H
Hiroki Takakura
Researcher at National Institute of Informatics
Publications - 87
Citations - 1278
Hiroki Takakura is an academic researcher from National Institute of Informatics. The author has contributed to research in topics: Intrusion detection system & Anomaly-based intrusion detection system. The author has an hindex of 19, co-authored 84 publications receiving 1156 citations. Previous affiliations of Hiroki Takakura include Nagoya University & Tottori University.
Papers
More filters
Proceedings ArticleDOI
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation
TL;DR: A new evaluation dataset, called Kyoto 2006+, built on the 3 years of real traffic data which are obtained from diverse types of honeypots which will greatly contribute to IDS researchers in obtaining more practical, useful and accurate evaluation results.
Journal ArticleDOI
Toward a more practical unsupervised anomaly detection system
TL;DR: A new anomaly detection method by which it can automatically tune and optimize the values of parameters without predefining them is proposed and evaluated over real traffic data obtained from Kyoto University honeypots.
Journal ArticleDOI
Hierarchical visualization of network intrusion detection data
TL;DR: This work applies a hierarchical data visualization technique that represents leaf nodes as black square icons and branch nodes as rectangular borders enclosing the icons to bioactive chemical visualization and job distribution in parallel-computing environments.
Patent
Information presenting apparatus, information presenting method, and computer program
TL;DR: In this paper, a plurality of frames of representative images are extracted from each motion image in accordance with a specified frame extraction method, and thumbnail images of the respective extracted representative images were produced, and each thumbnail image is related to a playback position in the motion image.
Proceedings ArticleDOI
Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes
TL;DR: Two types of honeypot are proposed to collect unforeseen exploit codes automatically while maintaining their concealment against malicious attackers; cooperation based active honeypot and self-protection type honeypot.