近藤 賢郎 (コンドウ タカオ)

Kondo, Takao

写真a

所属(所属キャンパス)

研究所・センター等 情報セキュリティインシデント対応チーム (三田)

職名

助教(有期)

HP

その他の所属・職名 【 表示 / 非表示

  • 慶應義塾大学 KMD 研究所, リサーチャー

  • 慶應義塾大学 SFC 研究所, 上席所員

  • 慶應義塾大学 サイバーセキュリティ研究センター, 所員

経歴 【 表示 / 非表示

  • 2013年04月
    -
    2017年03月

    慶應義塾大学大学院理工学研究科, 研究員

  • 2017年04月
    -
    継続中

    慶應義塾, インフォメーションテクノロジーセンター本部, 助教

学歴 【 表示 / 非表示

  • 2009年04月
    -
    2013年03月

    慶應義塾, 理工学部, 情報工学科

    大学, 卒業

  • 2013年04月
    -
    2015年03月

    慶應義塾, 大学院理工学研究科

    大学院, 修了, 博士前期

  • 2015年04月
    -
    2016年03月

    慶應義塾, 大学院医学研究科

    大学院, 修了, 博士前期

 

研究分野 【 表示 / 非表示

  • 情報ネットワーク

  • 情報セキュリティ

研究キーワード 【 表示 / 非表示

  • インターネット,分散システム

  • サイバーセキュリティ

 

論文 【 表示 / 非表示

  • GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN

    Wakui T., Kondo T., Teraoka F.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))  12081 LNCS   196 - 211 2020年

    ISSN  9783030457778

     概要を見る

    © 2020, IFIP International Federation for Information Processing. This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Path Aggregate without Labeled data). GAMPAL does not require labeled data to achieve a general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Routing Information Base), GAMPAL introduces path aggregates. The BGP RIB entries are classified into the path aggregates, each of which is identified with the first three AS numbers in the AS_PATH attribute. GAMPAL establishes a prediction model of traffic throughput based on past traffic throughput. It adopts the LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model focusing on periodicity in weekly scale of the Internet traffic pattern. The validity of GAMPAL is evaluated using the real traffic information and the BGP RIB exported from the WIDE backbone network (AS2500), a nation-wide backbone network for research and educational organizations in Japan. As a result, GAMPAL successfully detects traffic increases due to events and DDoS attacks targeted to a stub organization.

  • LiON: A L3 protocol agnostic experimental network construction tool based on infrastructure as code

    Hayashi K., Watanabe H., Kondo T., Teraoka F.

    2019 6th International Conference on Software Defined Systems, SDS 2019 (2019 6th International Conference on Software Defined Systems, SDS 2019)     64 - 71 2019年06月

    ISSN  9781728107226

     概要を見る

    © 2019 IEEE. An experimental network environment plays an important role to examine new protocols and systems. This paper proposes an IaC (Infrastructure as Code) based tool called LiON (Lightweight On-demand Networking) for constructing virtual networks on the Internet for various experiments. For virtual nodes, various types of virtualization technologies such as network namespace, container, and virtual machine are supported. VXLAN is employed for virtual links between virtual nodes. JSON (JavaScript Object Notation) is adopted as the configuration file format, which enables the experimenter to intuitively design virtual network topologies. Layer-3 protocol agnostic experimental networks can be constructed, which enable to examine non-IP protocol stacks. LiON is implemented in Python and shell script. The time for constructing a virtual network slightly increases as the number of virtual nodes increases. TCP throughput of a virtual link is approximately 97 % of that of a physical link.

  • Moclis: A moving cell support protocol based on locator/ID split for 5G system

    Ochiai T., Matsueda K., Kondo T., Takano H., Kimura R., Sawai R., Teraoka F.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E102B ( 8 ) 1649 - 1659 2019年

    ISSN  09168516

     概要を見る

    Copyright © 2019 The Institute of Electronics, Information and Communication Engineers. In LTE (Long Term Evolution) / LTE-Advanced (LTE-A) system, the user-plane for a user equipment (UE) is provided by tunneling, which increases header overhead, processing overhead, and management overhead. In addition, the LTE-A system does not support moving cells which are composed of a mobile Relay Node (RN) and UEs attached to the mobile RN. Although there are several proposals for moving cells in the LTE-A system and the 5G system, all of them rely on tunneling for the user-plane, which means that none of them avoid the tunneling overheads. This paper proposes MocLis, a moving cell support protocol based on a Locator/ID split approach. MocLis does not use tunneling. Nested moving cells are supported. Signaling cost for handover of a moving cell is independent of the number of UEs and nested RNs in the moving cell. A MocLis prototype, implemented in Linux, includes user space daemons and modified kernel. Measurements show that the attachment time and handover time are short enough for practical use. MocLis has higher TCP throughput than the tunneling based approaches.

  • Inserting layer-5 to provide applications with richer functions through common API

    Watanabe H., Kondo T., Kaneko K., Teraoka F.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E101B ( 9 ) 1967 - 1981 2018年09月

    ISSN  09168516

     概要を見る

    © 2018 The Institute of Electronics, Information and Communication Engineers. Recently, application demands placed on the network have become more multifaceted. Highly functional application-to-application communication services such as bandwidth aggregation, fault tolerant communication, and delay/disruption tolerant networking (DTN) were developed independently in the network layer, the transport layer, and the application layer. As a result, protocol layering has become complicated. This paper proposes to insert Layer-5 (L5) between the application layer and the transport layer to separate communication policies and communication mechanisms to make protocol layering clearer. The transport layer (L4) provides end-to-end communication mechanisms such as reliable byte stream while L5 realizes communication policies such as bandwidth aggregation by combining the communication mechanisms in L4. This paper proposes five types of L5-paths as communication policies: (1) the L5 bundled path for bandwidth aggregation or fault tolerant communication, (2) the L5 spatially-spliced path for communication with middleboxes, (3) the L5 temporally-spliced path for DTN, (4) the L5 spliced-bundled path, and (5) the L5 bundled over spatially-spliced path. An application can select and use an appropriate L5-path depending on the network circumstances through a common API. A prototype of L5 is implemented in the Linux user space as a library to make deployment and maintenance easier. An evaluation shows that establishment time of L5-paths is short enough and performance of L5-paths is comparable or superior to existing technologies.

  • ZINK: An efficient information centric networking utilizing layered network architecture

    Kondo T., Yoshihara S., Kaneko K., Teraoka F.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E101B ( 8 ) 1853 - 1865 2018年08月

    ISSN  09168516

     概要を見る

    Copyright © 2018. This paper argues that a layered approach is more suitable for Information CentricNetworking (ICN) than a narrow-waist approach and proposes an ICN mechanism called ZINK. In ZINK, a location-independent content name is resolved to a list of node IDs of content servers in the application layer and a node ID is mapped to a node locator in the network layer, which results in scalable locator-based routing. An ID/Locator split approach in the network layer can efficiently support client/serever mobility. Efficient content transfer is achieved by using sophisticated functions in the transport layer such as multipath transfer for bandwidth aggregation or fault tolerance. Existing well-tuned congestion control in the transport layer achieves fairness not only among ICN flows but also among ICN flows and other flows. A proof-of concept prototype of ZINK is implemented on an IPv6 stack. Evaluation results show that the time for content finding is practical, efficient content transfer is possible by using multipath transfer, and the mobility support mechanism is scalable as shown in a nationwide experiment environment in Japan.

全件表示 >>