore, controls of physical behaviors, especially actual movement of devices, are not considered so much. we consider to incorporate physical movement of routers into routing control in ICN, and we propose a novel architecture of ICN that makes it possible to retrieve unretrievable contents between physically disjoint networks, by only specifying its name, which is realized by a Content-Centric Networking (CCN) router mounting on an Unmanned Air Vehicle (UAV). Moreover, we design and develop a Flying Router (FR), which combines a CCN router and a UAV, and we propose a detail design of communication architecture in which multiple FRs are able to process routing cooperatively among disjoint networks. In addition, we examine feasibility of the proposed architecture by carrying out a basic experiment using a prototype of an FR.
- Published
- 2016
34. Energy-efficient high-speed search engine using a multi-dimensional TCAM architecture with parallel pipelined subdivided structure
- Author
-
Shingo Ata, Yasuto Kuroda, Ikuo Oka, Kenzo Okuda, Kazunari Inoue, Hisashi Iwamoto, Yuji Yano, and Masami Nawa
- Subjects
Scheme (programming language) ,Structure (mathematical logic) ,Computer science ,business.industry ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,Parallel computing ,Content-addressable memory ,Networking hardware ,Power (physics) ,Search engine ,Software ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,computer.programming_language ,Efficient energy use - Abstract
Packet classification has become increasingly complex and important to network equipment intended for future use. A recent trend to achieve complex packet classification is to use software-based methods, which tend to be slower than hardware-based methods. For search, this typically means using ternary content-addressable memory (TCAM) to make classification feasible. However, TCAM is not well-suited to the long (in bits) and sparse rules used for running advanced applications that require complicated classification. We propose a multi-dimension search engine (MDSE) that is optimized for use with long, sparse rules, and we propose a multi-dimensional TCAM scheme, which is an MDSE constructed to operate on TCAM. Through fine-grained simulations with real traffic, we show that our proposed search engine can reduce the power consumed by network equipment by about 85%.
- Published
- 2016
35. FPS-RAM: Fast Prefix Search RAM-Based Hardware for Forwarding Engine
- Author
-
Yasuto Kuroda, Shingo Ata, Kazuya Zaitsu, Ikuo Oka, Kazunari Inoue, and Koji Yamamoto
- Subjects
Prefix ,Computer Networks and Communications ,business.industry ,Power consumption ,Computer science ,Embedded system ,Circuit design ,Ip router ,Electrical and Electronic Engineering ,business ,Software ,Computer hardware - Published
- 2012
36. Basis Vector Estimation Analysis for Identification of Block Orthogonal Modulations
- Author
-
Takafumi Kinugasa, Shingo Ata, and Ikuo Oka
- Subjects
Combinatorics ,Identification (information) ,Symbol error probability ,Computer Networks and Communications ,Computer science ,Electrical and Electronic Engineering ,Algorithm ,Software ,Space vector modulation ,Block (data storage) - Published
- 2012
37. Abstract model of SDN architectures enabling comprehensive performance comparisons
- Author
-
Shingo Ata, Ikuo Oka, Yasuhiro Sato, and Tatsuya Sato
- Subjects
Optimal design ,Network architecture ,Computer science ,Control system ,Distributed computing ,Scalability ,Computer Science::Networking and Internet Architecture ,Forwarding plane ,Process control ,Software-defined networking ,Data modeling - Abstract
Software-defined Networking (SDN) is a new network architecture that decouples the control plane from the data plane. Scalability of the control plane with respect to network size and update frequency is an important problem that has been addressed by previous studies from a variety of viewpoints. However, the solutions found in these studies may be only locally optimized solutions. To find a globally optimized solution, a broader viewpoint is required: one in which various SDN architectures can be evaluated and compared. In this paper, we propose an abstract model of SDN architectures, which enables multiple SDN architectures to be compared under a unified evaluation condition, and discuss the modeling of SDN architecture and its variations to find the optimal design from a global viewpoint. We first propose a generic model of SDN architectures and derive variations in terms of composition unit (single or multiple), processing principle (sequential or parallel), or location (intra- or inter-node). We then show that existing SDN architectures can be represented as one of the variations of our abstract model with fitted parameters. Finally we discuss how variation of components affects performance and show, using message-driven simulations, that our model enables comprehensive performance comparisons of different SDN designs represented as parameterized models.
- Published
- 2015
38. Estimating Environment-Independent Parameters on Basis of Comparative Assessment of User's Subjectivity
- Author
-
Ikuo Oka, Shin'ichiro Kitano, Yasuhiro Sato, and Shingo Ata
- Subjects
Service quality ,Service (systems architecture) ,Computer Networks and Communications ,Computer science ,Download ,Quality of service ,media_common.quotation_subject ,User satisfaction ,computer.software_genre ,Upload ,Quality (business) ,Data mining ,Electrical and Electronic Engineering ,Throughput (business) ,computer ,Software ,Simulation ,media_common - Abstract
We analyze subjective assessments by comparative evaluations of bulk data transmission by using two psychological methods (the method of successive categories and the constant method). From the results of the first experiment, the thresholds at which participants downloading a data file began to feel dissatisfaction with service degradation are 15.7Mbps and 11.6Mbps obtained by the two different methods when the throughput without the service degradation is approximately 22Mbps. In the second experiment, we investigate the threshold of user satisfaction for various network environments. The threshold is 63% of the throughput of the user's usual network environment. Moreover, from the viewpoint of download time, users feel dissatisfaction with the quality when download time becomes 1.5 times longer. These values can be used to more effectively allocate network resources and thereby achieve higher service quality.
- Published
- 2011
39. A New TCAM Architecture for Managing ACL in Routers
- Author
-
Koji Yamamoto, Masayuki Murata, Haesung Hwang, Kazunari Inoue, and Shingo Ata
- Subjects
Hardware_MEMORYSTRUCTURES ,Matching (graph theory) ,Computer Networks and Communications ,Computer science ,business.industry ,Routing table ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Packet forwarding ,Electrical and Electronic Engineering ,Content-addressable memory ,business ,Software ,Computer network - Abstract
SUMMARY Ternary Content Addressable Memory (TCAM) is a special type of memory used in routers to achieve high-speed packet forwarding and classification. Packet forwarding is done by referring to the rules written in the routing table, whereas packet classification is performed by referring to the rules in the Access Control List (ACL). TCAM uses more transistors than Random Access Memory (RAM), resulting in high power consumption and high production cost. Therefore, it is necessary to reduce the entries written in the TCAM to reduce the transistor count. In this paper, we propose a new TCAM architecture by using Range Matching Devices (RMD) integrated within the TCAM’s control logic with an optimized prefix expansion algorithm. The proposed method reduces the number of entries required to express ACL rules, especially when specifying port ranges. With less than 10 RMDs, the total number of lines required to write port ranges in the TCAM can be reduced to approximately 50%.
- Published
- 2010
40. A Strategic Approach for Re-organizing the Internet Topology by Applying Social Behavior Dynamics
- Author
-
Yasuhiro Sato, Ikuo Oka, and Shingo Ata
- Subjects
Dynamic network analysis ,Computer Networks and Communications ,business.industry ,Computer science ,Strategy and Management ,Distributed computing ,Scale-free network ,Internet traffic engineering ,Degree distribution ,Topology ,Network topology ,Network simulation ,Hardware and Architecture ,The Internet ,Hierarchical network model ,business ,Information Systems ,Computer network - Abstract
Recent studies have described the topologies of various networks including the Internet are categorized as scale-free networks. Scale-free network is extremely vulnerable to node attacks. However, the suitability of the topology of the Internet for communications has not been studied. We investigate whether the current Internet is optimized in both aspects of communication efficiency and attack tolerance. For this, we define three metrics to represent the capabilities of the network, which are Clustering coefficient, Efficiency, and Reachability. As a result, we found that the value of ?, a scaling exponent in power law function representing the degree distribution of a scale-free network, may be reduced in the present Internet. To reduce the value of ?, we propose four strategies for re-organizing a network. However, in real network, we cannot control the user's preference directly. We use a diffusion model based on social behavior dynamics. Furthermore, we show the characteristics of the re-organized networks, and discuss which strategy is more appropriate for achieving a desired network.
- Published
- 2009
41. Challenges for Next Generation Network Operations and Service Management: a Report on APNOMS 2008
- Author
-
Shingo Ata, Luoming Meng, Deokjai Choi, Yan Ma, Hiroshi Uno, James Won-Ki Hong, and Young-Tak Kim
- Subjects
Computer Networks and Communications ,Computer science ,Strategy and Management ,Service management ,Computer security ,computer.software_genre ,Engineering management ,Beijing ,Hardware and Architecture ,Next-generation network ,Element management system ,Computer communication networks ,computer ,Information Systems - Abstract
This article presents a report on APNOMS 2008, which was held October 22---24, 2008 in Beijing, China. The theme of APNOMS 2008 was "Challenges for Next Generation Network Operations and Service Management."
- Published
- 2009
42. Inferring Network Impact Factors: Appying Mixed Distribution to Measured RTTs
- Author
-
Chikato Fujiwara, Ikuo Oka, Yasuhiro Sato, and Shingo Ata
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network delay ,Real-time computing ,Round-trip delay time ,Network simulation ,Packet switching ,Metric (mathematics) ,Decomposition (computer science) ,The Internet ,Electrical and Electronic Engineering ,Transmission time ,business ,Software - Abstract
The end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. From the viewpoint of network operators, RTT may also become one of the important metrics to understand the network conditions. Given this background, we should know how a factor such as a network incident influences RTTs. It is obvious that two or more factors may interfere in the observed delay characteristics, because packet transmission delays in the Internet are strongly dependent on the time-variant condition of the network. In this paper, we propose a modeling method by using mixed distribution which enables us to express delay characteristic more accurately where two or more factors exist together. And, we also propose an inferring method of network behavior by decomposition of the mixed distribution based on modeling results. Furthermore, in experiments we investigate the influence caused by each network impact factor independently. Our proposed method can presume the events that occur in a network from the measurements of RTTs by using the decomposition of the mixed distribution.
- Published
- 2009
43. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks
- Author
-
Masayuki Murata, Shingo Ata, and Yuichi Ohsita
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,Transmission Control Protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Overlay network ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Denial-of-service attack ,Computer security ,computer.software_genre ,Proxy server ,Out-of-order delivery ,Software deployment ,Server ,Scalability ,The Internet ,Electrical and Electronic Engineering ,SYN flood ,business ,computer ,Software ,Block (data storage) ,Computer network - Abstract
Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i.e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.
- Published
- 2008
44. Managing Next Generation Networks and Services: A Report on APNOMS 2007
- Author
-
Shingo Ata, Hiroshi Kuriyama, G. S. Kuo, Choong Seon Hong, and Kyung-Hyu Lee
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Computer science ,business.industry ,Strategy and Management ,Next-generation network ,Telecommunications ,business ,Computer security ,computer.software_genre ,Computer communication networks ,computer ,Information Systems - Abstract
This article presents a report on APNOMS 2007, which was held October 10---12, 2007 in Sapporo, Japan. The theme of APNOMS 2007 was "Managing the Next Generation Networks and Services."
- Published
- 2007
45. Identification of Attack Nodes from Traffic Matrix Estimation
- Author
-
Shingo Ata, Yuichi Ohsita, and Masayuki Murata
- Subjects
Router ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Denial-of-service attack ,Identification (information) ,Network management ,Server ,Enhanced Data Rates for GSM Evolution ,Electrical and Electronic Engineering ,business ,Communications protocol ,Software ,Block (data storage) ,Computer network - Abstract
Distributed denial-of-service attacks on public servers have recently become more serious. The most effective way to prevent this type of traffic is to identify the attack nodes and detach (or block) attack nodes at their egress routers. However, existing traceback mechanisms are currently not widely used for several reasons, such as the necessity of replacement of many routers to support traceback capability, or difficulties in distinguishing between attacks and legitimate traffic. In this paper, we propose a new scheme that enables a traceback from a victim to the attack nodes. More specifically, we identify the egress routers that attack nodes are connecting to by estimating the traffic matrix between arbitral source-destination edge pairs. By monitoring the traffic variations obtained by the traffic matrix, we identify the edge routers that are forwarding the attack traffic, which have a sharp traffic increase to the victim. We also evaluate the effectiveness of our proposed scheme through simulation, and show that our method can identify attack sources accurately.
- Published
- 2007
46. Effective Bit Selection Methods for Improving Performance of Packet Classifications on IP Routers
- Author
-
Ikuo Oka, Chikato Fujiwara, Gang Qin, and Shingo Ata
- Subjects
Routing protocol ,Router ,Computer Networks and Communications ,Computer science ,Network packet ,business.industry ,Radix tree ,Routing table ,Quality of service ,Hash function ,Internet traffic ,Internet traffic engineering ,Source routing ,Content-addressable memory ,Packet switching ,Computer engineering ,The Internet ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,business ,Processing delay ,Software ,Computer network - Abstract
In recent years, high-performance routers are needed as well as increasing the link capacity to keep up with the Internet traffic explosion. Routers are preferable to store statistics of the incoming/outgoing traffic to realize the intelligent or policy-based services in the Internet. In this paper, we propose a new packet classification solution, which uses the combination of CAM and DRAM memories. Unlike other algorithms, we do not search the classifier by selecting the front bits, but select bits arbitrary from the classifier as the search key in the CAM. For this purpose, we propose new bit selection methods. Through simulation results, we show that our bit selection methods can decrease the delay of classification.
- Published
- 2007
47. Automatic selection of Web services based on attributes and ratings
- Author
-
Shingo Ata, Hisae Matsunaga, Ikuo Oka, and Chikato Fujiwara
- Subjects
Service (systems architecture) ,Database ,Computer Networks and Communications ,Mechanism (biology) ,Computer science ,Variation (game tree) ,computer.software_genre ,Set (abstract data type) ,Order (business) ,Electrical and Electronic Engineering ,Web service ,Communications protocol ,computer ,Selection (genetic algorithm) - Abstract
Web services are a unified framework that enables the exchange of information among distributed applications using existing World Wide Web communications technologies. Web services offer the benefit of simplifying the sharing of information among different applications that are operated via remote terminals. However, when multiple services exist that provide the same functionality, a mechanism for automatically selecting the most appropriate service from those on offer is necessary. Unfortunately, the majority of automatic selection mechanisms are designed to use a fixed set of indicators as the selection criteria and are therefore unable to adapt to the diverse demands of users. In this paper we propose a new mechanism for automatically performing such service selection that integrates a wide range of different indicators. Specifically, we assign attributes to each of the services that can be used as evaluation criteria; we then gather these attributes at the user's client. We can compute a rating for each service on the basis of the attributes that have been collected and select the service that is assigned the highest rating. In this paper we introduce the concept of an attribute database (an attribute repository) and define a new communications protocol to enable the registration and searching of attributes in order to deal with variation in the attributes used by different services. In addition, using a simulation of a distributed applications environment, we perform evaluations and demonstrate that the proposed selection mechanism is able to reduce execution times as compared to a random selection mechanism. We also implement the proposed mechanism in an experimental environment and show that it can be used in practice for automatically selecting services on the basis of attribute values. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 90(8): 40–49, 2007; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.20284 Copyright © 2004 Wiley Periodicals, Inc.Copyright © 2007 Wiley Periodicals, Inc.
- Published
- 2007
48. Error probability analysis for data fusion of end-nodes in tree networks
- Author
-
Longfei Zhou, Ikuo Oka, and Shingo Ata
- Subjects
Tree (data structure) ,Signal-to-noise ratio ,Computer science ,Statistics ,Path (graph theory) ,Random tree ,Sensor fusion ,Constant (mathematics) ,Algorithm ,Binary symmetric channel ,Fusion center - Abstract
In the preceding works on the tree networks composed of binary symmetric channel (BSC), the path diversity effects are discussed in [8]–[10]. In [9], it is shown that the error probability of majority decision at the fusion center is almost constant regardless of network size. This constant property of error probability has not been discussed theoretically. In this paper, a new approach of signal-to-noise ratio (SNR) is proposed for the theoretical explanation on the constant property. A random tree network is presented to model a network with a large number of nodes randomly deployed over a field. The error probability of random tree network is analyzed for data fusion of end-nodes by SNR, which is shown to be useful to explain the constant property. Based on the analytical expressions, the effects of system parameters on error probability of random tree network are demonstrated.
- Published
- 2015
49. Maximum likelihood estimation for SNR of PSK and QAM
- Author
-
Ikuo Oka, Shingo Ata, and Shinji Nishijima
- Subjects
QAM ,Signal-to-noise ratio (imaging) ,Estimation theory ,Statistics ,Probability density function ,Maximum likelihood sequence estimation ,Amplitude and phase-shift keying ,Quadrature amplitude modulation ,Computer Science::Information Theory ,Phase-shift keying ,Mathematics - Abstract
Signal-to-noise ratio (SNR) is an important parameter of channel quality. The performance of adaptive communications in time-varying channels is affected significantly by the SNR estimation accuracy. In this paper, the new methods of SNR estimation for PSK and QAM are proposed. The methods are based on maximum likelihood estimation (MLE) using the probability density function (pdf) of received signal envelope, and are used in unknown signal power conditions without the carrier synchronization. The proposed methods are shown to estimate SNR efficiently by numerical results of normalized mean square error (NMSE) of SNR.
- Published
- 2015
50. Enhancing immediacy of identification with multi-stage application identification
- Author
-
Ikuo Oka, Yoshihiro Nakahira, Shingo Ata, Yuichi Kumano, and Nobuyuki Nakamura
- Subjects
business.industry ,Computer science ,Network packet ,Cryptography ,Encryption ,computer.software_genre ,Network management ,Statistical classification ,Immediacy ,Granularity ,Data mining ,business ,Classifier (UML) ,computer - Abstract
The identification of network application is important for network management such as traffic controls and anomaly traffic detection. To apply application-based traffic control promptly, the technique to progressive application identification is important. We previously proposed a method of timeliness identification of application, which can achieve to use first several packets of flow to identify applications with high accuracy whatever the traffic is encrypted or unencrypted. However, our previous method still has a challenge in terms of timeliness because it uses a single classifier with same traffic features to identify all applications, though some traffic features can be used earlier. In this paper, we propose a method of multistage application identification, which classifies progressively applications into groups with different granularity of groups. We first demonstrate that the accuracy of existing application identification is getting worse significantly, by increasing the number of application to identify. Second, propose a method of multistage identification method, and then explain group classification algorithm to classify applications into groups. Our experiment shows that our proposed method can identify applications earlier than a method of identification using a single classifier.
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.