Researcher Database

NameYoshiaki Hori
DepartmentOrganization for General Education
Job TitleProfessor Degree Obtained
  • Master of Engineering
  • Bachelor of Engineering
  • Doctor of Engineering
E-mailhoriyocc.saga-u.ac.jp
Homepage

Detailed Information

Research Field/Keywords for Research Field

  • computer science and engineering, computer network, network security, information security

Education

  • 1992/03, Department of Computer Science and Electronics, Graduated
  • 1994/03, Department of Information Systems, Master Course, Completed

Employment Experience

  • 1994/04 - 2003/09 Research Associate Kyushu Institute of Design
  • 2003/10 - 2004/02 Research Associate Kyushu University
  • 2004/03 - 2007/03 Associate Professor Kyushu University
  • 2007/04 - 2013/03 Associate Professor Kyushu University
  • 2013/04 -  *  Professor, Organization for General Education, Organization for General Education, Saga University

Field of Specialization

  • Information network, Information security, Communication/Network engineering

Membership in Academic Societies

  • JSPS 163rd Committee on Internet Technology

Themes for Ongoing Research

  • Reliability Availability and Security on Information Systems and Networking

Research Topics and Results

Original Articles

  • A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation; 2017/12
    ANNOUNCEMENT INFO.; Proc. of the 10th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017), Lecture Notes in Computer Science, Springer, 10656, 461-473
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • A Comprehensive Security Analysis Checksheet for OpenFlow Networks; 2016/11
    ANNOUNCEMENT INFO.; Proc. of the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016), Lecture Notes on Data Engineering and Communications Technologies, Springer, 2, 231-242
    AUTHOR; Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai
  • A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks; 2016/08
    ANNOUNCEMENT INFO.; Proc. of the 17th International Workshop on Information Security Applications (WISA 2016), Lecture Notes in Computer Science, 10144, 79-89
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • Detection and Blocking of a host behind NAT in the User Authentication Network; 2015/09
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 9, 1782-1793
    AUTHOR; Mitsuhiro Suenaga, Hisaharu Tanaka, Makoto Otani, Yoshiaki Hori, Yasuhisa Okazaki, Kenzi Watanabe
  • A Learning Algorithm for Behavior-based PortScan Automatic Detection and Its Evaluation; 2015/09
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 9, 1770-1781
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Evaluation of Machine Learning Techniques for C&C Traffic Classification; 2015/09
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 9, 1745-1753
    AUTHOR; Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding; 2015/05
    ANNOUNCEMENT INFO.; Proc. of the10th Asia Joint Conference on Information Security (AsiaJCIS 2015), 152-159
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding; 2015/05
    ANNOUNCEMENT INFO.; Proc. of the 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), 152-159
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • Development of Function to Forbid Access of Terminals via NAT in the Web Authentication Network; 2015/03
    ANNOUNCEMENT INFO.; IPSJ Journal, 56, 3, 798 - 807
    AUTHOR; Mitsuhiro Suenaga, Hisaharu Tanaka, Makoto Otani, Yoshiaki Hori, Yasuhisa Okazaki, Kenzi Watanabe
  • The Mediating Role of Co-creative Design Thinking : The Interface between Multi-Disciplinary, International and University-Industry Programs; 2015/03
    ANNOUNCEMENT INFO.; , 3, 137-153
    AUTHOR; Akane Matsumae, Takatosi Nakamura, Yoshiaki Hori, Susumu Matsumae
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors; 2015/01
    ANNOUNCEMENT INFO.; Proceedings of the 2015 International Conference on Information Networking (ICOIN 2015), 104-109
    AUTHOR; Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework; 2014/11
    ANNOUNCEMENT INFO.; Journal of Networks, 9, 11, 2905-2913
    AUTHOR; Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai
  • An NMF-Based Traffic Classification Approach towards Anomaly Detection for Massive Sensors; 2014/09
    ANNOUNCEMENT INFO.; Proceedings of 2014 International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), 396-399
    AUTHOR; Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori
  • A Parameterless Learning Algorithm for Behavior-Based Detection; 2014/09
    ANNOUNCEMENT INFO.; Proceedings of Ninth Asia Joint Conference on Information Security (AsiaJCIS 2014), 11-18
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors; 2014/07
    ANNOUNCEMENT INFO.; Proceedings of IEEE 38th Annual Computer Software and Applications Conference (COMPSAC 2014), 600-601
    AUTHOR; Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori
  • Development of Lecture Videos Delivery System using HTML5 Video Element; 2013/10
    ANNOUNCEMENT INFO.; , 557-559
    AUTHOR; Hiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe
  • Development of Network User Authentication System Using OpenFlow; 2013/10
    ANNOUNCEMENT INFO.; Proceedings of 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2013), 566-569
    AUTHOR; Shohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe
  • Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network; 2013/10
    ANNOUNCEMENT INFO.; Proceedings of 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2013), 570-574
    AUTHOR; Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai
  • Detection of Android API Call Using Logging Mechanism within Android Framework; 2013/09
    ANNOUNCEMENT INFO.; Proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2013), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 127, 393-404
    AUTHOR; Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets; 2013/07
    ANNOUNCEMENT INFO.; Journal of Information Processing, 21, 3, 527-538
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi
  • Detecting HTTP-Based Botnet Based on Characteristic of the C& C Session Using by SVM; 2013/07
    ANNOUNCEMENT INFO.; Proceedings of the 2013 Eighth Asia Joint Conference on Information Security (Asia JCIS 2013),, 63-68
    AUTHOR; Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai
  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets; 2013/07
    ANNOUNCEMENT INFO.; Journal of Information Processing, 21, 3, 527-538
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun-ichi Takeuchi

Material, Commentary, Editorials, Research Report, A Comprehensive Journal Articles

  • Development of Web system with fault tolerance based on P2P architecture; 2016/03
    ANNOUNCEMENT INFO.; IPSJ SIG Technical Reports, 2016-IOT-32, 41, 1-6
    AUTHOR; Hidemaru Nakamura, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani
  • Detection and Blocking of a host behind NAT in the User Authentication Network; 2014/05
    ANNOUNCEMENT INFO.; IPSJ SIG Technical Reports, 2014-IOT-25(6), 1-6, 2014-05-15, 2014-IOT-25, 6, 1-6
    AUTHOR; Mitsuhiro Suenaga, Hisaharu Tanaka, Makoto Otani, Yoshiaki Hori, Yasuhisa Okazaki, Kenzi Watanabe
  • SecureComm2013・ATIS2013 Report; 2013/12
    ANNOUNCEMENT INFO.; IPSJ SIG Report,2013-CSEC-63(5), 1-7, 2013-12-02, 2013-CSEC-63, 5, 1-7
    AUTHOR; Naoya Kajiwara, Shin-ichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • Application Analysis on Network Traffic from Many Sensors; 2013/10
    ANNOUNCEMENT INFO.; IEICE technical report, 113(256), 37-40, 2013-10-22, 113, 256, 37-40
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • A Study of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors; 2013/10
    ANNOUNCEMENT INFO.; IEICE technical report, 113(256), 41-44, 2013-10-22, 113, 256, 41-44
    AUTHOR; Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Yoshiaki Hori

General Lectures

  • Student Design Project with Scratch and Picoboard; 2017/08
    ANNOUNCEMENT INFO.; Proc. of JSiSE2017, G2-2, 173-174
    AUTHOR; Yoshiaki HORI, Akane MATSUMAE, Susumu MATSUMAE
  • Security Consideration for Multi-Domain SDN Application; 2016/03
    ANNOUNCEMENT INFO.; Proceedings of the 2016 IEICE General Conference, 情報・ システム講演論文集, 2, 187 (D-19-6)
    AUTHOR; Seiichiro Mizoguchi, Ryosuke Miyazaki, Takashi Matsunaka, Akira Yamada, Ayumu Kubota, Shin-ichi Matsumoto, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • System Security Evalution of OpenFlow Network; 2016/01
    ANNOUNCEMENT INFO.; 2016 Symposium on Cryptography and Information Security, 3F1-1 (6 pages)
    AUTHOR; Yoshiaki Hori, Seiichiro Mizoguchi, Ayumu Kubota, Ryosuke Miyazaki, Junpei Kawamoto, Shin-ichi Matsumoto, Koichi Sakurai
  • 近年のハニーポット取得データ解析によるC&Cトラフィック分類評価; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 2A1-4
    AUTHOR; Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • 通信と描画挙動の動的解析を用いたAndroid広告ライブラリの検知手法; 2015/01
    ANNOUNCEMENT INFO.; , 4A1-1
    AUTHOR; Naoya Kajiwara, Junpei Kawamoto, Shin-ichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • A Behavior-based Engine for Detecting Distributed Internet Attacks and its Performance Investigation; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 4A1-1
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • 挙動に基づくポートスキャン検知手法に向けたパラメータなしの学習アルゴリズムの提案とその性能評価; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 1A1-2
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • SDN Security Research - Recent Activity and Challenge -; 2015/01
    ANNOUNCEMENT INFO.; 2015 Symposium on Cryptography and Information Security, 1A1-3
    AUTHOR; Yoshiaki Hori, Shin-ichi Matsumoto, Kazumasa Yamauchi, Naoya Kajiwara, Junpei Kawamoto, Koichi Sakurai
  • 佐賀大学におけるmoodle と連携した講義自動収録視聴システムの構築; 2014/07
    ANNOUNCEMENT INFO.; 
    AUTHOR; 
  • Traffic Anomaly Detection Supporting M2M Devices; 2014/06
    ANNOUNCEMENT INFO.; 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) [Poster], poster
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • Android Advertisement Detection Focusing on Behavior Characteristics; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 1B2-2, 4pages, 1B2-2, 1-4
    AUTHOR; Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
  • Reconsidering the Behavior-based Method for Detecting Distributed Scan Attacks in Darknets; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 2C2-4, 5 pages, 2C2-4, 1-5
    AUTHOR; Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
  • A Port Scan Detection Method by Analyzing the Distribution Diagram of Accessed Ports; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 3A5-4, 7 pages, 3A5, 1-5
    AUTHOR; Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Extracting C& C Traffic by Session Classification Using Machine Learning; 2014/01
    ANNOUNCEMENT INFO.; The 31st Symposium on Cryptography and Information Security (SCIS 2014), 4C1-5, 8 pages, 1-8
    AUTHOR; Kazumasa Yamauchi, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai
  • Design of Anomaly Detection for Sensors Supporting BigData Network; 2014/01
    ANNOUNCEMENT INFO.; The Seventh Workshop among Asian Information Security Research Labs (WAIS 2014)
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • ビッグデータ時代を支える多数のセンサートラヒックに対する異常検知; 2013/11
    ANNOUNCEMENT INFO.; QBP Workshop 2014
    AUTHOR; Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, Katsuichi Nakamura
  • ダークネット観測における複数始点攻撃検知; 2013/11
    ANNOUNCEMENT INFO.; nicter workshop 2013
    AUTHOR; Yoshiaki Hori, Yaokai Feng


Copyright © MEDIA FUSION Co.,Ltd. All rights reserved.