Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2011-03-25 16:25 |
Tokyo |
Suspended |
Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66 |
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] |
ICSS2010-66 pp.59-64 |
ICSS |
2010-11-05 16:25 |
Hiroshima |
Hiroshima City University |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54 |
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] |
ICSS2010-54 pp.59-64 |
IA, ICSS |
2010-06-17 15:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II) Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6 |
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] |
IA2010-6 ICSS2010-6 pp.31-36 |
ICSS |
2010-03-26 16:20 |
Fukuoka |
The University of Kitakyushu |
Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68 |
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] |
ICSS2009-68 pp.35-39 |
ICSS |
2009-11-13 11:05 |
Miyazaki |
University of Miyazaki |
Similarity Scoring Method of Runtime Packed Malware and its Evaluation Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55 |
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] |
ICSS2009-55 pp.7-12 |
ICSS |
2009-11-13 16:45 |
Miyazaki |
University of Miyazaki |
A classification method for packet generation logic of darknet traffic based on characteristics of packet header Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61 |
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] |
ICSS2009-61 pp.43-48 |
LOIS, IE, ITE-ME, IEE-CMN |
2009-09-25 16:50 |
Hiroshima |
Hiroshima Univ. |
Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80 |
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] |
LOIS2009-39 IE2009-80 pp.119-124 |
IA, ICSS |
2009-06-18 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A study on detection of botnet based on probabilistic dependencies Shintaro Murakami, Hiroki Hamasaki, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ/ISIT), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IA2009-1 ICSS2009-9 |
Damage by malware is becoming more serious. Especally, bots, which are a kind of malware, are a great problem these days... [more] |
IA2009-1 ICSS2009-9 pp.1-6 |
IA, ICSS |
2009-06-18 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13 |
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] |
IA2009-5 ICSS2009-13 pp.25-30 |
IA, ICSS |
2009-06-18 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14 |
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] |
IA2009-6 ICSS2009-14 pp.31-36 |
IA, ICSS |
2009-06-18 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15 |
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] |
IA2009-7 ICSS2009-15 pp.37-42 |
IA, ICSS |
2009-06-18 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16 |
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] |
IA2009-8 ICSS2009-16 pp.43-48 |
IA, ICSS |
2009-06-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Design and Evaluation of NGN/IPv6 Security Test System Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26 |
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more] |
IA2009-18 ICSS2009-26 pp.97-102 |
IA, ICSS |
2009-06-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Study on Classification of Malware and it Applications Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27 |
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] |
IA2009-19 ICSS2009-27 pp.103-108 |
IA, ICSS |
2009-06-19 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28 |
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more] |
IA2009-20 ICSS2009-28 pp.109-114 |
ICSS |
2009-05-15 13:15 |
Hyogo |
Kobe University |
[Special Talk]
Trends of International Standardization in ISO/IEC JTC1/SC27/WG4
-- Trends of Network/Application Security -- Koji Nakao (KDDI) ICSS2009-1 |
[more] |
ICSS2009-1 p.1 |
ICSS |
2009-05-15 14:45 |
Hyogo |
Kobe University |
Network Observation and Analysis Report on nicter Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4 |
(To be available after the conference date) [more] |
ICSS2009-4 pp.15-20 |
WBS, IT, ISEC |
2009-03-10 16:40 |
Hokkaido |
Hakodate Mirai Univ. |
On incident forecasting using independent component alalysis Eisuke Nishino, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-92 ISEC2008-150 WBS2008-105 |
For network security, measures against security incidents of worm infection and DDoS attack are important.In general, pr... [more] |
IT2008-92 ISEC2008-150 WBS2008-105 pp.315-320 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
A study of incident detection based on correlation analysis between network traffic time series Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106 |
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more] |
IT2008-93 ISEC2008-151 WBS2008-106 pp.321-328 |
IN |
2009-02-05 17:10 |
Kagawa |
Kagawa University |
[Invited Talk]
Trend of Security Standardization in ITU-T and future directions for standardization Koji Nakao (KDDI) IN2008-127 |
Although requirement on International standardization activities have not been clear enough, such activities connected w... [more] |
IN2008-127 pp.27-36 |