Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Suspicious Processes Detection Scheme using Process Frequency and Network State Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-60 pp.77-82 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |
ICSS |
2015-11-27 14:40 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Suspicious Processes Detection Scheme using Process Frequency Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-45 pp.61-66 |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82 |
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] |
ICSS2014-82 pp.115-120 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
ICSS |
2013-11-12 15:50 |
Fukuoka |
Nishijin Plaza |
Experimental Evaluation of A Botnet Detection Method based on Non-negative Matrix Factorization Yuki Kawamura (Kyushu Univ.), Junpei Shimamura, Junji Nakazato (NICT), Katsunari Yoshioka (Yokohama National Univ.), Masashi Eto, Daisuke Inoue (NICT), Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2013-61 |
[more] |
ICSS2013-61 pp.23-28 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 11:30 |
Hokkaido |
|
Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50 |
[more] |
ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50 pp.381-385 |
IA, ICSS |
2013-06-21 13:50 |
Niigata |
Ao-re Nagaoka |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14 |
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] |
IA2013-14 ICSS2013-14 pp.79-84 |
IA, ICSS |
2013-06-21 14:15 |
Niigata |
Ao-re Nagaoka |
NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15 |
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] |
IA2013-15 ICSS2013-15 pp.85-90 |
ICSS, IA |
2012-06-22 09:25 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
Network Observation and Analysis Report on nicter
-- Transition and Categorization of DDoS Backscatter -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2012-7 ICSS2012-7 |
Since e-commerce progressed quickly, a DDoS attack became a social problem. A lot of rebounding packets called backscatt... [more] |
IA2012-7 ICSS2012-7 pp.37-42 |
IA, ICSS |
2011-06-16 16:35 |
Fukuoka |
Kyushu Institute of Technology |
A Practical Usage of Large-scale Darknet Monitoring for Disaster Recovery Daisuke Inoue, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Koji Nakao (NICT) IA2011-5 ICSS2011-5 |
[more] |
IA2011-5 ICSS2011-5 pp.25-30 |
ICSS |
2011-03-25 16:00 |
Tokyo |
Suspended |
Network Observation and Analysis Report on nicter
-- Transition Analysis of Cyber Attacks Based on Long-term Observation -- Junji Nakazato (NICT), Jumpei Shimamura (For Schooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-65 |
[more] |
ICSS2010-65 pp.53-58 |
ICSS |
2010-03-26 16:20 |
Fukuoka |
The University of Kitakyushu |
Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68 |
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] |
ICSS2009-68 pp.35-39 |
ICSS |
2009-11-13 16:45 |
Miyazaki |
University of Miyazaki |
A classification method for packet generation logic of darknet traffic based on characteristics of packet header Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61 |
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] |
ICSS2009-61 pp.43-48 |
ICSS |
2009-05-15 14:45 |
Hyogo |
Kobe University |
Network Observation and Analysis Report on nicter Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4 |
(To be available after the conference date) [more] |
ICSS2009-4 pp.15-20 |