JOURNAL Vol. 63 No. 2
Special Issue on Network Security
●contents
1 Introduction: Overview of NICT’s Research and Development Projects on Network Security
Kazumasa TAIRA
2 Summary of Research and Development Activities
  2-1 Overview of Research and Development Activities on Cyber-Security
Daisuke INOUE
  2-2
  2-3 Overview of R&D Activities of Security Fundamental Technologies
Shiho MORIAI
3 Cybersecurity Technologies : Darknet Monitoring and Analysis
  3-1 Long-term Darknet Analysis in NICTER
Takahiro KASAMA
  3-2 GHOST Sensor: Development of a Proactive Cyber-attack Observation Platform
Masashi ETO
  3-3 Data Mining Applied to Darknet Traffic Analysis
Tao BAN
  3-4 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
Mio SUZUKI, Koei SUZUKI, Yaichiro TAKAGI, and Ryoichi ISAWA
  3-5 Internet Alive Monitoring around Disaster Areas using Large-scale Darknet
Mio SUZUKI
4 Cyber-Security Technologies: Live Network Monitoring and Analysis Technologies
  4-1 NIRVANA-Kai: A Real-time Visual SIEM System Against Targeted Attacks
Yu TSUDA, Nobuyuki KANAYA, Takashi TOMINE, Masaki KAMIZONO, Masato JINGU, Yaichiro TAKAGI, and Koei SUZUKI
  4-2 Rapid Analysis Technologies for Live Networks
Ichiro SHIMADA and Yu TSUDA
  4-3 A Suspicious Process Analysis in Cooperation with End Hosts
Junji NAKAZATO, Yu TSUDA, and Yaichiro TAKAGI
  4-4 The Design and Application of a Mimetic Network Environment Construction System
~Security Verification Environment Building System and Contribution to Human Resource Development~

Shingo YASUDA
  4-5 SF-TAP: Scalable and Flexible Traffic Analysis Platform
Yuuki TAKANO
5 Cybersecurity Technologies: Countermeasures Against Emerging Threats
  5-1 Technology for Supporting Obfuscated-Malware Analysis
Ryoichi ISAWA and Tao BAN
  5-2 Framework for Countering Drive-By Download
Takahiro KASAMA, Takashi MATSUNAKA, Akira YAMADA, Ayumu KUBOTA, Nobuyo FUJIWARA, Kazuo KAWAMORITA, and Koichiro OKADA
  5-3 Development of Honeypot to Observe DRDoS Attacks
Daisuke MAKITA and Katsunari YOSHIOKA
  5-4 Studies on Countermeasures for Malicious USB Devices
Tatsuya TAKEHISA, Makoto IWAMURA, and Hayato USHIMARU
6 Security Architecture Techniques
  6-1 Cybersecurity Information Discovery Technique and Knowledge Base
Takeshi TAKAHASHI
  6-2 Automated Vulnerability Monitoring Techniques for IT Assets on the Network
Takeshi TAKAHASHI
  6-3 Risk Analysis System for Android Applications
Takeshi TAKAHASHI and Tao BAN
  6-4 Description and Negotiation Techniques to Establish Security SLA
Takeshi TAKAHASHI
  6-5 Revocable Identity-Based Encryption
Keita EMURA
  6-6 Authentication Protocol and its Evaluation for IoT Devices
Daisuke MORIYAMA
  6-7 Two Approaches to Analyzing the Security of Cryptographic Protocols
Maki YOSHIDA
  6-8 Secure and Anonymous Communication Technique
Keita EMURA and Takeshi TAKAHASHI
7 Security Fundamental Technologies
  7-1 Recent Developments in Security Evaluation Technologies of Cryptosystems
Naoyuki SHINOHARA, Yoshinori AONO, and Takuya HAYASHI
  7-2 Analysis System (XPIA)
Takashi KUROKAWA, Ryo NOJIMA, and Shiho MORIAI
  7-3 CRYPTREC Activities and a Revision of the e-Government Recommended Ciphers List…
Takashi KUROKAWA, Sachiko KANAMORI, Ryo NOJIMA, Miyako OHKUBO, and Shiho MORIAI
  7-4 An Encrypted File Storage System with Hierarchical Levels of Sensitivity and its Applications
Lihua WANG, Takuya HAYASHI, Atsushi WASEDA, Ryo NOJIMA, and Shiho MORIAI
  7-5 Structure Preserving Cryptography
Miyako OHKUBO
  7-6 Privacy Preserving Technologies for Personal Data
Ryo NOJIMA, Sachiko KANAMORI, Atsushi WASEDA, Keita EMURA, and Takuya HAYASHI
  7-7 Long Term Cryptography and Applications to Privacy-Preserving Data Mining
Le Trieu PHONG, Yoshinori AONO, Takuya HAYASHI, and Lihua WANG
  7-8 Information Theoretic Secure Cryptosystems
Atsushi WASEDA and Ryo NOJIMA
8 List of Published Presentation Papers of Network Security Research Institute and Cybersecurity Research Center