|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2008-05-15 15:00 |
Hokkaido |
Future University-Hakodate |
Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic Shigeaki Harada, Ryoichi Kawahara, Noriaki Kamiyama, Tsuyoshi Kondoh, Keisuke Ishibashi (NTT), Shoichiro Asano (NII) NS2008-1 |
To mitigate the anomalous traffic such as DDoS attacks,
it is necessary to accurately identify the anomalous traffic so... [more] |
NS2008-1 pp.1-6 |
NS, CS, IN (Joint) |
2007-09-21 09:30 |
Miyagi |
Tohoku University |
A method of detecting network anomalies for periodic traffic Shigeaki Harada, Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Hideaki Yoshino (NTT) IN2007-59 |
We present a method of detecting network anomalies, such as DDoS attacks and flash crowds, automatically in real time.
... [more] |
IN2007-59 pp.93-98 |
IN |
2007-07-19 15:35 |
Hyogo |
Kobe University |
Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29 |
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] |
IN2007-29 pp.13-18 |
IN |
2007-06-22 14:35 |
Hokkaido |
Future University-Hakodate |
Identifying Worm-Infected Hosts Using White List Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24 |
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] |
IN2007-24 pp.79-84 |
NS, IN (Joint) |
2007-03-08 11:30 |
Okinawa |
Okinawa Convention Center |
Detection accuracy of network anomaly detection using sampled flow statistics Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada (NTT), Shoichiro Asano (NII) IN2006-202 |
We showed so far that network anomalies generating a huge number of
small flows, such as network scans or SYN flooding... [more] |
IN2006-202 pp.131-136 |
NS, IN (Joint) |
2007-03-09 13:10 |
Okinawa |
Okinawa Convention Center |
Traffic Leap Detection for Internet Backbone Yutaka Hirokawa, Kimihiro Yamamoto, Shigeaki Harada, Ryoichi Kawahara (NTT) NS2006-235 |
This paper focus on the Internet Backbone traffic and proposes a method for detecting the Traffic Leaps which are rapid ... [more] |
NS2006-235 pp.403-408 |
IN |
2006-12-15 14:50 |
Osaka |
|
A method of detecting network anomalies and determining their termination. Shigeaki Harada, Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Yutaka Hirokawa, Kimihiro Yamamoto (NTT) IN2006-133 |
Detecting network anomalies such as DDoS attack has become more and more crucial in these days. When we monitor large-sc... [more] |
IN2006-133 pp.115-120 |
CQ, NS, ICM (Joint) |
2006-11-16 13:30 |
Tottori |
Tottori Univ. of Environmental Studies |
A study on detecting network anomalies using sampled flow statistics Ryoichi Kawahara, Tatsuya Mori, Keisuke Ishibashi, Noriaki Kamiyama, Shigeaki Harada (NTT), Shoichiro Asano (NII) NS2006-124 CQ2006-65 TM2006-38 |
[more] |
NS2006-124 CQ2006-65 TM2006-38 pp.7-12(NS), pp.37-42(CQ), pp.7-12(TM) |
CQ, NS, ICM (Joint) |
2006-11-16 13:50 |
Tottori |
Tottori Univ. of Environmental Studies |
Inferring original traffic pattern from sampled flow statistics Tatsuya Mori, Ryoichi Kawahara, Noriaki Kamiyama, Keisuke Ishibashi, Shigeaki Harada (NTT) NS2006-125 CQ2006-66 TM2006-39 |
[more] |
NS2006-125 CQ2006-66 TM2006-39 pp.13-18(NS), pp.43-48(CQ), pp.13-18(TM) |
COMP |
2005-03-18 17:15 |
Tokyo |
Tokyo Institute of Technology |
Online Allocation with Risk Information Shigeaki Harada, Eiji Takimoto, Akira Maruoka (Tohoku Univ.) |
We consider the problem of dynamically apportioning resources among a set of options in a worst-case online framework. T... [more] |
COMP2004-86 pp.105-110 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|