scispace - formally typeset
H

Hiroki Takakura

Researcher at National Institute of Informatics

Publications -  87
Citations -  1278

Hiroki Takakura is an academic researcher from National Institute of Informatics. The author has contributed to research in topics: Intrusion detection system & Anomaly-based intrusion detection system. The author has an hindex of 19, co-authored 84 publications receiving 1156 citations. Previous affiliations of Hiroki Takakura include Nagoya University & Tottori University.

Papers
More filters
Proceedings ArticleDOI

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation

TL;DR: A new evaluation dataset, called Kyoto 2006+, built on the 3 years of real traffic data which are obtained from diverse types of honeypots which will greatly contribute to IDS researchers in obtaining more practical, useful and accurate evaluation results.
Journal ArticleDOI

Toward a more practical unsupervised anomaly detection system

TL;DR: A new anomaly detection method by which it can automatically tune and optimize the values of parameters without predefining them is proposed and evaluated over real traffic data obtained from Kyoto University honeypots.
Journal ArticleDOI

Hierarchical visualization of network intrusion detection data

TL;DR: This work applies a hierarchical data visualization technique that represents leaf nodes as black square icons and branch nodes as rectangular borders enclosing the icons to bioactive chemical visualization and job distribution in parallel-computing environments.
Patent

Information presenting apparatus, information presenting method, and computer program

TL;DR: In this paper, a plurality of frames of representative images are extracted from each motion image in accordance with a specified frame extraction method, and thumbnail images of the respective extracted representative images were produced, and each thumbnail image is related to a playback position in the motion image.
Proceedings ArticleDOI

Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes

TL;DR: Two types of honeypot are proposed to collect unforeseen exploit codes automatically while maintaining their concealment against malicious attackers; cooperation based active honeypot and self-protection type honeypot.