著者
Hiroaki Kikuchi Makoto Aoyagi Kiyotaka Nagahama Yu Yajima Chisato Yamamura Yohei Arai Suguru Hirasawa Shota Aki Naoto Inaba Hiroyuki Tanaka Teiichi Tamura
出版者
一般社団法人 日本内科学会
雑誌
Internal Medicine (ISSN:09182918)
巻号頁・発行日
vol.53, no.11, pp.1131-1135, 2014 (Released:2014-06-01)
参考文献数
14
被引用文献数
3 11

A 76-year-old woman with a history of lumbar fracture and marked proteinuria, bilateral pitting edema, malaise and pruritus was referred for an evaluation of an impaired renal function. A renal biopsy led to a tentative diagnosis of acute interstitial nephritis (AIN) with minimal change disease caused by nonsteroidal anti-inflammatory drugs (NSAIDs). Following the discontinuation of oral NSAIDs, the patient's symptoms disappeared spontaneously. However, nephrotic-range proteinuria relapsed one month after discharge, following loxoprofen patch use. The withdrawal of the topical loxoprofen patches once again resulted in the disappearance of all symptoms. This is the first case report of nephrotic-range proteinuria and AIN secondary to topical NSAID patch use.
著者
Nur Rohman ROSYID Masayuki OHRUI Hiroaki KIKUCHI Pitikhate SOORAKSA Masato TERADA
出版者
The Institute of Electronics, Information and Communication Engineers
雑誌
IEICE TRANSACTIONS on Information and Systems (ISSN:09168532)
巻号頁・発行日
vol.E94-D, no.11, pp.2139-2149, 2011-11-01

Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to discover new frequent sequential attack patterns in malware automatically. One problem is the difficulty in identifying particular patterns from full yearlong logs because the dataset is too large for individual investigations. This paper proposes the use of a data-mining algorithm to overcome this problem. We implement the PrefixSpan algorithm to analyze malware-attack logs and then show some experimental results. Analysis of these results indicates that botnet attacks can be characterized either by the download times or by the source addresses of the bots. Finally, we use entropy analysis to reveal how frequent sequential patterns are involved in coordinated attacks.