Mitsuhiro Hatada
YOU?
Author Swipe
View article: An evaluation design for comparing netflow based network anomaly detection systems using synthetic malicious traffic
An evaluation design for comparing netflow based network anomaly detection systems using synthetic malicious traffic Open
In this paper, we present a procedure to evaluate and compare multiple netflow based network anomaly detection (NF-NAD) systems based on accuracy of detection and mean time of detection. Conventionally, different variations of benign or no…
View article: An Empirical Study on Flow-based Botnet Attacks Prediction
An Empirical Study on Flow-based Botnet Attacks Prediction Open
In the era of the Internet of Things, botnet threats are rising, which has prompted many studies on botnet detection and measurement.In contrast, this study aims to predict botnet attacks, such as massive spam emails and distributed denial…
View article: CLAP: Classification of Android PUAs by Similarity of DNS Queries
CLAP: Classification of Android PUAs by Similarity of DNS Queries Open
This work develops a system called CLAP that detects and classifies “potentially unwanted applications” (PUAs) such as adware or remote monitoring tools. Our approach leverages DNS queries made by apps. Using a large sample of Android apps…
View article: Detecting Malware-Infected Devices Using the HTTP Header Patterns
Detecting Malware-Infected Devices Using the HTTP Header Patterns Open
Damage caused by malware has become a serious problem. The recent rise in the spread of evasive malware has made it difficult to detect it at the pre-infection timing. Malware detection at post-infection timing is a promising approach that…
View article: Finding New Varieties of Malware with the Classification of Network Behavior
Finding New Varieties of Malware with the Classification of Network Behavior Open
An enormous number of malware samples pose a major threat to our networked society. Antivirus software and intrusion detection systems are widely implemented on the hosts and networks as fundamental countermeasures. However, they may fail …
View article: Automating URL Blacklist Generation with Similarity Search Approach
Automating URL Blacklist Generation with Similarity Search Approach Open
Modern web users may encounter a browser security threat called drive-by-download attacks when surfing on the Internet. Drive-by-download attacks make use of exploit codes to take control of user's web browser. Many web users do not take s…
View article: Security Intelligence for Malware Countermeasures to Support NTT Group’s Security Business
Security Intelligence for Malware Countermeasures to Support NTT Group’s Security Business Open
Cyber-attacks caused by malware (malicious software) are becoming a serious social problem in many parts of the world.In this article, we introduce the security intelligence technology behind our Wide-Angle global integrated security servi…
View article: Evaluating Header Information Features for Malware Infection Detection
Evaluating Header Information Features for Malware Infection Detection Open
We analyzed traffic data after a malware infection and clarified which features would be the most effective in the detection of infection. The focus is on the use of traffic data to detect infections and on the use of features that do not …
View article: Empowering Anti-malware Research in Japan by Sharing the MWS Datasets
Empowering Anti-malware Research in Japan by Sharing the MWS Datasets Open
Substantial research has been conducted to develop proactive and reactive countermeasures against malware threats. Gathering and analyzing data are widely accepted approaches for accelerating the research towards understanding malware thre…