[
top][
Japanese]
Copies are available on request
Note: newer information may be provided here
Refereed journal articles
- N. Kamiyama, T. Mori, R. Kawahara, and S. Harada,
``Optimally Identifying Worm-Infected Hosts.Optimum Identification of Worm-Infected Hosts,''
IEICE Transactions on Information Systems Vol. E96-B, No. 8, pp. 2084-2094, August 2013
[IEICE]
- D. Chiba, K. Tobe, T. Mori, and S. Goto,
``Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites,''
Journal of Information Processing Vol. 21 (2013) No. 3 pp. 539-550 [PDF][bibtex]
- N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
``Multicast Pre-Distribution VoD System,''
IEICE Transactions on Communications Vol. E96-B, No. 6, pp. 1459-1471, June 2013 [IEICE]
- R. Kawahara, T. Takine, T. Mori, N. Kamiyama, and K. Ishibashi,
``Mean-Variance Relationship of the Number of Flows in Traffic Aggregation and Its Application to Traffic Management,''
Elsevier Computer Networks, vol. 57, issue 6, Pages 1560-1576, April 2013 [ScienceDirect]
- N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa,
``Optimally Designing ISP-Operated CDN,''
IEICE Transactions on Communications Vol. E96-B, No. 3, pp. 790-801, March 2013 [IEICE]
An earlier version of this paper was presented at IEEE Global Internet Symposium 2009.
- Y. Ikeda, R. Kawahara, N. Kamiyama, T. Kimura, and T. Mori,
``Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data,''
IEICE Transactions on Communications Vol. E96-B, No. 02, pp. 533--542, Feb 2013
[IEICE]
- N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
``Autonomic load balancing of flow monitors,''
Elsevier Computer Networks, vol. 57, issue 3, Pages 741-761, Feburary 2013 [ScienceDirect]
- N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
``Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-distribution VoD ,''
IEICE Transactions on Communications Vol. E96-B, No. 01, pp.143--154 Jan 2013
[IEICE]
An earlier version of this paper was presnted at IEEE IM 2011.
- N. Maki, T. Nishio, R. Shinkuma, T. Mori, N. Kamiyama, R. Kawahara, and T. Takahashi
``Traffic Engineering of Peer-assisted Content Delivery Network with Content-oriented Incentive Mechanism,''
IEICE Transactions on Information Systems Vol. E95-D, No. 12, pp. 2860-2869, Dec. 2012.
[IEICE]
- R. Kawahara, T. Mori, T. Yada, and N. Kamiyama,
``Analyzing and Reducing the Impact of Traffic on Large-Scale NAT,''
IEICE Transactions on Communications, Vol.E95-B, No. 09,pp. 2815-2827, Sep. 2012.
[IEICE]
- A. Shimoda, T. Mori, and S. Goto,
``Extended Darknet: Multi-Dimensional Internet Threat Monitoring System,''
IEICE Transactions on Communications Vol. E95-B, No. 06, pp. 1915-1923,
June 2012. [PDF] Copyright © IEICE
- K. Ishibashi, R. Kawahara, T. Mori, T. Kondoh, and S. Asano,
``Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability,''
IEICE Transactions on Communications Vol. E95-B, No. 02, pp. 466-476, Feburary 2012.
[IEICE]
An earlier version of this paper was presented at IEEE Global Inernet Symposium 2007
- R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and S. Asano
``Detection accuracy of network anomalies using sampled flow statistics,''
International Journal of Network Management (IJNM), vol. 21, issue 6, pages 513--535, November/December 2011
[Wiley]
- N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
``Analyzing Influence of Network Topology on Designing ISP-Operated CDN,''
Telecommunication Systems (2 September 2011), pp. 1-9,
[Springer]
An earlier version of this paper was presented at IEEE NETWORKS 2010.
- N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
``Parallel video streaming optimizing network throughput ,''
Elsevier Computer Communications, vol. 34, issue 10, July 2011, Pages 1182--1194
[Elsevier]
[bibtex]
- N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
``Optimally designing caches to reduce P2P traffic,''
Elsevier Computer Communications, vol. 34, Issue 7, 16 May 2011, pages 883--897,
[Elsevier]
[bibtex]
- R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, and H. Yoshino
``Packet sampling TCP flow rate estimation and performance degradation detection method,''
IEICE Transactions 91-B(5): 1309-1319 (2008)
[IEICE]
[bibtex]
An earlier version of this paper was presented at IEEE GLOBECOM 2006
- K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, and H. Sakamoto,
``Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection,''
IEICE Transactions 91-B(5): 1331-1339 (2008)
[IEICE]
[bibtex]
An earlier version of this paper was presented at IEEE NetDB 2006
- T. Mori, T. Takine, J. Pan, R. Kawahara. M. Uchida, and S. Goto,
``Identifying Heavy-Hitter Flows From Sampled Flow Statistics,'' (Best Paper Award)
IEICE Transactions on Communications, Voll. E90-B, No. 11, pp. 3061--3072, November 2007
[PDF]
[IEICE]
[bibtex]
[Google Scholar]
An earlier version of this paper was presented at ACM/USENIX IMC 2004.
The original work has been cited by these work
and sflow's packet sampling theory site.
- S. Kamei, M. Uchida, T. Mori, and Y. Takahashi,
``Estimating scale of peer-to-peer file sharing
applications using multilayer partial measurement,''
Electronics and Communications in Japan (Part I: Communications) Volume 90, Issue 3, Date: March 2007, Pages: 54-63
[Wiley]
[Google Scholar]
- R. Kawahara, K. Ishibashi, T. Mori, T. Ozawa and T. Abe,
``Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links,''
IEICE Trans. Commun., vol.E88-B, no.12, pp.4605-4615, Dec. 2005.
[IEICE]
[bibtex]
- T. Mori, M. Uchida and S. Goto,
``Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-peer,''
Systems and Computers in Japan, Volume 36, Issue 11, Pages 70 -- 81, 2005 (DOI: 10.1002/scj.20283)
[IEICE]
[bibtex]
[Google Scholar]
- T. Mori, R. Kawahara, S. naito and S. Goto,
``On the Characteristics of Internet Traffic Variability: Spikes and Elephants,''
IEICE Transactions on Information and Systems, Vol. E87-D, No. 12, pp. 2644-2653, Dec. 2004
[IEICE]
[wikipedia]
[bibtex]
[Google Scholar]
Refereed Conference/Workshop Proceedings
- T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto
``SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs''
Proc. Traffic Monitoring and Analysis workshop (TMA 2015), Apr. 2015. (to appear)
- A. Fujino, J. Murakami, and T. Mori
``Discovering Similar Malware Samples Using API Call Topics''
Proceedings of the 2015 IEEE Consumer Communications and Networking Conference (CCNC 2015).
pp. 146--153, Jan 2015
[IEEE Xplore][bibtex][PDF][slide] (Note: paper PDF is the accepted version, not the final published version, see the IEEE web)
- N. Kamiyama, R. Kawahara, and T. Mori,
``Loss Recovery Method for Content Pre-distribution in VoD Service,''
Proc. World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
- T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto,
``Spatio-temporal Factorization of Log Data for Understanding Network Events,''
Proc. IEEE INFOCOM 2014, May 2014 [bibtex][PDF] (accepted version, not the final published version, see the IEEE web)
- N. Maki, R. Shinkuma, T. Mori, N. Kamiyama, and R. Kawahara,
``A Periodic Combined-Content Distribution Mechanism in Peer-Assisted Content Delivery Networks,''
ITU-T Kaleidoscope conference, April 2013.
- N. Maki, T. Nishio, R. Shinkuma, T. Takahashi, T. Mori, N. Kamiyama, and R. Kawahara,
``Expected Traffic Reduction by Content-oriented Incentive in Peer-assisted Content Delivery Networks,''
Proc. International Conference on Information Networking (ICOIN 2013), Jan. 2013. [IEEE Xplore]
- D. Chiba, K. Tobe, T. Mori, and S. Goto,
``Detecting Malicious Websites by Learning IP Address Features,''
Proc. IEEE/IPSJ SAINT 2012, July 2012 [IEEE Xplore][bibtex]
- N. Kamiyama, T. Mori, and R. Kawahara,
``Autonomic Load Balancing for Flow Monitoring,''
Proc. IEEE ICC 2012, June 2012 [PDF]
- T. Mori, Y. Takahashi, K. Sato, and K. Ishibashi
``How is E-mail Sender Authentication Used and Misused?,''
Proc. 8th Conference on Email and
Anti-spam (CEAS 2011), Perth, WA, Australia, Sep. 2011
[PDF]
[ACM portal]
[bibtex]
- Y. Takata, S. Goto, T. Mori,
``Analysis of Redirection Caused by Web-based Malware,''
APAN 32nd
Meeting, Network Research Workshop 2011, August
2011. (Best Student Paper Award)
[PDF]
- R. Kawahara, S. Harada, N. Kamiyama, T. Mori, and H. Hasegawa,
``Traffic engineering using overlay network,''
Proc. IEEE ICC 2011, Kyoto, Japan, June 2011.
[IEEE Xplore]
[PDF]
[bibtex]
- N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
``Limiting pre-distribution and clustering users on multicast pre-distribution VoD,''
Proc. IEEE IM 2011, 706--709, Dublin, Ireland, May 2011
[IEEE Xplore]
[bibtex]
- R. Kawahara, N. Kamiyama, T. Mori, and H. Hasegawa,
``Performance evaluation of peer-assisted content distribution,''
Proc. IEEE CCNC 2011, Las Vegas, US, Jan 2011.
[IEEE Xplore]
- N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
``Analyzing Influence of Network Topology on Designing ISP-Operated CDN,''
Proc. IEEE NETWORKS 2010, Walsaw, Poland, Sep 2010.
[IEEE Xplore]
- K. Ishibashi, T. Kondoh, S. Harada, T. Mori, and R. Kawahara,
``Detecting Anomalous Traffic using Communication Graphs,''
World Telecommunications Congress 2010 (WTC2010), Vienna, Austria, September 2010.
[IEEE Xplore]
- A. Shimoda, T. Mori, and S. Goto,
``Sensor in the Dark: Building Untraceable Large-scale Honeypots using Virtualization Technologies,''
Proc. IEEE/IPSJ SAINT 2010, pp. 22--30, Seoul, South Korea, July 2010.
(Best Student Paper Award)
[pdf]
[IEEE Xplore]
[bibtex]
- T Mori,H. Esquivel, A. Akella, A. Shimoda, and S. Goto
``Understanding Large-Scale Spamming Botnets From Internet Edge Sites,''
Proc. Seventh Conference on Email and
Anti-spam (CEAS 2010), Redmond, Washington, USA,
Jul. 2010 [PDF][slide][poster]
- N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
``Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic,''
Proc. IEEE ICC
2010, pp. 1--6, Cape Town, South Africa, May 2010.
[IEEE Xplore]
- T. Mori, R. Kawahara, H. Hasegawa, and S. Shimogawa
``Characterizing traffic flows originating from large-scale video sharing services,''
Proc. COST Traffic
Monitoring and Analysis (TMA) workshop 2010, pp. 17-31, Springer-Verlag LNCS 6003, Zurich, Switzerland, Apr. 2010.
[PDF]
[Springer]
[Google Book]
[slide]
[talk]
[bibtex]
[Google Scholar]
(notice: I really don't recommend you to spend your time on watching the movie, though...)
- N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
``Impact of Topology on Parallel Video Streaming,''
Proc. IEEE/IFIP NOMS
2010, pp. 607--614, Osaka, Japan, Apr 2010.
[IEEE Xplore]
- H. Esquivel, T. Mori, and A. Akella
``On the Effectiveness of IP reputation for Spam Filtering,''
Proc. IEEE/ACM COMSNETS
2010, pp. 40--49, Bengalooru, India,
Jan. 2010. (Best Paper Award)
[paper][slide][CiteSeer][ACM portal][bibtex][Google Scholar]
- T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and R. Kawahara,
``Improving deployability of peer-assisted CDN platform with incentive,''
Proc. IEEE GLOBECOM 2009, pp. 1-7, Honolulu, HI, USA., Dec. 2009
[pdf]
[slide]
[ACM portal]
[bibtex]
[Google Scholar]
- H. Esquivel, T. Mori, and A. Akella
``Router-Level Spam Filtering Using TCP Fingerprints:
Architecture and Measurement-Based Evaluation,''
Proc. Sixth Conference on Email and
Anti-spam (CEAS 2009), Mountain View, CA, USA, Jul. 2009
[paper]
[CiteSeer]
[Google Scholar]
- R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and H. Hasegawa,
``Adaptive bandwidth control to handle long-duration large flows,''
Proc. IEEE ICC 2009 Next Generation Networking Symposium, pp. 1--6, Dresden, Germany, June 2009.
[IEEE Xplore]
[bibtex]
- N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
``ISP-Operated CDN,''
IEEE Global Internet Symposium 2009, Apr. 2009.
[IEEE Xplore]
[Google Scholar]
- K. Ishibashi, T. Mori, S. Harada, T. Kondoh,
R. Kawahara, and S. Asano,
``Detecting Anomalies in Inter-hosts Communication
Graph,''
CERT FloCon 2009,
Jan. 2009
[paper]
- S. Harada, R. Kawahara, T. Mori, N. Kamiyama, S. Hasegawa, and H. Yoshino
``A method of detecting network anomalies in cyclic traffic',''
Proc. IEEE GLOBECOM
2008, pp. 2057-2061, New Orleans, LA, USA Dec., 2008.
[PDF]
[IEEE Xplore]
[bibtex]
[Google Scholar]
- N. Kamiyama, T. Mori, R. Kawahara, and S. Harada,
``Optimum Identification of Worm-Infected Hosts,''
Proc. IEEE IPOM 2008, Samos Island, Greece, Sep., 2008.
[ACM portal]
- N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Yoshino
``Extracting Worm-Infected Hosts Using White List,''
IEEE/IPSJ SAINT 2008, Turku, FINLAND, Aug., 2008.
[IEEE Xplore]
- R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, and S. Asano
``Detection accuracy of network anomalies using sampled flow statistics''
IEEE GLOBECOM 2007, Washington, D.C., USA, November 2007.
[IEEE Xplore]
- N. Kamiyama, T. Mori, R. Kawahara, and E. K. Lua
``Efficient Timeout Checking Mechanism for Traffic Control,''
IEEE ICCCN 2007,
Honolulu, Hawaii, USA, Aug 2007
[IEEE Xplore]
- K. Ishibashi, R. Kawahara, T. Mori, and R. Kawahara
``Effect of sampling rate and monitoring granularity on anomaly detectability,''
IEEE Global Inernet Symposium 2007 Minisymposia, Anchorage, Alaska, USA, May 2007.
[PDF]
[IEEE Xplore]
[Google Scholar]
- N. Kamiyama, T. Mori, and R. Kawahara
``Simple and Adaptive Identification of Superspreaders by
Flow Sampling,''
Proc. IEEE
INFOCOM 2007 Minisymposia, pp. 2481-2485, Anchorage,
Alaska, USA, May 2007.
[abstract][bibtex][Google Scholar]
- T. Mori, R. Kawahara, N. Kamiyama, and S. Harada
``Inferring original traffic pattern from sampled flow statistics,''
IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007.
[abstract][paper][bibtex]
- R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and S. Asano
``A study on detecting network anomalies using sampled flow statistics,''
IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007.
[abstract]
[Google Scholar]
- K. Ishibashi, T. Mori, R. Kawahara, K. Toyama, S. Osawa, and S. Asano,
``2-D Bitmap for Summarizing Inter-Host Communication Pattern,''
IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007.
[IEEE Xplore]
- R. Kawahara, T. Mori, Keisuke Ishibashi, Noriaki Kamiyama and Takeo Abe,
``Estimating flow rate from sampled packet streams for detection of performance degradation at TCP flow level,''
Proc. IEEE GLOBECOM
2006, pp. 1--6, San Francisco, USA, December 2006.
[IEEE Xplore]
- R. Kawahara, T. Mori, and T. Abe,
``QoS control to handle long-duration large flows and its performance evaluation,''
Proc. IEEE ICC 2006, Istanbul, Turkey, June 2006.
[IEEE Xplore]
- K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, and H. Sakamoto,
``Estimating Top-N Hosts in Cardinality,''
Proc. 2nd IEEE International Workshop on Networking Meets Databases (NetDB'06), Atlanta, GA, USA, April 2006.
[IEEE Xplore]
[Google Scholar]
- N. Kamiyama and T. Mori,
``Simple and Accurate Identification of High-Rate Flows by Packet Sampling,''
Proc. IEEE INFOCOM 2006,
pp. 2836-2848, Barcelona, Spain, April 2006.
[PDF]
[IEEE Xplore]
[bibtex]
[Google Scholar]
- R. Kawahara, K. Ishibashi, T. Mori, and T. Abe,
``A Method of Detecting Performance Degradation at TCP Flow Level from Sampled Packet Streams,''
Proc. IEEE High
Performance Switching and Routing (HPSR) 2005, pp. 157--161,
HongKong, China, May 2005.
[IEEE Xplore]
[Google Scholar]
- T. Mori, M. Uchida, R. Kawahara, J. Pan and S. Goto,
``Identifying elephant flows through periodically sampled packets,''
Proc. ACM/USENIX IMC 2004,
pp. 115-120, Taormina, Italiy, October 2004.
[PDF]
[ACM portal]
[bibtex]
[Google Scholar]
- R. Kawahara, T. Mori, S. Sumita, and T. Abe,
``A scalable form of QoS control that handles long-duration P2P flows,''
XIX World Telecommunications Congress (WTC/ISS 2004), 2004.
- R. Kawahara, K. Ishibashi, T. Mori, T. Ozawa, S. Sumita, and T. Abe,
``A method of bandwidth dimensioning and management for aggregated TCP flows with heterogeneous access links,''
Proc. 11th
International Telecommunications Network Strategy and Planning Symposium, pp.15-20, June, 2004.
[IEEE Xplore]
[Google Books]
- T. Mori, R. Kawahara, S. Naito and S. Goto,
``On the Characteristics of Internet Traffic Variability: Spikes and Elephants,''
IEEE/IPSJ
SAINT 2004, pp. 99-106, Tokyo, Japan, 2004
[PDF]
[IEEE Xplore]
[slide]
[wikipedia]
[bibtex]
[Google Scholar]
The conference paper was developed into a full journal article.
Technical Reports
- Tatsuya Mori, Holly Esquivel, Aditya Akella, Akihiro Shimoda, and
Shigeki Goto,
``Understanding the World's Worst Spamming Botnet,''
The University of Wisconsin-Madison Computer Sciences Tech
Reports TR1660, June 2009
[paper|abstract]
- Tatsuya Mori, Holly Esquivel, Aditya Akella, Z. Morley Mao,
Yinglian Xie, and Fang Yu,
``On the Effectiveness of Pre-Acceptance Spam
Filtering,''
The University of Wisconsin-Madison Computer Sciences Tech
Reports TR1650, Feb. 2009 [paper|abstract]
- T. Mori and R. Kawahara,
``A study on the marginal distribution of network traffic,''
IEICE Technical Report, IN2001-107, pp. 1-7, (2001-11)
Other talks
- T. Mori, A. Nakao, N. Kamiyama, H. Hasegawa, and
R. Kawahara
``Toward scalable byte caching on high-speer routers,''
IEICE Society Conference 2009, BS-5-6, September 2009.
- T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and
R. Kawahara,
``How Incentive Helps In Making Peer-assisted CDN
Deployable?,''
IEICE General Conference BS-4-14, March 2009
- T. Mori,
``A robust approach of detecting anomalous hosts,''
Intimate 2006, Network Anomaly Diagnosis Workshop, Paris, France, July
2006. (invited) [slide]
- T. Mori, R. Kawahara, and N. Kamiyama,
``A simple and scalable detector of heavy-hitter flows,''
Sampling Workshop 2005, Paris, France, July 2005. (invited)
- T. Mori,
``Detecting Abusive Traffic Flows in Very High-Speed
Networks,''
Joint
Workshop of the Core University Program and JSPS 163rd
Committee on Next Generation Internet Technology, Daejong, Korea, Nov. 2004.
- T. Mori, R. Kawahara and S. Naito,
``Analysis of Non-Gaussian Nature of Network Traffic,'' [preprint]
IEICE General Conference 2002, SB-13-5, (2002-03)
- T. Mori and R. Kawahara,
``Is Hurst parameter sufficient for evaluating the performance of
bursty traffic?,''
IEICE Society Conference 2001, SB-10-3, (2001-09)
[Science Links Japan]
[Google Scholar]