[top][Japanese]

Copies are available on request

Note: newer information may be provided here

Refereed journal articles

  1. N. Kamiyama, T. Mori, R. Kawahara, and S. Harada,
    ``Optimally Identifying Worm-Infected Hosts.Optimum Identification of Worm-Infected Hosts,''
    IEICE Transactions on Information Systems Vol. E96-B, No. 8, pp. 2084-2094, August 2013 [IEICE]
  2. D. Chiba, K. Tobe, T. Mori, and S. Goto,
    ``Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites,''
    Journal of Information Processing Vol. 21 (2013) No. 3 pp. 539-550 [PDF][bibtex]
  3. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Multicast Pre-Distribution VoD System,''
    IEICE Transactions on Communications Vol. E96-B, No. 6, pp. 1459-1471, June 2013 [IEICE]
  4. R. Kawahara, T. Takine, T. Mori, N. Kamiyama, and K. Ishibashi,
    ``Mean-Variance Relationship of the Number of Flows in Traffic Aggregation and Its Application to Traffic Management,''
    Elsevier Computer Networks, vol. 57, issue 6, Pages 1560-1576, April 2013 [ScienceDirect]
  5. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa,
    ``Optimally Designing ISP-Operated CDN,''
    IEICE Transactions on Communications Vol. E96-B, No. 3, pp. 790-801, March 2013 [IEICE]
    An earlier version of this paper was presented at IEEE Global Internet Symposium 2009.
  6. Y. Ikeda, R. Kawahara, N. Kamiyama, T. Kimura, and T. Mori,
    ``Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data,''
    IEICE Transactions on Communications Vol. E96-B, No. 02, pp. 533--542, Feb 2013 [IEICE]
  7. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Autonomic load balancing of flow monitors,''
    Elsevier Computer Networks, vol. 57, issue 3, Pages 741-761, Feburary 2013 [ScienceDirect]
  8. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-distribution VoD ,''
    IEICE Transactions on Communications Vol. E96-B, No. 01, pp.143--154 Jan 2013 [IEICE]
    An earlier version of this paper was presnted at IEEE IM 2011.
  9. N. Maki, T. Nishio, R. Shinkuma, T. Mori, N. Kamiyama, R. Kawahara, and T. Takahashi
    ``Traffic Engineering of Peer-assisted Content Delivery Network with Content-oriented Incentive Mechanism,''
    IEICE Transactions on Information Systems Vol. E95-D, No. 12, pp. 2860-2869, Dec. 2012. [IEICE]
  10. R. Kawahara, T. Mori, T. Yada, and N. Kamiyama,
    ``Analyzing and Reducing the Impact of Traffic on Large-Scale NAT,''
    IEICE Transactions on Communications, Vol.E95-B, No. 09,pp. 2815-2827, Sep. 2012. [IEICE]
  11. A. Shimoda, T. Mori, and S. Goto,
    ``Extended Darknet: Multi-Dimensional Internet Threat Monitoring System,''
    IEICE Transactions on Communications Vol. E95-B, No. 06, pp. 1915-1923, June 2012. [PDF] Copyright © IEICE
  12. K. Ishibashi, R. Kawahara, T. Mori, T. Kondoh, and S. Asano,
    ``Effects of Sampling and Spatio/Temporal Granularity in Traffic Monitoring on Anomaly Detectability,''
    IEICE Transactions on Communications Vol. E95-B, No. 02, pp. 466-476, Feburary 2012. [IEICE]
    An earlier version of this paper was presented at IEEE Global Inernet Symposium 2007
  13. R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and S. Asano
    ``Detection accuracy of network anomalies using sampled flow statistics,''
    International Journal of Network Management (IJNM), vol. 21, issue 6, pages 513--535, November/December 2011 [Wiley]
  14. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
    ``Analyzing Influence of Network Topology on Designing ISP-Operated CDN,''
    Telecommunication Systems (2 September 2011), pp. 1-9, [Springer]
    An earlier version of this paper was presented at IEEE NETWORKS 2010.
  15. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Parallel video streaming optimizing network throughput ,''
    Elsevier Computer Communications, vol. 34, issue 10, July 2011, Pages 1182--1194 [Elsevier] [bibtex]
  16. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Optimally designing caches to reduce P2P traffic,''
    Elsevier Computer Communications, vol. 34, Issue 7, 16 May 2011, pages 883--897, [Elsevier] [bibtex]
  17. R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, and H. Yoshino
    ``Packet sampling TCP flow rate estimation and performance degradation detection method,''
    IEICE Transactions 91-B(5): 1309-1319 (2008) [IEICE] [bibtex]
    An earlier version of this paper was presented at IEEE GLOBECOM 2006
  18. K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, and H. Sakamoto,
    ``Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection,''
    IEICE Transactions 91-B(5): 1331-1339 (2008) [IEICE] [bibtex]
    An earlier version of this paper was presented at IEEE NetDB 2006
  19. T. Mori, T. Takine, J. Pan, R. Kawahara. M. Uchida, and S. Goto,
    ``Identifying Heavy-Hitter Flows From Sampled Flow Statistics,'' (Best Paper Award)
    IEICE Transactions on Communications, Voll. E90-B, No. 11, pp. 3061--3072, November 2007 [PDF] [IEICE] [bibtex] [Google Scholar]
    An earlier version of this paper was presented at ACM/USENIX IMC 2004. The original work has been cited by these work and sflow's packet sampling theory site.
  20. S. Kamei, M. Uchida, T. Mori, and Y. Takahashi,
    ``Estimating scale of peer-to-peer file sharing applications using multilayer partial measurement,''
    Electronics and Communications in Japan (Part I: Communications) Volume 90, Issue 3, Date: March 2007, Pages: 54-63 [Wiley] [Google Scholar]
  21. R. Kawahara, K. Ishibashi, T. Mori, T. Ozawa and T. Abe,
    ``Method of Bandwidth Dimensioning and Management for Aggregated TCP Flows with Heterogeneous Access Links,''
    IEICE Trans. Commun., vol.E88-B, no.12, pp.4605-4615, Dec. 2005. [IEICE] [bibtex]
  22. T. Mori, M. Uchida and S. Goto,
    ``Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-peer,''
    Systems and Computers in Japan, Volume 36, Issue 11, Pages 70 -- 81, 2005 (DOI: 10.1002/scj.20283) [IEICE] [bibtex] [Google Scholar]
  23. T. Mori, R. Kawahara, S. naito and S. Goto,
    ``On the Characteristics of Internet Traffic Variability: Spikes and Elephants,''
    IEICE Transactions on Information and Systems, Vol. E87-D, No. 12, pp. 2644-2653, Dec. 2004 [IEICE] [wikipedia] [bibtex] [Google Scholar]

Refereed Conference/Workshop Proceedings

  1. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto
    ``SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs''
    Proc. Traffic Monitoring and Analysis workshop (TMA 2015), Apr. 2015. (to appear)
  2. A. Fujino, J. Murakami, and T. Mori
    ``Discovering Similar Malware Samples Using API Call Topics''
    Proceedings of the 2015 IEEE Consumer Communications and Networking Conference (CCNC 2015). pp. 146--153, Jan 2015 [IEEE Xplore][bibtex][PDF][slide] (Note: paper PDF is the accepted version, not the final published version, see the IEEE web)
  3. N. Kamiyama, R. Kawahara, and T. Mori,
    ``Loss Recovery Method for Content Pre-distribution in VoD Service,''
    Proc. World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
  4. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto,
    ``Spatio-temporal Factorization of Log Data for Understanding Network Events,''
    Proc. IEEE INFOCOM 2014, May 2014 [bibtex][PDF] (accepted version, not the final published version, see the IEEE web)
  5. N. Maki, R. Shinkuma, T. Mori, N. Kamiyama, and R. Kawahara,
    ``A Periodic Combined-Content Distribution Mechanism in Peer-Assisted Content Delivery Networks,''
    ITU-T Kaleidoscope conference, April 2013.
  6. N. Maki, T. Nishio, R. Shinkuma, T. Takahashi, T. Mori, N. Kamiyama, and R. Kawahara,
    ``Expected Traffic Reduction by Content-oriented Incentive in Peer-assisted Content Delivery Networks,''
    Proc. International Conference on Information Networking (ICOIN 2013), Jan. 2013. [IEEE Xplore]
  7. D. Chiba, K. Tobe, T. Mori, and S. Goto,
    ``Detecting Malicious Websites by Learning IP Address Features,''
    Proc. IEEE/IPSJ SAINT 2012, July 2012 [IEEE Xplore][bibtex]
  8. N. Kamiyama, T. Mori, and R. Kawahara,
    ``Autonomic Load Balancing for Flow Monitoring,''
    Proc. IEEE ICC 2012, June 2012 [PDF]
  9. T. Mori, Y. Takahashi, K. Sato, and K. Ishibashi
    ``How is E-mail Sender Authentication Used and Misused?,''
    Proc. 8th Conference on Email and Anti-spam (CEAS 2011), Perth, WA, Australia, Sep. 2011 [PDF] [ACM portal] [bibtex]
  10. Y. Takata, S. Goto, T. Mori,
    ``Analysis of Redirection Caused by Web-based Malware,''
    APAN 32nd Meeting, Network Research Workshop 2011, August 2011. (Best Student Paper Award) [PDF]
  11. R. Kawahara, S. Harada, N. Kamiyama, T. Mori, and H. Hasegawa,
    ``Traffic engineering using overlay network,''
    Proc. IEEE ICC 2011, Kyoto, Japan, June 2011. [IEEE Xplore] [PDF] [bibtex]
  12. N. Kamiyama, R. Kawahara, T. Mori, and H. Hasegawa,
    ``Limiting pre-distribution and clustering users on multicast pre-distribution VoD,''
    Proc. IEEE IM 2011, 706--709, Dublin, Ireland, May 2011 [IEEE Xplore] [bibtex]
  13. R. Kawahara, N. Kamiyama, T. Mori, and H. Hasegawa,
    ``Performance evaluation of peer-assisted content distribution,''
    Proc. IEEE CCNC 2011, Las Vegas, US, Jan 2011. [IEEE Xplore]
  14. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
    ``Analyzing Influence of Network Topology on Designing ISP-Operated CDN,''
    Proc. IEEE NETWORKS 2010, Walsaw, Poland, Sep 2010. [IEEE Xplore]
  15. K. Ishibashi, T. Kondoh, S. Harada, T. Mori, and R. Kawahara,
    ``Detecting Anomalous Traffic using Communication Graphs,''
    World Telecommunications Congress 2010 (WTC2010), Vienna, Austria, September 2010. [IEEE Xplore]
  16. A. Shimoda, T. Mori, and S. Goto,
    ``Sensor in the Dark: Building Untraceable Large-scale Honeypots using Virtualization Technologies,''
    Proc. IEEE/IPSJ SAINT 2010, pp. 22--30, Seoul, South Korea, July 2010. (Best Student Paper Award) [pdf] [IEEE Xplore] [bibtex]
  17. T Mori,H. Esquivel, A. Akella, A. Shimoda, and S. Goto
    ``Understanding Large-Scale Spamming Botnets From Internet Edge Sites,''
    Proc. Seventh Conference on Email and Anti-spam (CEAS 2010), Redmond, Washington, USA, Jul. 2010 [PDF][slide][poster]
  18. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic,''
    Proc. IEEE ICC 2010, pp. 1--6, Cape Town, South Africa, May 2010. [IEEE Xplore]
  19. T. Mori, R. Kawahara, H. Hasegawa, and S. Shimogawa
    ``Characterizing traffic flows originating from large-scale video sharing services,''
    Proc. COST Traffic Monitoring and Analysis (TMA) workshop 2010, pp. 17-31, Springer-Verlag LNCS 6003, Zurich, Switzerland, Apr. 2010.
    [PDF] [Springer] [Google Book] [slide] [talk] [bibtex] [Google Scholar] (notice: I really don't recommend you to spend your time on watching the movie, though...)
  20. N. Kamiyama, R. Kawahara, T. Mori, S. Harada, and H. Hasegawa
    ``Impact of Topology on Parallel Video Streaming,''
    Proc. IEEE/IFIP NOMS 2010, pp. 607--614, Osaka, Japan, Apr 2010. [IEEE Xplore]
  21. H. Esquivel, T. Mori, and A. Akella
    ``On the Effectiveness of IP reputation for Spam Filtering,''
    Proc. IEEE/ACM COMSNETS 2010, pp. 40--49, Bengalooru, India, Jan. 2010. (Best Paper Award) [paper][slide][CiteSeer][ACM portal][bibtex][Google Scholar]
  22. T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and R. Kawahara,
    ``Improving deployability of peer-assisted CDN platform with incentive,''
    Proc. IEEE GLOBECOM 2009, pp. 1-7, Honolulu, HI, USA., Dec. 2009 [pdf] [slide] [ACM portal] [bibtex] [Google Scholar]
  23. H. Esquivel, T. Mori, and A. Akella
    ``Router-Level Spam Filtering Using TCP Fingerprints: Architecture and Measurement-Based Evaluation,''
    Proc. Sixth Conference on Email and Anti-spam (CEAS 2009), Mountain View, CA, USA, Jul. 2009 [paper] [CiteSeer] [Google Scholar]
  24. R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and H. Hasegawa,
    ``Adaptive bandwidth control to handle long-duration large flows,''
    Proc. IEEE ICC 2009 Next Generation Networking Symposium, pp. 1--6, Dresden, Germany, June 2009. [IEEE Xplore] [bibtex]
  25. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Hasegawa
    ``ISP-Operated CDN,''
    IEEE Global Internet Symposium 2009, Apr. 2009. [IEEE Xplore] [Google Scholar]
  26. K. Ishibashi, T. Mori, S. Harada, T. Kondoh, R. Kawahara, and S. Asano,
    ``Detecting Anomalies in Inter-hosts Communication Graph,''
    CERT FloCon 2009, Jan. 2009 [paper]
  27. S. Harada, R. Kawahara, T. Mori, N. Kamiyama, S. Hasegawa, and H. Yoshino
    ``A method of detecting network anomalies in cyclic traffic',''
    Proc. IEEE GLOBECOM 2008, pp. 2057-2061, New Orleans, LA, USA Dec., 2008. [PDF] [IEEE Xplore] [bibtex] [Google Scholar]
  28. N. Kamiyama, T. Mori, R. Kawahara, and S. Harada,
    ``Optimum Identification of Worm-Infected Hosts,''
    Proc. IEEE IPOM 2008, Samos Island, Greece, Sep., 2008. [ACM portal]
  29. N. Kamiyama, T. Mori, R. Kawahara, S. Harada, and H. Yoshino
    ``Extracting Worm-Infected Hosts Using White List,''
    IEEE/IPSJ SAINT 2008, Turku, FINLAND, Aug., 2008. [IEEE Xplore]
  30. R. Kawahara, K. Ishibashi, T. Mori, N. Kamiyama, and S. Asano
    ``Detection accuracy of network anomalies using sampled flow statistics''
    IEEE GLOBECOM 2007, Washington, D.C., USA, November 2007. [IEEE Xplore]
  31. N. Kamiyama, T. Mori, R. Kawahara, and E. K. Lua
    ``Efficient Timeout Checking Mechanism for Traffic Control,''
    IEEE ICCCN 2007, Honolulu, Hawaii, USA, Aug 2007 [IEEE Xplore]
  32. K. Ishibashi, R. Kawahara, T. Mori, and R. Kawahara
    ``Effect of sampling rate and monitoring granularity on anomaly detectability,''
    IEEE Global Inernet Symposium 2007 Minisymposia, Anchorage, Alaska, USA, May 2007. [PDF] [IEEE Xplore] [Google Scholar]
  33. N. Kamiyama, T. Mori, and R. Kawahara
    ``Simple and Adaptive Identification of Superspreaders by Flow Sampling,''
    Proc. IEEE INFOCOM 2007 Minisymposia, pp. 2481-2485, Anchorage, Alaska, USA, May 2007. [abstract][bibtex][Google Scholar]
  34. T. Mori, R. Kawahara, N. Kamiyama, and S. Harada
    ``Inferring original traffic pattern from sampled flow statistics,''
    IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007. [abstract][paper][bibtex]
  35. R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and S. Asano
    ``A study on detecting network anomalies using sampled flow statistics,''
    IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007. [abstract] [Google Scholar]
  36. K. Ishibashi, T. Mori, R. Kawahara, K. Toyama, S. Osawa, and S. Asano,
    ``2-D Bitmap for Summarizing Inter-Host Communication Pattern,''
    IEEE/IPSJ SAINT 2007 Workshop on Internet Measurement Technology, Hiroshima, Japan, January 2007. [IEEE Xplore]
  37. R. Kawahara, T. Mori, Keisuke Ishibashi, Noriaki Kamiyama and Takeo Abe,
    ``Estimating flow rate from sampled packet streams for detection of performance degradation at TCP flow level,''
    Proc. IEEE GLOBECOM 2006, pp. 1--6, San Francisco, USA, December 2006. [IEEE Xplore]
  38. R. Kawahara, T. Mori, and T. Abe,
    ``QoS control to handle long-duration large flows and its performance evaluation,''
    Proc. IEEE ICC 2006, Istanbul, Turkey, June 2006. [IEEE Xplore]
  39. K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, and H. Sakamoto,
    ``Estimating Top-N Hosts in Cardinality,''
    Proc. 2nd IEEE International Workshop on Networking Meets Databases (NetDB'06), Atlanta, GA, USA, April 2006. [IEEE Xplore] [Google Scholar]
  40. N. Kamiyama and T. Mori,
    ``Simple and Accurate Identification of High-Rate Flows by Packet Sampling,''
    Proc. IEEE INFOCOM 2006, pp. 2836-2848, Barcelona, Spain, April 2006. [PDF] [IEEE Xplore] [bibtex] [Google Scholar]
  41. R. Kawahara, K. Ishibashi, T. Mori, and T. Abe,
    ``A Method of Detecting Performance Degradation at TCP Flow Level from Sampled Packet Streams,''
    Proc. IEEE High Performance Switching and Routing (HPSR) 2005, pp. 157--161, HongKong, China, May 2005. [IEEE Xplore] [Google Scholar]
  42. T. Mori, M. Uchida, R. Kawahara, J. Pan and S. Goto,
    ``Identifying elephant flows through periodically sampled packets,''
    Proc. ACM/USENIX IMC 2004, pp. 115-120, Taormina, Italiy, October 2004. [PDF] [ACM portal] [bibtex] [Google Scholar]
  43. R. Kawahara, T. Mori, S. Sumita, and T. Abe,
    ``A scalable form of QoS control that handles long-duration P2P flows,''
    XIX World Telecommunications Congress (WTC/ISS 2004), 2004.
  44. R. Kawahara, K. Ishibashi, T. Mori, T. Ozawa, S. Sumita, and T. Abe,
    ``A method of bandwidth dimensioning and management for aggregated TCP flows with heterogeneous access links,''
    Proc. 11th International Telecommunications Network Strategy and Planning Symposium, pp.15-20, June, 2004. [IEEE Xplore] [Google Books]
  45. T. Mori, R. Kawahara, S. Naito and S. Goto,
    ``On the Characteristics of Internet Traffic Variability: Spikes and Elephants,''
    IEEE/IPSJ SAINT 2004, pp. 99-106, Tokyo, Japan, 2004 [PDF] [IEEE Xplore] [slide] [wikipedia] [bibtex] [Google Scholar]
    The conference paper was developed into a full journal article.

Technical Reports

  1. Tatsuya Mori, Holly Esquivel, Aditya Akella, Akihiro Shimoda, and Shigeki Goto,
    ``Understanding the World's Worst Spamming Botnet,''
    The University of Wisconsin-Madison Computer Sciences Tech Reports TR1660, June 2009 [paper|abstract]
  2. Tatsuya Mori, Holly Esquivel, Aditya Akella, Z. Morley Mao, Yinglian Xie, and Fang Yu,
    ``On the Effectiveness of Pre-Acceptance Spam Filtering,''
    The University of Wisconsin-Madison Computer Sciences Tech Reports TR1650, Feb. 2009 [paper|abstract]
  3. T. Mori and R. Kawahara,
    ``A study on the marginal distribution of network traffic,''
    IEICE Technical Report, IN2001-107, pp. 1-7, (2001-11)

Other talks

  1. T. Mori, A. Nakao, N. Kamiyama, H. Hasegawa, and R. Kawahara
    ``Toward scalable byte caching on high-speer routers,''
    IEICE Society Conference 2009, BS-5-6, September 2009.
  2. T. Mori, N. Kamiyama, S. Harada, H. Hasegawa, and R. Kawahara,
    ``How Incentive Helps In Making Peer-assisted CDN Deployable?,''
    IEICE General Conference BS-4-14, March 2009
  3. T. Mori,
    ``A robust approach of detecting anomalous hosts,''
    Intimate 2006, Network Anomaly Diagnosis Workshop, Paris, France, July 2006. (invited) [slide]
  4. T. Mori, R. Kawahara, and N. Kamiyama,
    ``A simple and scalable detector of heavy-hitter flows,''
    Sampling Workshop 2005, Paris, France, July 2005. (invited)
  5. T. Mori,
    ``Detecting Abusive Traffic Flows in Very High-Speed Networks,''
    Joint Workshop of the Core University Program and JSPS 163rd Committee on Next Generation Internet Technology, Daejong, Korea, Nov. 2004.
  6. T. Mori, R. Kawahara and S. Naito,
    ``Analysis of Non-Gaussian Nature of Network Traffic,'' [preprint]
    IEICE General Conference 2002, SB-13-5, (2002-03)
  7. T. Mori and R. Kawahara,
    ``Is Hurst parameter sufficient for evaluating the performance of bursty traffic?,''
    IEICE Society Conference 2001, SB-10-3, (2001-09) [Science Links Japan] [Google Scholar]

Tatsuya Mori
E-mail: click here to reveal my e-mail address (reCAPTCHA)