KOBAYASHI, Takashi |
---|
Faculty, Department/Institute
- Faculty of Informatics Department of Informatics
Academic status (qualification)
- Associate Professor Apr. 1,2007
Undergraduate Degrees・University
- Kansai University Faculty of Engineering1992 Graduated
Graduate Degrees・University
- Kansai University Master's Degree Program 1994 Completed
- Nara Institute of Science and Technology Doctor's Degree Program Information Processing 2015 ABD- Coursework completed
Academic Degrees
- Master of Engineering Mar. 1994 Kansai University
Homepage Address, E-mail Address
- Homepage Address:http://www.res.kutc.kansai-u.ac.jp/~kobayasi/
- E-mail Address:taka-k@kansai-u.ac.jp
Research fields
Research fields | keyword |
---|---|
Information and communication engineering | |
Intelligent informatics | |
Study of information system (including Library and information science) |
Research topics
research topic | Study of Intrusion Detection System based on approach of Artifficial Intelligence |
---|---|
Study theme state | Joint research within Japan |
research duration | |
Research Programs | |
keyword | Intrusion Detection,Artifficial Intelligence,Autonomous Agent, |
Research field | |
Research Topics Overview |
research topic | Study of Implementation of Campus Amenities using the Internet |
---|---|
Study theme state | Joint Research within Institution |
research duration | |
Research Programs | |
keyword | Cyber Campus,Internet, |
Research field | |
Research Topics Overview |
research topic | The estimation of blog spam using knowledge information technology |
---|---|
Study theme state | Joint research within Japan |
research duration | |
Research Programs | |
keyword | spam,blog,email,estimation,soft-computing, |
Research field | |
Research Topics Overview |
research topic | A study of the distributed filesystems using P2P technologies |
---|---|
Study theme state | Joint research within Japan |
research duration | |
Research Programs | Joint Research |
keyword | Peer-to-Peer,distributed filesystems,, |
Research field | |
Research Topics Overview |
Research Activities
- I study decision support system, optimization, and computer&network security based on knowledge information processing.
Research Career
- Assistant, Kansai University (Faculty of Informatics) 1994/4/1~1997年/3/31
- Lecturer, Kansai University (Faculty of Informatics) 1997/4/1~2004年/3/31
Academic Associations
所属学会・団体名 | 役職名 (役職在任期間) |
---|---|
Institute of Electoronics, Information and Communication Engineering | |
Information Processing Society of Japan | |
Institute of Electorical and Electronics Engineers |
Joint Projects/Commissioned Projects
2002 - 2003 Joint Research on campus- A study of the distributed filesystems using P2P technologies
2010 Domestic Joint Research
2015 - 2016 Joint Research on campus
2018 - 2021 Domestic Joint Research
Research Publications
No. | Type of publication | Date of publication (Date of presentation) | Title | Type of research result | Jointly authored or single authored | Publisher and journal name | Volume number |
---|---|---|---|---|---|---|---|
1 | Papers1 | 2022/3~2022,03,00,,, | DOM-Based XSS Prevention Support System for Developers Using Abstract Syntax Tree Analysis | Academic Journal | Co-author | IEICE Technical Report | vol. 121, no. 410, ICSS2021-72, pp. 78-86, |
2 | Papers1 | 2021/5/14~2021,05,14,,, | The building and operation of SSH server for collecting password authentication information and the attack detection method using the system | Academic Journal | Co-author | IPSJ SIG Technical Report | Vol.2021-IOT-53 No.16 |
3 | Papers1 | 2018/9/20~2018,09,20,,, | A Proposal of the backup system with Cloud Storage System for ransomware countermeasure | Academic Journal | Co-author | Proceedings of 17th Forum on Information Technology | L-016 |
4 | Papers1 | 2018/9/20~2018,09,20,,, | The development of Drive-by Download attack prevention system using Proxy and ICAP | Academic Journal | Co-author | Proceedings of 17th Forum on Information Technology | L-021 |
5 | Papers1 | 2018/9/20~2018,09,20,,, | A proposal of the detecting method of IoT bot based on analysis of process structure | Academic Journal | Co-author | Proceedings of 17th Forum on Information Technology | L-023 |
6 | Papers1 | 2018/5/17~2018/5/182018,05,17,2018,05,18 | Analysis of SSH attack tendency based on Darknet analysis | Academic Journal | Co-author | IPSJ SIG Technical Report | Vol. 2018-IOT-41, No.17 |
7 | Papers1 | 2017/10/23~2017/10/252017,10,23,2017,10,25 | Proposal to support analysis of Drive-by Download attack by highlighting malicious URL | Academic Journal | Co-author | Proceedings of Computer Security Symposium 2017 | 2B4-2 |
8 | Papers1 | 2017/7/20~2017,07,20,,, | Artificial Metrics of Electric Devices and Their Applications | In-house publication | Co-author | Vol. 46, pp.1-22 | |
9 | Papers1 | 2016/10/4~2016/10/42016,10,04,2016,10,04 | Development and Evaluation of Analytical Support Application for Drive-by Download Attacks | Academic Journal | Co-author | Computer Security Symposium 2016 | Vol.2016, No.2, pp.819 - 825 |
10 | Papers1 | 2016/9~2016/92016,09,00,2016,09,00 | Development of Personal Authentication Application Using the Motion Sensor of a Smartphone | Academic Journal | Co-author | L-020 | |
11 | Research report21 | 2015/10/21~2015/10/232015,10,21,2015,10,23 | Drive-by Download攻撃解析における支援アプリケーションの開発 | Other | Co-author | DPS-07 | |
12 | Papers1 | 2015/10/21~2015/10/232015,10,21,2015,10,23 | An approach for controling IRCbot's activity using IPS | Academic Journal | Co-author | Proceedings of Computer Security Symposium 2015 | 3E4-3 |
13 | Papers1 | 2015/9/25~2015/9/262015,09,25,2015,09,26 | Analysis of SSH Access on Kansai University | Academic Journal | Co-author | IPSJ SIG Technical Report | Vol.2015-IOT-31, No.8 |
14 | Research report21 | 2014/10/22~2014/10/242014,10,22,2014,10,24 | Drive-by Download攻撃を防御するProxyの実装 | Other | Co-author | DPS-04 | |
15 | Papers1 | 2012/6/12~2012/6/152012,06,12,2012,06,15 | The implementation and its evaluation of the filesystem using P2P technology | Academic Journal | Co-author | Proceedings of the 26th Annual Conference of JSAI, 2012 | 1A3-OS-17b-3 |
16 | Papers1 | 2012/3/8~2012,03,08,,, | Proposal and Implementation of remote support live migration | Monograph | Co-author | IEICE Technical Report | Vol.111, No.468, pp.129-132 (NS2011-202) |
17 | Papers1 | 2011/10/21~2011,10,21,,, | Keystroke Authentication Using the Neural Network | Academic Journal | Co-author | IEICE Technical Report | IN2011-87, pp.49-52 |
18 | Papers1 | 2011/10/21~2011,10,21,,, | On the automatic adjustment of the rewall's rules | Academic Journal | Co-author | IEICE Technical Report | IN2011-88, pp.53-56 |
19 | Papers1 | 2011/10/14~2011,10,14,,, | Implementation of the distributed file system using P2P technology | Academic Journal | Co-author | IEICE Technical Report | NS2011-100, pp.99-104 |
20 | Papers1 | 2011/10/14~2011,10,14,,, | Research on the load-balancing System for a contents-based flexible configuration | Academic Journal | Co-author | IEICE Technical Report | NS2011-101, pp.105-108 |
21 | Papers1 | 2011/5/23~2011/5/262011,05,23,2011,05,26 | Toward Time-Sensitive Structure Analysis for SPAM Filtering: A Data Mining Approach | Other | Co-author | ||
22 | Papers1 | 2010/9~2010,09,,,, | A proposal of structure analysis method for spam filtering | Academic Journal | Co-author | pp.587-592 | |
23 | Textbook23 | 2009/4/1~2009,04,01,,, | C PROGRAMMING(1999-2009) | Monograph | Co-author | KANSAI UNIVERSITY PRESS | |
24 | Papers1 | 2009/3/8~2009,03,08,,, | Implementation of load balancing for Hybrid Node In Mobile IPv6 | Co-author | |||
25 | Papers1 | 2009/3~2009,03,,,, | Optimal Location of Wireless LAN Access Points Using Fuzzy ID3 | Academic Journal | Co-author | Journal of Advanced Computational Intelligence and Intelligent Informatics | Vol.13, No.2, pp.128-134 |
26 | Papers1 | 2008/7/17~2008/7/182008,07,17,2008,07,18 | Optimization for Overly Network over IPv6 | Academic Journal | Co-author | IEICE Technical Report | Vol. 108, No. 136, pp.13-16 |
27 | Papers1 | 2008/7/17~2008/7/182008,07,17,2008,07,18 | An Evaluation of Hybrid node of Mobile IPv6 | Academic Journal | Co-author | IEICE Technical Report | Vol. 108, No. 136, pp.77-82 |
28 | Papers1 | 2007/9~2007,09,,,, | Encrypted Multicast Transport in JXTA | Academic Journal | Co-author | L-029, pp.67-68 | |
29 | Papers1 | 2007/9~2007,09,,,, | multihoming using anycast address | Other | Co-author | M-058, pp.271-272 | |
30 | Papers1 | 2007/6~2007,06,,,, | Prototyping and Evaluation of P2P Grid Platform with Resource Management Mechanism | Academic Journal | Co-author | DBJS Letters | Vol. 6, No.1 |
31 | Discussion Paper99 | 2006/9~2006,09,,,, | On the Building Methods of e-Local Government and Grid Computing | Monograph | Single-Author | RCSS Discussion Paper Series | No. 45 |
32 | Keynote address20 | 2006/1/14~2006,01,14,,, | Port Violation and Intrusion Detection System | Other | |||
33 | Papers1 | 2005/9/7~2005,09,07,,, | Voronoi Diagram Algorithm on the Grid Environment | Monograph | Co-author | A-023, pp.55-56 | |
34 | Papers1 | 2004/10~2004,10,,,, | Laboratory Syllabi of Computer Security for an IT moral Education | In-house publication | Co-author | No. 21, pp.59-77 | |
35 | Papers1 | 2004/3/1~2004,03,01,,, | A Self-Confirmation Engine for Preventing Man-in-the-Middle Attack | Academic Journal | Co-author | IEICE Transactions on Communications | Vol.E87-B No.3 pp.490-496 |
36 | Papers1 | 2003/9~2003,09,,,, | The Implementation of Intrusion Detection System Focused on Port Violation | Academic Journal | Co-author | Proceedings of The Third International Symposium on Communications and Information Technologies | Vol. 1, pp.79-83 |
37 | Papers1 | 2003/9~2003,09,,,, | A Forensic Analysis with Records of Address Mapping | Academic Journal | Co-author | Proceedings of The Third International Symposium on Communications and Information Technologies | Vol. 1, pp.59-64 |
38 | Papers1 | 2003/8~2003,08,,,, | The Implementation of Instrusion Detection System focused on Port Violation | In-house publication | Single-Author | No.19, pp.43-57 | |
39 | Papers1 | 2003/8~2003,08,,,, | Infrastructure for Computer Moral Education in a University | In-house publication | Co-author | ||
40 | Papers1 | 2003/1~2003,01,,,, | A Proposed Method of Avoiding Address Mapping Violation | Monograph | Co-author | 1st International Forum on Internet and Computer Technology | pp.88-93 |
41 | Papers1 | 2002/12/20~2002,12,20,,, | Management policy and technique to achieve safely and authorized IP connectivity | In-house publication | Single-Author | Vol.18, pp.11-23 | |
42 | Textbook23 | 1998/4/1~1998,04,01,,, | C PROGRAMMING(1995-1998) | Monograph | Co-author | KANSAI UNIVERSITY PRESS | |
43 | Papers1 | 1997/9/3~1997,09,03,,, | The Estimation of Landslide Risk by Neural Networks | Academic Journal | Co-author | World Wide European Council of Civil Engineers Symposium, Symposium Report | |
44 | Papers1 | 1997/7~1997,07,,,, | The Decision Support System for Body Color of Car Using Genetic Algorithm and Rough Sets | Academic Journal | Co-author | International Symposium on Optimization and Innovative Design, Extended Abstract&CD-ROM Proceedings | pp.19-20(#114) |
45 | Papers1 | 1996/5~1996,05,,,, | The Decision Support System for Body Color of Car Using Genetic Algorithm and Rough Sets | Academic Journal | Co-author | ||
46 | Papers1 | 1995/9/4~1995,09,04,,, | Aesthetic Design System of Structures Using Neural Network and Image Database | Academic Journal | Co-author | pp.115-120 |
Edited bookUnrefereedMonographCo-editorKOBAYASHI,Takashi;TANAKA, Shigenori2022/3/26~978-4777521876
PapersDOM-Based XSS Prevention Support System
for Developers Using Abstract Syntax Tree AnalysisUnrefereedAcademic JournalCo-authorKOBAYASHI,Takashi;NAKAHARA, Takashi;IDE, Shuta;MAEDA, Tatsuya;HATA, YusukeIEICE Technical Reportvol. 121, no. 410, ICSS2021-72, pp. 78-86,2022/3~XSSvulnerabilityisavulnerabilitythatallowsanattackertoexecutearbitraryJavaScriptviathe vulnerable implementation of a web application, and developers are required to reduce software vulnerabili- ties. In this paper, we propose a system that warns developers of DOM-Based XSS during the development stage. In the detection of DOM-Based XSS, flow analysis using abstract parse trees improves the detection rate and performance compared to existing dynamic analysis systems using taint propagation.
BookUnrefereedMonographSingle-AuthorKOBAYASHI,Takashi2021/9/1~978-4896413052
PapersThe building and operation of SSH server for collecting password authentication information and the attack detection method using the systemUnrefereedAcademic JournalCo-authorKOBAYASHI,Takashi;SHIMAOKA, Shuya;TANG, Xinyue;SHIMADA, Koki;OGAWA, RyogaIPSJ SIG Technical ReportVol.2021-IOT-53 No.162021/5/14~SSH protocol is widely applied to UNIX-like operating systems because of the remote access method’s capability with authentication and encryption technology. However, its purpose is to operate the shell of the server directly, so the servers tend to become the target for the attackers who the company’s confidential information. To observe the SSH accesses with password authentication, we build the recording system for the authentication user name, password, RTT, authentication time, IP addresses and operate it in our laboratory. In this paper, we describe the system structure and operational thing. We also propose the attack detection method with this system under clearing the attacks’ characteristics for the SSH servers.
PapersUnrefereedAcademic JournalCo-authorKOBAYASHI,Takashi;HARIMA, Naoki;HIRAMATSU, KosukeForum on Information TechnologyM-0352019/9/5~
PapersA Proposal of the backup system with Cloud Storage System for ransomware countermeasureUnrefereedAcademic JournalCo-authorHARIKO, Naoki;KOBAYASHI,TakashiProceedings of 17th Forum on Information TechnologyL-0162018/9/20~
PapersThe development of Drive-by Download attack prevention system using Proxy and ICAPUnrefereedAcademic JournalCo-authorYAMAZAKI, Masato;KOBAYASHI,TakashiProceedings of 17th Forum on Information TechnologyL-0212018/9/20~
PapersA proposal of the detecting method of IoT bot based on analysis of process structureUnrefereedAcademic JournalCo-authorKONISHI, Tatsuya;KOBAYASHI,TakashiProceedings of 17th Forum on Information TechnologyL-0232018/9/20~
PapersAnalysis of SSH attack tendency based on Darknet analysisUnrefereedAcademic JournalCo-authorKOBAYASHI,Takashi;MATANO, Tsuyoshi;BANDO, TsubasaIPSJ SIG Technical ReportVol. 2018-IOT-41, No.172018/5/17~2018/5/18The number of devices that can be accessed from the Internet is on the rise, and the possibility of being attacked / damaged is increasing. It seems that servers that are not well managed and devices operating with the default ID and password are speci cally targeted, and the administrator can grasp the trend as soon as possible and change the operation method of the server Measures are necessary.
Our laboratory operates SSH honeypot, and we are working on research to prevent password brute force attack etc. In order to grasp a more detailed attack tendency, we analyzed the access log to Darknet and analyzed the correlation between access to Darknet and SSH honeypot. As a result, access to the SSH honeypot occurred within about 1 day after accessing Darknet, and most of it was found to be concentrated within 14 hours.
PapersProposal to support analysis of Drive-by Download attack by highlighting malicious URLUnrefereedAcademic JournalCo-authorOZAKI, Kouya;UEYAMA, Shinya;KONISHI, Tatsuya;YAMAZAKI, Masato;BANDO, Tsubasa;KOBAYASHI, TakashiProceedings of Computer Security Symposium 20172B4-22017/10/23~2017/10/25Nowadays, it is difficult to analyze attacks on web applications due to the attacker's identity
camouflage and the obfuscation of JavaScript. So far, we have developed an application to visualize the multistage redirecting caused by Drive-by Download attacks, as a tree. In this research, we add a function to highlight URLs with malignant quantities obtained by decision tree learning. We aim support for a more efficient analysis to by highlighting malignant URLs.
BookMonographSingle-AuthorKOBAYASHI,Takashi2017/9/19~
PapersUnrefereedAcademic JournalCo-authorBANDO, Tsubasa;UEHARA, Takuya;KOBAYASHI,Takashi2017/9/14~
PapersUnrefereedAcademic JournalCo-authorKOBAYASHI,Takashi;HIRAMATSU, Kosuke2017/9/12~
PapersArtificial Metrics of Electric Devices and Their ApplicationsUnrefereedIn-house publicationCo-authorKOBAYASHI,Takashi;KUWAKADO, Hidenori;HORII, Yasushi;KAMBARA, TomoyaVol. 46, pp.1-222017/7/20~
PapersDevelopment and Evaluation of Analytical Support Application for Drive-by Download AttacksUnrefereedAcademic JournalCo-authorAOYAMA,Yuhei;YOSHII,Akira;OHKRA,Kaho;OZAKI, Koya;BANDO,Tsubasa;KOBAYASHI, TakashiMWS;Automation of Workflow;Relationship among the packets;Visualization of the attachs;Drive-by DownloadComputer Security Symposium 2016Vol.2016, No.2, pp.819 - 8252016/10/4~2016/10/4The automatic download of malware by Drive-by Download attacks becomes a big problem.It is necessary to clear the attack flow, however the analyzing work flow needsprofessional knowledges and massive time.We develop the application to support the analyzing workflows of Drive-by Download attacks,and all over the attack can be easier to understand by visualizing the relationshipamong the data as tree structure.We use the D3M datasets to evaluate the performance of this application.We can show the relationship of 80% traffic data of D3M datasets correctly.
PapersDevelopment of Personal Authentication Application Using the Motion Sensor of a SmartphoneUnrefereedAcademic JournalCo-authorKOSAKA,Kensuke;KOSUKE,Hiramatsu;KOBAYASHI, TakashiL-0202016/9~2016/9
PapersUnrefereedAcademic JournalCo-authorHIRAMATSU,Yoshitaka;KOBAYASHI, TakashiC-0382016/9~2016/9
Research reportDrive-by Download攻撃解析における支援アプリケーションの開発UnrefereedOtherCo-authorYOSHII,Akira;KOBAYASHI,TakashiDPS-072015/10/21~2015/10/23Computer Security Symposium 2015 in NagasakiNagasaki Brick HallJapanese
PapersAn approach for controling IRCbot's activity using IPSUnrefereedAcademic JournalCo-authorSAKAI,Ryosuke;KOBAYASHI,TakashiProceedings of Computer Security Symposium 20153E4-32015/10/21~2015/10/23Computer Security Symposium 2015 in NagasakiNagasaki Brick HallJapaneseNowadays, damage from a malware is increasing and cracker’s purpose is changing from pleasure to profit from attacking the computer. In such a situation, it seems that malware’s threat will become more serious. Hence we focus on the bot that is a kind of malware and IRC that is often used when bot communicate with C&C server. In this study, we propose the method to distinguish the command of legitimate IRC client from IRCbots by attaching an identifer to IRC client’s connection. Further, we show that the activities of IRCbots can be controlled by obstructing the bot’s connection using IPS.
PapersAnalysis of SSH Access on Kansai UniversityUnrefereedAcademic JournalCo-authorNAKATA,Kyohei;YOSHII,Akira;SAKAMOTO,Kaname;KOBAYASHI,TakashiIPSJ SIG Technical ReportVol.2015-IOT-31, No.82015/9/25~2015/9/26The remote login is essential to take advantage of computer resources deployoed at remote locations. SSH is the protocol which is generally used by the remote login. But it may be targeted in attackers because who can connect to computer if only to make authentication succeed for once. Accordingly, providing SSH service should carry out with the regorous security rules and it is always necessary to monitor access attempts logs. We analyzed attacker's features by analyzing attackers' access attempted date, IP address, hosted country and user name from access attempt log which attempted to IP address assigned to Kansai University. Moreover, we had observed attacker's activity and strategy by setting up honeypot. In this paper, we report the results of experimental and analysis.
PapersUnrefereedAcademic JournalCo-authorAKASAKA,Shota;KOBAYASHI,TakashiProceedings of Forum on Information Technology 2015L-0152015/9/15~2015/9/17Forum on Information Technology 2015Ehime UniversityJapanese
Research reportDrive-by Download攻撃を防御するProxyの実装UnrefereedOtherCo-authorYOSHII,Akira;KOBAYASHI,TakashiDPS-042014/10/22~2014/10/24Computer Security Symposium 2014 in SapporoSapporoJapanese
PapersUnrefereedAcademic JournalCo-authorNAKANO,Shota;KOBAYASHI,TakashiProceedings of Forum on Information Technology 2014L-0152014/9/3~2014/9/5Forum on Information Technology 2014University of Tsukuba
PapersThe implementation and its evaluation of the filesystem using P2P technologyIn refereedAcademic JournalCo-authorTakashi Kobayashi;Fumihisa Shigekane;Hideaki Tanaka;Proceedings of the 26th Annual Conference of JSAI, 20121A3-OS-17b-32012/6/12~2012/6/15The 26th Annual Conference of JSAI, 20121347-9881
PapersProposal and Implementation of remote support live migrationUnrefereedMonographCo-authorKoutarou Yamada;Takashi Kobayashi;IEICE Technical ReportVol.111, No.468, pp.129-132 (NS2011-202)2012/3/8~The Institute of Electronics, Information and Communication Engineering
PapersKeystroke Authentication Using the Neural NetworkUnrefereedAcademic JournalCo-authorKosuke Kimata;Takashi Kobayashi;keystroke dynamics;neural network;personal authentication;IEICE Technical ReportIN2011-87, pp.49-522011/10/21~The keystroke dynamics use time to need it for key input such as time from pushing to separating the
key as a characteristic to identify an individual. However, the keystroke dynamics is behavioral characteristics, and
the value input everytrial is not constant. Therefore, when uses this technique for a personal identi cation system,
it becomes important to appropriate characteristic extraction, and personal identi cation to realize higher precision
certi cation. In this study, We pay atention at time from pushing to separating one key said to that unevenness is
hard to occur even the person that key input is unripe in keystroke dynamics, and let a neural network learn this
characteristic, and suggest certi cation technique extracting a characteristic, and show the evaluation result by the
experiment.
PapersOn the automatic adjustment of the rewall's rulesUnrefereedAcademic JournalCo-authorYuu Nishida;Takashi Kobayashi;Firewall;Automatic adjustment;IDS;IEICE Technical ReportIN2011-88, pp.53-562011/10/21~Although the administrator checked the log of IDS and has added a new rule to the rewall in the
conventional system, the administrator's burden increases as the log of IDS becomes huge. So, in this research,
the log of IDS is checked instead of an administrator, the system which rewrites the con guration le of a rewall
automatically is proposed, and the evaluation is performed. The keyword which expresses the danger of an IP
address and an attack with the system to propose from the log of IDS is extracted, and the program which adds a
rule for it to origin automatically at a rewall is mounted.
PapersImplementation of the distributed file system using P2P technologyUnrefereedAcademic JournalCo-authorHideaki Tanaka;Takashi Kobayashi;Peer-to-Peer;Distributed File System;Distributed Directory Management;IEICE Technical ReportNS2011-100, pp.99-1042011/10/14~Distributed File System is one of the system that consist of many computers. In a Distributed File System, it is possible to use total amount of storage which each computer has as one storage. In this system, storage capacity can be changed by perfoming an addition and removal of a computer. A Distributed File System implemented in this research dose not have a management computer which becomes a single failure point in a system. Distributed File System implemented in this research,form a P2P network between computers. Therefore the system dose not have a single failure point. And the system could keep runnning, even if a computer drops out from the network.
PapersResearch on the load-balancing System for a contents-based flexible configurationUnrefereedAcademic JournalCo-authorKazunori Yuki;Takashi Kobayashi;Load Balancing;Resource Surveillance;Layer 7 Switch;Contents Replication;IEICE Technical ReportNS2011-101, pp.105-1082011/10/14~The number of servers is decided depending on the amount of the loads of services in the case of tradi-
tional load balancing system, then the distributed system is con gured. However, the administrator have to adjust
the number of servers depending on the assumed amount of the loads, and it is not able to treat immediately against
the varying or unexpected loads. In addition, if the system is con gured so as to treat the maximum load of the
service, it will cause the extra, unnecessary resources. Currently, in the cloud environment, there is the system
that increase or decrease the number of instances depending on the varying loads. However, such cloud system is
not able to increase or decrease the number of instances based on the load of the each contents. In this paper, we
implement the dynamic load balancing system based on the load status of each contents and propose the method
for maintaining the load balance of the whole system.
PapersToward Time-Sensitive Structure Analysis for SPAM Filtering: A Data Mining ApproachIn refereedOtherCo-authorAtsushi Inoue;Isao Hayashi;Toshiyuki Maeda;Yoshinori Arai;Takashi Kobayashi;2011/5/23~2011/5/26World Conference on Soft ComputingSan Francisco State UniversityThe rapid growth of the Internet has caused issues concerning SPAM messages. As a result of this being a widespread social problem, many Mail User Agents (MUAs) are facilitated with SPAM filters. Unfortunately, the most of those filters use probability-based methods that concern only their contents such as word frequencies, thus do not properly perform SPAM filtering based on their intrinsic structure. Moreover, hardly any SPAM filters are sensitive to change in attributes over time. This paper introduces our anticipation toward their time-sensitive structure analysis. Taking a data mining
approach on both headers and contents of mail messages, we analyze significance, validity and utility for SPAM filtering. Attributes are selected from their header fields as well as various summarization of their contents. Such a data mining approach is then taken in consecutive time periods in order to study timesensitivity, i.e. change of significant attributes over time. Some cross validation is conducted in order to show validity. Decision Tree Learning (DTL) is currently deployed for its advantage of identifying significance based on Information Entropy. Finally, we present results throughout experiments using mail messages sent to an actual site.
BookMonographTakashi KOBAYASHI;2011/2/25~978-4-89641-175-1
PapersA proposal of structure analysis method for spam filteringIn refereedAcademic JournalCo-authorTakashi KOBAYASHI;Ayane TSUJINO;Rie SASAKI;Toshiyuki MAEDA;Yoshinori ARAI;Atsushi INOUE;Isao HAYASHI;pp.587-5922010/9~Human Interface Symposium 2010BKCThe development of the Internet has become a widespread social problem of spam. As a result, many mail user agent software are developed that have the function of spam filtering. However, in these filters, they only have the probabilistic selection methods, and the distinction methods are not based on the kind and structure of spam mail.
In this paper, we propose an analysis model that estimate the distinction class of spam mail by various input properties. These properties are picked out by extracting the header fields and body text of spam mails. Then, we classify time-seriesed mail dataset by using data mining methods, and verify the classification by n-fold cross validation method. Finally, we make a study of its usefulness by actually received mail.
TextbookC PROGRAMMING(1999-2009)MonographCo-authorKOBAYASHI Takashi;C. Aoyama;T. Kimura;S. Tanaka;M. Hirokane;Y. Horii;F. Miyashita;S. Kimura;KANSAI UNIVERSITY PRESS2009/4/1~
PapersImplementation of load balancing for Hybrid Node In Mobile IPv6In refereedCo-authorTakahisa Yamada;Takashi Kobayashi;2009/3/8~In MIP6, that is a mobile technology for IPv6, the mobile nodes (MNs) can continue their communications after moving, so that MNs use the triangle route through Home Agent (HA). On the communications of triangle route if the number of MNs managed by HA, the load of HA will increase. And when some troubles of HA will happen, MNs cannot continue their connections, so the redundant system of HAs is needed. We proposed the Hybrid node that has the functions of both of MN and HA, and inspected the usefulness of it to achieve the efficiently redundant system. And the redundant system by Hybrid nodes achieves to reduce the unnecessary resources and the cost of new HAs deployment. However, HA and Hybrid nodes cannot distinguish from other nodes because the Hybrid nodes use Anycast Address same as HA. Therefore, there is a possibility of increasing the MNs managed by Hybrid nodes, and the Hybrid node itself may not be able to communicate using mobile connection. In this paper, we will discuss the implementation of the function of load balancing of when the imbalance of load among Hybrid nodes and HA exceeds the threshold value.
PapersOptimal Location of Wireless LAN Access Points Using Fuzzy ID3In refereedAcademic JournalCo-authorIsao Hayashi;Takashi Kobayashi;Yoshinori Arai;Toshiyuki Maeda;Atsushi Inoue;Journal of Advanced Computational Intelligence and Intelligent InformaticsVol.13, No.2, pp.128-1342009/3~Although wireless LAN is useful in its small size and mobility, the connection region of transmitted radio wave is strongly affected by other electric devices, consumer products, and differences in size and type of the room. Besides, wireless LAN points (APs) must exclude a personal computers without permitting to connect to the Internet. Therefore, how optimally APs are located is important. In this paper, we propose the APs' optimal location method. The proposed algorithm integrates fuzzy rules acquired by fuzzy ID3 with knowledge of security experts, and estimates the connection region for AP. We discuss how to formulate the method for setting AP optimal location and show the effectiveness of this method by illustrating the examples of AP optimal locations.
PapersOptimization for Overly Network over IPv6UnrefereedAcademic JournalCo-authorYouhei Tajima;Takashi Kobayashi;IEICE Technical ReportVol. 108, No. 136, pp.13-162008/7/17~2008/7/18Recently, the ubiquitous society for using IPv6 next-generation network (NGN) is attracting much attention. It is necessary to improve the information management function of every terminal of P2P networks because a variety of multimedia services is expected to deploy on an NGN. In this study, Chord algorithm is used, that is one of the distributed hash algorithms which is the most popular algorithms on P2P systems. The number of hop to the following node in the node list is investigated using the hop limit in the header of IPv6, and the route optimization in Chord based on the number of hop is performed.
PapersAn Evaluation of Hybrid node of Mobile IPv6UnrefereedAcademic JournalCo-authorTakahisa Yamada;Takashi Kobayashi;IEICE Technical ReportVol. 108, No. 136, pp.77-822008/7/17~2008/7/18It accompanies the spread of the internet, and a lot of service use internet. Not only the computer but also a lot of terminals use internet. Many terminal that can move especially comes to participate in the internet, and the technology of mobility becomes important. However, there is problem in the technology of Mobile IPv6 developed for mobile communications. The home agent concentrates the load easily in Mobile IPv6. Moreover, if the home agent doesn't function due to accident, the mobile node cannot be mobile communicated. Therefore, the maintenance of home agent's function is important in Mobile IPv6. If more home agent is aranged in the home network, and it achieves the redundancy of home agents but it costs to maintain more home agents.In this paper, we propose hybrid node for redundancy of home agent and effectiveness is evaluted.
PapersEncrypted Multicast Transport in JXTAUnrefereedAcademic JournalCo-authorYouhei Tajima;Takashi Kobayashi;L-029, pp.67-682007/9~
Papersmultihoming using anycast addressUnrefereedOtherCo-authorTakahisa Yamada;Takashi Kobayashi;M-058, pp.271-2722007/9~
PapersPrototyping and Evaluation of P2P Grid Platform with Resource Management MechanismIn refereedAcademic JournalCo-authorHiroki KATO;Masato MIZUE;Masaki HIROKAWA;Takashi KOBAYASHI;Shinichi UESHIMA;DBJS LettersVol. 6, No.12007/6~The Database Society of JapanResearches on Grid computing and P2P systems are gaining focuses recently. This paper proposes a PC grid platform in P2P settings. In this platform, PC's are managed distributively in a P2P manner by the resource management mechanism proposed in this paper. Peers on the platform register their resource information to this mechanism, and share their resources. We consider Processing Grid and Distributed Storage as services in this platform. When the services request the resources, the resource managemtn mechanism assigns the services to peers according to the registered information. The authors have constructed a prototype, and have simulated to observe the effects on the resource management mechanism.
Discussion PaperOn the Building Methods of e-Local Government and Grid ComputingUnrefereedMonographSingle-AuthorTakashi Kobayashi;RCSS Discussion Paper SeriesNo. 452006/9~The migration processes of legacy systems and/or applications are going for the building e-local government. However, taking advantage of open systems is only making the optimization of each service, and it is far way from the optimization for whole of services. It is needed to achieve the apropriate level of information security countermeasure, and the person who take charge of information systems will be responsible for the countermeasure of every systems.
The aim of this paper is to show the availability of the grid computing and the guideline on the future system of e-local government in case of building e-local government while solving above problems.
Keynote addressPort Violation and Intrusion Detection SystemUnrefereedOtherKOBAYASHI Takashi;2006/1/14~Freedom and Security in Computer Networks - The 3rd RCSS International Conference, The 1st PG Lab International Conference
PapersVoronoi Diagram Algorithm on the Grid EnvironmentIn refereedMonographCo-authorKOBAYASHI Takashi;Masato Mizue;Shinichi Ueshima;A-023, pp.55-562005/9/7~Forum on Information Technology 2005
PapersLaboratory Syllabi of Computer Security for an IT moral EducationUnrefereedIn-house publicationCo-authorYoshinori Ezawa;Takashi Kobayashi;No. 21, pp.59-772004/10~What should be the nature of moral education in information technology (IT) ? In this paper, we discuss it from the view poitn of the philosophy of social morals. It is shown that the scientific comprehension of IT constitutes the fundamentals. Then, the reason why a laboratory session for IT education might be required is discussed. Finally, the laboratory syllabi of computer security education at the Department of Informatics is explained as it is a unique precedent among Japanese colleges.
PapersA Self-Confirmation Engine for Preventing Man-in-the-Middle AttackIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;Masataka Kanamori;Suguru Yamaguchi;IEICE Transactions on CommunicationsVol.E87-B No.3 pp.490-4962004/3/1~THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS
PapersThe Implementation of Intrusion Detection System Focused on Port ViolationIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;M. Kanamori;S. Yamaguchi;Proceedings of The Third International Symposium on Communications and Information TechnologiesVol. 1, pp.79-832003/9~
PapersA Forensic Analysis with Records of Address MappingIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;M. Kanamori;S. Yamaguchi;Proceedings of The Third International Symposium on Communications and Information TechnologiesVol. 1, pp.59-642003/9~
PapersThe Implementation of Instrusion Detection System focused on Port ViolationUnrefereedIn-house publicationSingle-AuthorKOBAYASHI Takashi;No.19, pp.43-572003/8~
PapersInfrastructure for Computer Moral Education in a UniversityUnrefereedIn-house publicationCo-authorYoshinori Ezawa;Takashi Kobayashi;Yoshiyuki Nakashiba;2003/8~Computer moral education is one of the biggest problems in IT educational courses for university students. This paper includes the report of annual construction plans of computer network infrastructure by the Information Processing Center of Kansai University. Moreover, we discuss about the implementation of a digital identification method that was introduced in the Faculty of Informatics in 2001. The biometrics used in this new tool might be unusual for university student, but it is now a common tool in business applications. The abuse of computers by novice students with cracking software was dramatically decreased since this finger print identification tool had been implemented.
PapersA Proposed Method of Avoiding Address Mapping ViolationIn refereedMonographCo-authorKOBAYASHI Takashi;M. Kanamori;S. Yamaguchi;1st International Forum on Internet and Computer Technologypp.88-932003/1~
PapersManagement policy and technique to achieve safely and authorized IP connectivityUnrefereedIn-house publicationSingle-AuthorKOBAYASHI Takashi;Vol.18, pp.11-232002/12/20~Kansai University Special Research Fund 20020401-20030331
PapersIn refereedMonographCo-authorKOBAYASHI Takashi;;;;;;;No.19, pp.113-1202002/12~
BookMonographCo-authorKOBAYASHI Takashi;;;;;;;;2002/4/15~
Research reportIn-house publicationCo-authorKOBAYASHI Takashi;;;;No.15, pp.41-552001/4~
PapersUnrefereedIn-house publicationSingle-AuthorKOBAYASHI,Takashi;Vol.14, pp.35-482000/12/21~
PapersCo-authorKOBAYASHI Takashi;H.Furuta;M.Hirokane;S.Tanaka;Y.Nomura;2000/9~
BookMonographCo-authorT.Ajisaka;T.Kobayashi;Y.Horii;S.Tanaka;M.Hirokane;PROGRAMMING;2000/7/25~
Research reportIn-house publicationCo-authorKOBAYASHI Takashi;;;;;;No.14, pp.39-452000/4~
BookMonographCo-authorKOBAYASHI Takashi;;;;;;;;1999/12/14~
BookMonographCo-authorKOBAYASHI Takashi;;;;;;;1999/12/14~
BookMonographCo-authorKOBAYASHI Takashi;;;;;;;1999/12/14~
Academic presentationCo-authorKOBAYASHI Takashi;;;1999/7~
BookMonographCo-authorKOBAYASHI Takashi;;;;;;;;PROGRAMMING;FORTRAN;1998/10/1~
TextbookC PROGRAMMING(1995-1998)MonographCo-authorKOBAYASHI Takashi;C. Aoyama;T. Kimura;S. Tanaka;M. Hirokane;Y. Horii;F. Miyashita;S. Kimura;KANSAI UNIVERSITY PRESS1998/4/1~
PapersThe Estimation of Landslide Risk by Neural NetworksIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;H.Furuta;M.Hirokane;I.Tatekawa;World Wide European Council of Civil Engineers Symposium, Symposium Report1997/9/3~
PapersThe Decision Support System for Body Color of Car Using Genetic Algorithm and Rough SetsIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;International Symposium on Optimization and Innovative Design, Extended Abstract&CD-ROM Proceedingspp.19-20(#114)1997/7~
Academic presentationUnrefereedOtherSingle-AuthorKOBAYASHI,Takashi;1997/3~Institute of Electronics, Information and Communication Engineering
PapersThe Decision Support System for Body Color of Car Using Genetic Algorithm and Rough SetsIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;1996/5~
PapersIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;;;;;1996/5~
PapersAesthetic Design System of Structures Using Neural Network and Image DatabaseIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;H.Furuta;K.Yasuda;pp.115-1201995/9/4~Proceeings of ISUMA-NAFIPS'95
Research reportUnrefereedIn-house publicationCo-authorKOBAYASHI Takashi;;;1995/3~
PapersIn refereedAcademic JournalCo-authorKOBAYASHI Takashi;H.Furuta;M. Hirokane;S.Tanaka;Y.Mikumo;1995~
Academic presentationCo-authorKOBAYASHI Takashi;;;;;1994/10~
Academic presentationCo-authorKOBAYASHI Takashi;F.Higaki;K.Matsumoto;M.Kitao;Y.Nomura;D.Mori;K.Kawamoto;1993/11~
Academic presentationCo-authorKOBAYASHI Takashi;;;;1993/10~
Academic presentationCo-authorKOBAYASHI Takashi;;;;1992/11~
Community Activities
- Takatsuki city's CIO aide 2005/9/1
- Ashiya city's CIO aide 2011/10/1~2012/9/30
Research Activities Overseas
- Kansai University's Overseas Research Program(long term)Aug. 28,2012-Sep. 8,2013United States of America Santa Clara University
- Kansai University's Overseas Research Program(long term)oversea research Aug. 28,2019-Aug. 29,2020United States of America St. Bonaventure University
Participation in International Conferences
- ISUMA-NAFIPS 95 Sep.1995-Sep. 1995
- Worldwide European Council of Civil Engineers Symposium Sep.1997-Sep. 1997
- International Workshop on Artificial Intelligence and Mathematical Methods in Pavement and Geomechanical Systems Nov.1998-Nov. 1998
- International Symposium on Computer and Information Technology Sep.2003-Sep. 2003
- World Conference on Soft Computing May23,2011-May 26,2011
- Personal Information
- Research Activities
- Research Activities
- Community Service
- Courses Taught