Journal for Academic Computing and Networking
Online ISSN : 2433-7595
Print ISSN : 1343-2915
Volume 9 , Issue 1
Showing 1-7 articles out of 7 articles from the selected issue
Original paper
  • Tomohiko Imachi, Toyoji Matsumoto, Masaki Shako, Naoki Nishikawa, Taku ...
    Type: research-article
    2005 Volume 9 Issue 1 Pages 5-13
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS

    In the campus of Kanazawa University, we started to provide wireless network services. For the purpose to keep our information security, our wireless network system requires authentication for each user according to IEEE 802.1X, and the recodes of network connections are kept for each session with the identifier of the user. Wireless stations are placed mainly at classrooms which classes in general education curriculum are held in, and the authentication servers are used by the other department. The locations which the wireless stations are installed include classrooms that accommodate more than 100 students because this system is arranged to be used for e-Learning styled classes. So that, good throughput enough for smooth progress of the classes even though several tens students are connected it at the same time. In this paper, we show the outline of our system, and discuss about the efficiency of it under much crowded conditions.

    Download PDF (2761K)
  • Tomoaki Sato, Masa-aki Fukase
    Type: research-article
    2005 Volume 9 Issue 1 Pages 15-26
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS

    There are so many opportunities in todays campus life that students connect their laptop computers to campus LAN and Internet via access points. It is really indispensable for such network environment to more strengthen the detection of unauthorized computer access, computer virus, worm etc. However, conventional IDS- (Intrusion Detection System)installed software system does not always cover this affair. In order to solve this issue, we have developed an IDS-implemented hardware that operates with low-power consumption. Its application for wireless campus LAN is also described.

    Download PDF (568K)
  • Fumiyoshi Shoji, Takahiro Sumiya, Mitsuo Ishii
    Type: research-article
    2005 Volume 9 Issue 1 Pages 27-36
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS

    In the Hiroshima University the computer system has been replaced at April 2005. The HPC(High Performance Computing) environment using the terminals for education is included in this new system. It is the first attempt in the point of using the idle time of the terminals for education. In this letter, we discuss a technical method to use it as a calculation resource like PC cluster and/or Computational Grid. And we report the detail of the design and the construction of the system introduced into Hiroshima University.

    Download PDF (940K)
  • Kazuyuki YOSHIDA
    Type: research-article
    2005 Volume 9 Issue 1 Pages 37-43
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS

    In recent years, the number of spam mails is increasing rapidly. Mails with computer viruses called mass mail type and mails which are watching for phishing attacks are also increasing. As measures against these spam, we introduced a Mail Account Management System on February 2003, spamassassin on November, 2003 greylisting on April, 2004 and greet pause feature for sendmail in January 2005, and combining them with sendmail on border mail gateway between Oita University's LAN and the Internet. In this paper, I describe the plan of the measure against spam mail, and employment experience.

    Download PDF (133K)
  • Takuya MATSUHIRA, Masaki SHAKO, Tomohiko IMACHI, Naoki NISHIKAWA
    Type: research-article
    2005 Volume 9 Issue 1 Pages 45-53
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS

    Recently, e-mail plays a very important role in the internet community. However, spam mails have become very big problem now. Moreover, a computer virus sends out a large amount of e-mails randomly due to Self-proliferation. In order to deal with these problems, we set up mail scanning softwares to quarantine spam and virus mails. However, there's some possibility to quarantine normal emails by mistake, and detection of those cases were operated with system operator's human eyes. It gives them heavy load. For a solution of this problem, we developed three systems; 1)The system which sends lists of quarantined e-mail to recipients automatically, and recipients can retrieve quarantined e-mails via operation on a web browser. 2)The system which helps us to define spam's filter efficiently. 3)The system which can reject receiving e-mails whose recipient's addresses do not exist and receive lots of spam mails at the gateway of Kanazawa University. We make these systems cooperate and operate them, and then we can reduce the operator's load and user's loss caused by spam and virus mails. In this paper, we describe about the details of those the systems.

    Download PDF (2856K)
  • Masaki SHAKO, Takuya MATUHIRA, Tomohiko IMACHI, Sachiko NAKANO, Naoki ...
    Type: research-article
    2005 Volume 9 Issue 1 Pages 55-62
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS

    In Kanazawa University, we have started to block Spam mail since November, 2003. The present solution on anti SPAM mails was created after trial and error for one and a half year. We judged that this system was fully serving as a Spam mail blocking system to users. We report the statistical analysis result about the Spam filters which is the core of this system.

    Download PDF (420K)
  • Masato MASUYA, Shinichiro KUBOTA, Kenji AOKI, Koichi SHIMOZONO
    Type: research-article
    2005 Volume 9 Issue 1 Pages 63-74
    Published: September 16, 2005
    Released: July 31, 2019
    JOURNALS FREE ACCESS
feedback
Top