1-10hit |
Tomoyuki SASAKI Hidehiro NAKANO
Particle swarm optimization (PSO) is a swarm intelligence algorithm and has good search performance and simplicity in implementation. Because of its properties, PSO has been applied to various optimization problems. However, the search performance of the classical PSO (CPSO) depends on reference frame of solution spaces for each objective function. CPSO is an invariant algorithm through translation and scale changes to reference frame of solution spaces but is a rotationally variant algorithm. As such, the search performance of CPSO is worse in solving rotated problems than in solving non-rotated problems. In the reference frame invariance, the search performance of an optimization algorithm is independent on rotation, translation, or scale changes to reference frame of solution spaces, which is a property of preferred optimization algorithms. In our previous study, piecewise-linear particle swarm optimizer (PPSO) has been proposed, which is effective in solving rotated problems. Because PPSO particles can move in solution spaces freely without depending on the coordinate systems, PPSO algorithm may have rotational invariance. However, theoretical analysis of reference frame invariance of PPSO has not been done. In addition, although behavior of each particle depends on PPSO parameters, good parameter conditions in solving various optimization problems have not been sufficiently clarified. In this paper, we analyze the reference frame invariance of PPSO theoretically, and investigated whether or not PPSO is invariant under reference frame alteration. We clarify that control parameters of PPSO which affect movement of each particle and performance of PPSO through numerical simulations.
Koji NAKAO Katsunari YOSHIOKA Takayuki SASAKI Rui TANABE Xuping HUANG Takeshi TAKAHASHI Akira FUJITA Jun'ichi TAKEUCHI Noboru MURATA Junji SHIKATA Kazuki IWAMOTO Kazuki TAKADA Yuki ISHIDA Masaru TAKEUCHI Naoto YANAI
In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed malware removal methods to be provided to IoT device users. Furthermore, as attack behaviors using IoT devices become more diverse and sophisticated every year, we conducted research related to various factors involved in understanding the overall picture of attack behaviors from the perspective of incident responders. As the final stage of countermeasures, we also conducted research and development of IoT malware disabling technology to stop only IoT malware activities in IoT devices and IoT system disabling technology to remotely control (including stopping) IoT devices themselves.
Takayuki SASAKI Mami KAWAGUCHI Takuhiro KUMAGAI Katsunari YOSHIOKA Tsutomu MATSUMOTO
In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.
Koji KOTANI Takumi BANDO Yuki SASAKI
A photovoltaic (PV)-assisted CMOS rectifier was developed for efficient energy harvesting from ambient radio waves as one example of the synergistic energy harvesting concept. The rectifier operates truly synergistically. A pn junction diode acting as a PV cell converts light energy to DC bias voltage, which compensates the threshold voltage (Vth) of the MOSFETs and enhances the radio frequency (RF) to DC power conversion efficiency (PCE) of the rectifier even under extremely low input power conditions. The indoor illuminance level was sufficient to generate gate bias voltages to compensate Vths. Although the same PV cell structure for biasing nMOS and pMOS transistors was used, photo-generated bias voltages were found to become unbalanced due to the two-layered pn junction structures and parasitic bipolar transistor action. Under typical indoor lighting conditions, a fabricated PV-assisted rectifier achieved a PCE greater than 20% at an RF input power of -20dBm, a frequency of 920MHz, and an output load of 47kΩ. This PCE value is twice the value obtained by a conventional rectifier without PV assistance. In addition, it was experimentally revealed that if symmetric biasing voltages for nMOS and pMOS transistors were available, the PCE would increase even further.
The measuring and display system for a merathon TV program employing a realtime image processor and a fast graphic processor has been developed. The system consists of two parts, the step frequency subsystem and the Computer Graphic display subsystem. In the first subsystem, the step frequency for a marathon runner is detected from the image signal by tracking the motion of the runner's face. In the second subsystem, the data for the position of each joint in the runner's leg are prepared beforehand. By applying the step frequency to those prepared data, the runner's motion is drawn out as an animation.
Takayuki SASAKI Carlos HERNANDEZ GAÑÁN Katsunari YOSHIOKA Michel VAN EETEN Tsutomu MATSUMOTO
Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load balancing using a content delivery network, have been proposed; unfortunately, these are symptomatic treatments rather than fundamental solutions. In this paper, we propose a novel technique to disincentivize attackers from launching a DDoS attack by increasing attack costs. Assuming financially motivated attackers seeking to gain profit via DDoS attacks, their primary goal is to maximize revenue. On the basis of this assumption, we also propose a mitigation solution that requires mining cryptocurrencies to access servers. To perform a DDoS attack, attackers must mine cryptocurrency as a proof-of-work (PoW), and the victims then obtain a solution to the PoW. Thus, relative to attackers, the attack cost increases, and, in terms of victims, the economic damage is compensated by the value of the mined coins. On the basis of this model, we evaluate attacker strategies in a game theory manner and demonstrate that the proposed solution provides only negative economic benefits to attackers. Moreover, we implement a prototype to evaluate performance, and we show that this prototype demonstrates practical performance.
Tomoyuki SASAKI Hidehiro NAKANO Arata MIYAUCHI Akira TAGUCHI
Particle swarm optimizer network (PSON) is one of the multi-swarm PSOs. In PSON, a population is divided into multiple sub-PSOs, each of which searches a solution space independently. Although PSON has a good solving performance, it may be trapped into a local optimum solution. In this paper, we introduce into PSON a dynamic stochastic network topology called “PSON with stochastic connection” (PSON-SC). In PSON-SC, each sub-PSO can be connected to the global best (gbest) information memory and refer to gbest stochastically. We show clearly herein that the diversity of PSON-SC is higher than that of PSON, while confirming the effectiveness of PSON-SC by many numerical simulations.
Tomoyuki SASAKI Hidehiro NAKANO Arata MIYAUCHI Akira TAGUCHI
In this paper, we propose a new paradigm of deterministic PSO, named piecewise-linear particle swarm optimizer (PPSO). In PPSO, each particle has two search dynamics, a convergence mode and a divergence mode. The trajectory of each particle is switched between the two dynamics and is controlled by parameters. We analyze convergence condition of each particle and investigate parameter conditions to allow particles to converge to an equilibrium point through numerical experiments. We further compare solving performances of PPSO. As a result, we report here that the solving performances of PPSO are substantially the same as or superior to those of PSO.
Tomoyuki SASAKI Hidehiro NAKANO Arata MIYAUCHI Akira TAGUCHI
This paper presents a particle swarm optimization network (PSON) to improve the search capability of PSO. In PSON, multi-PSOs are connected for the purpose of communication. A variety of network topology can be realized by varying the number of connected PSOs of each PSO. The solving performance and convergence speed can be controlled by changing the network topology. Furthermore, high parallelism is can be realized by assigning PSO to single processor. The stability condition analysis and performance of PSON are shown.
Hiroki WAKATSUCHI Masahiro HANAZAWA Soichi WATANABE Atsuhiro NISHIKATA Masaki KOUZAI Masami KOJIMA Yoko YAMASHIRO Kazuyuki SASAKI Osamu HASHIMOTO
We measured the complex permittivities of whole blood and blood plasma in quasi millimeter and millimeter wave bands using a coaxial probe method. The validity of these measurements was confirmed by comparing with those of a different measurement method, i.e., a dielectric tube method. It is shown that the complex permittivities of the blood samples are similar to those of water in quasi millimeter and millimeter wave bands. Furthermore, the temperature dependences of the complex permittivities of the samples were measured.