-
mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations
Authors:
Toyotaro Suzumura,
Akiyoshi Sugiki,
Hiroyuki Takizawa,
Akira Imakura,
Hiroshi Nakamura,
Kenjiro Taura,
Tomohiro Kudoh,
Toshihiro Hanawa,
Yuji Sekiya,
Hiroki Kobayashi,
Shin Matsushima,
Yohei Kuga,
Ryo Nakamura,
Renhe Jiang,
Junya Kawase,
Masatoshi Hanai,
Hiroshi Miyazaki,
Tsutomu Ishizaki,
Daisuke Shimotoku,
Daisuke Miyamoto,
Kento Aida,
Atsuko Takefusa,
Takashi Kurimoto,
Koji Sasayama,
Naoya Kitagawa
, et al. (8 additional authors not shown)
Abstract:
The growing amount of data and advances in data science have created a need for a new kind of cloud platform that provides users with flexibility, strong security, and the ability to couple with supercomputers and edge devices through high-performance networks. We have built such a nation-wide cloud platform, called "mdx" to meet this need. The mdx platform's virtualization service, jointly operat…
▽ More
The growing amount of data and advances in data science have created a need for a new kind of cloud platform that provides users with flexibility, strong security, and the ability to couple with supercomputers and edge devices through high-performance networks. We have built such a nation-wide cloud platform, called "mdx" to meet this need. The mdx platform's virtualization service, jointly operated by 9 national universities and 2 national research institutes in Japan, launched in 2021, and more features are in development. Currently mdx is used by researchers in a wide variety of domains, including materials informatics, geo-spatial information science, life science, astronomical science, economics, social science, and computer science. This paper provides an the overview of the mdx platform, details the motivation for its development, reports its current status, and outlines its future plans.
△ Less
Submitted 26 March, 2022;
originally announced March 2022.
-
Classification of URL bitstreams using Bag of Bytes
Authors:
Keiichi Shima,
Daisuke Miyamoto,
Hiroshi Abe,
Tomohiro Ishihara,
Kazuya Okada,
Yuji Sekiya,
Hirochika Asai,
Yusuke Doi
Abstract:
Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other appr…
▽ More
Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other approaches try to use machine learning (ML) techniques by extracting features from URL strings. This approach can cover a wider area of Internet web sites, but finding good features requires deep knowledge of trends of web site design. Recently, another approach using deep learning (DL) has appeared. The DL approach will help to extract features automatically by investigating a lot of existing sample data. Using this technique, we can build a flexible filtering decision module by keep teaching the neural network module about recent trends, without any specific expert knowledge of the URL domain. In this paper, we apply a mechanical approach to generate feature vectors from URL strings. We implemented our approach and tested with realistic URL access history data taken from a research organization and data from the famous archive site of phishing site information, PhishTank.com. Our approach achieved 2~3% better accuracy compared to the existing DL-based approach.
△ Less
Submitted 11 November, 2021;
originally announced November 2021.
-
Classifying DNS Servers based on Response Message Matrix using Machine Learning
Authors:
Keiichi Shima,
Ryo Nakamura,
Kazuya Okada,
Tomohiro Ishihara,
Daisuke Miyamoto,
Yuji Sekiya
Abstract:
Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however,…
▽ More
Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however, is a non-trivial operation. In this paper, we propose a detection mechanism for DNS servers used as reflectors by using a DNS server feature matrix built from a small number of packets and a machine learning algorithm. The F1 score of bad DNS server detection was more than 0.9 when the test and training data are generated within the same day, and more than 0.7 for the data not used for the training and testing phase of the same day.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Flops and mutations for crepant resolutions of polyhedral singularities
Authors:
Alvaro Nolla de Celis,
Yuhi Sekiya
Abstract:
Let $G$ be a polyhedral group $G\subset SO(3)$ of types $\mathbb{Z}/n\mathbb{Z}$, $D_{2n}$ and $\mathbb{T}$. We prove that there exists a one-to-one correspondence between flops of $G$-Hilb$\mathbb{C}^3$ and mutations of the McKay quiver with potential which do not mutate the trivial vertex. This correspondence provides two equivalent methods to construct every projective crepant resolution for th…
▽ More
Let $G$ be a polyhedral group $G\subset SO(3)$ of types $\mathbb{Z}/n\mathbb{Z}$, $D_{2n}$ and $\mathbb{T}$. We prove that there exists a one-to-one correspondence between flops of $G$-Hilb$\mathbb{C}^3$ and mutations of the McKay quiver with potential which do not mutate the trivial vertex. This correspondence provides two equivalent methods to construct every projective crepant resolution for the singularities $\mathbb{C}^3/G$, which are constructed as moduli spaces $\mathcal{M}_C$ of quivers with potential for some chamber $C$ in the space $Θ$ of stability conditions. In addition, we study the relation between the exceptional locus in $\mathcal{M}_C$ with the corresponding quiver $Q_C$, and we describe explicitly the part of the chamber structure in $Θ$ where every such resolution can be found.
△ Less
Submitted 25 July, 2015; v1 submitted 11 August, 2011;
originally announced August 2011.
-
Tilting theoretical approach to moduli spaces over preprojective algebras
Authors:
Yuhi Sekiya,
Kota Yamaura
Abstract:
We apply tilting theory over preprojective algebras $Lambda$ to a study of moduli space of $Lambda$-modules. We define the categories of semistable modules and give an equivalence, so-called reflection functors, between them by using tilting modules over $Lambda$. Moreover we prove that the equivalence induces an isomorphism of algebraic varieties between moduli spaces. In particular, we study in…
▽ More
We apply tilting theory over preprojective algebras $Lambda$ to a study of moduli space of $Lambda$-modules. We define the categories of semistable modules and give an equivalence, so-called reflection functors, between them by using tilting modules over $Lambda$. Moreover we prove that the equivalence induces an isomorphism of algebraic varieties between moduli spaces. In particular, we study in the case when the moduli spaces related to the Kleinian singularity. We generalize a result of Crawley-Boevey which is known another proof of the McKay correspondence of Ito-Nakamura type.
△ Less
Submitted 18 January, 2011; v1 submitted 26 August, 2010;
originally announced August 2010.