著者
Xuping Huang Shunsuke Mochizuki Akira Fujita Katsunari Yoshioka
出版者
情報処理学会
雑誌
情報処理学会論文誌 (ISSN:18827764)
巻号頁・発行日
vol.64, no.3, 2023-03-15

In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.31(2023) (online)DOI http://dx.doi.org/10.2197/ipsjjip.31.165------------------------------
著者
Hiroto MAEDA Kazuyuki SOGAWA Kazuko SAKAGUCHI Saori ABE Wataru SAGIZAKA Shunsuke MOCHIZUKI Waka HORIE Toshifumi WATANABE Yui SHIBATA Mamoru SATOH Akihiro SANDA Fumio NOMURA Jun SUZUKI
出版者
公益社団法人 日本獣医学会
雑誌
Journal of Veterinary Medical Science (ISSN:09167250)
巻号頁・発行日
pp.14-0427, (Released:2015-03-28)
被引用文献数
2 20

Feline renal diseases are increasingly noted in veterinary practice. It is important to diagnose and identify the pathological basis of renal dysfunction accurately at an early stage, but there are only a few reports on this area in clinical veterinary medicine. We investigated the efficacy of measurement of urinary albumin (u-Alb) and urinary transferrin (u-Tf) for early diagnosis using 5-µl urine samples collected noninvasively by catheterization from normal (IRIS stage I) cats and cats with stage I chronic kidney disease (CKD). The u-Alb levels in normal and stage I CKD cats were 6.0 ± 4.5 and 11.2 ± 8.4 mg/dl, respectively, and the u-Tf levels were 0.09 ± 0.42 and 0.52 ± 0.79 mg/dl, respectively. Based on ROC curve analysis, the sensitivity and specificity of u-Alb and u-Tf were higher than those of the currently used biomarker, the plasma creatinine level. The sensitivity of u-Alb was higher than that of u-Tf, whereas the specificity of u-Tf was higher than that of u-Alb. The validity of the threshold albumin level (20 mg/dl) was confirmed by measurements using SDS-PAGE. Since leakage of u-Tf in urine precedes leakage of u-Alb, inclusion of u-Tf in biochemistry tests may be appropriate for IRIS staging as a diagnostic marker of early diagnosis of renal disorder in cats.
著者
Xuping Huang Shunsuke Mochizuki Akira Fujita Katsunari Yoshioka
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.31, pp.165-173, 2023 (Released:2023-03-15)
参考文献数
25
被引用文献数
1

In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack.
著者
Xuping Huang Shunsuke Mochizuki Katsunari Yoshioka
出版者
情報処理学会
雑誌
情報処理学会論文誌 (ISSN:18827764)
巻号頁・発行日
vol.63, no.12, 2022-12-15

IoT malware Mirai and its variants continue to evolve and their activities consume network resources, particularly radio resources. This paper proposes a method to identify connection types and estimate the wireless uplink speed of malware-infected hosts observed by IoT honeypot by using the Connection Type Database of Maxmind's GeoIP2, a well-known industrial resource for IP address related information, and Network Diagnosis Tool (NDT) database, a measurement data set of the uplink speed of various networks. The proposed Mobile Network Identification method divides IP addresses into IP ranges assigned to each Autonomous System (AS), and then employs the NDT database based on the IP ranges. We analyzed the infected hosts observed by IoT honeypot to assess and validate the precision of the proposed technique. Our method estimates the maximum average uplink speed of the infected cellular host to be 40.6Mbps, which is between two reference measurement results of cellar networks, indicating the adequacy of the proposed method.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.30(2022) (online)DOI http://dx.doi.org/10.2197/ipsjjip.30.859------------------------------