Cyber Resilience

Research Staff

  • Assoc.Prof. Youki Kadobayashi

    Prof.
    Youki Kadobayashi

  • Assoc.Prof. Takeshi Okuda

    Assoc.Prof.
    Daisuke Miyamoto

  • Assist.Prof. Shigeru Kashihara

    Assist.Prof.
    Shigeru Kashihara

  • Assist.Prof. Doudou Fall

    Assist.Prof.
    Doudou Fall

E-mail {youki-k, daisu-mi, shigeru, doudou-f }[at] is.naist.jp

Research Area

We investigate all technical areas of cybersecurity: security standards, malware analysis, security risk assessment, malicious drone detection, DDoS attack detection, memory forensics, phishing, cloud computing security, IPv6 transition mechanism security, etc.; all in order to make the Internet a more resilient infrastructure.

Towards making the Internet cyber-resilient

Information infrastructure attack prevention and mitigations techniques

Reliable communication over mobile networks

Trusted identity management for modern applications and services

Workload measurement and characterization

Construction and management of resilient infrastructures

Security risk assessment (cloud computing, IoT, etc.)

IPv6 transition and verification methodologies

Impacting society through cyber-resiliency

Critical infrastructures security and resiliency

Secure information distribution based on users’ situation

Gamification of cybersecurity

Privacy protection

Internet user experience quality improvement

Learning the effects of cyber-resiliency on humanity

Key Features

The Internet has evolved to become essential to, arguably, all fields of industry and academia. At its inception, the Internet was used for basic electronic communications where users stored, processed, and transferred small amount of data. In the modern era, the Internet encompasses more advanced technologies like social networks, cloud computing, big data, Internet of Things (IoT), augmented and virtual reality etc., in summary, it is becoming the world economy. Simultaneous to the universality of the Internet and its rapid growth, cyber threats are augmenting and globally proliferating at an exponential rate. Additionally, cyber threats are conquering domains like industrial control systems (ICS) that were, until recently, bereft of any types of internet-related security issues. In the Laboratory for Cyber Resilience, our goal is to build an Internet that, while intrinsically vulnerable, can contain any types of cyber-attacks and use the heuristics of the latter to build robust, dependable and more resilient architectures in order to make the cyber platform an environment that promotes efficiency, innovation, economic prosperity, academic development, safety, security and civil liberties.

Fig.1 Evaluation of Risk-Adaptive Authorisation Mechanism

Fig.1 Evaluation of a Risk-Adaptive Authorization Mechanism



Fig.2 PMalicious drone detection

Fig.2 Malicious drone detection



Fig.3 Immobile victim's message propagation among visible victims' device and delivery to the rescuer

Fig.3 Immobile victim's message propagation among visible victims' device and delivery to the rescuer



Fig.4 AUROC value from a pair of normal dataset – VMM-based Anomaly Detection System

Fig.4 AUROC value from a pair of normal dataset – VMM-based Anomaly Detection System