Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2018-03-02 15:00 |
Miyazaki |
Phoenix Seagaia Resort |
Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more] |
NS2017-237 pp.391-396 |
NS, IN (Joint) |
2018-03-02 15:20 |
Miyazaki |
Phoenix Seagaia Resort |
Method for Generating a Data Set to Detect Cyber Attacks for Autonomous and Distributed Internet Security Infrastructure Yusei Katsura, Hiroyuki Kimiyama (Tokyo Denki Univ.), Akihiro Nakao (Tokyo Univ.), Naoki Yonezaki, Tomoaki Tsutsumi, Kaoru Sano (Tokyo Denki Univ.), Takeshi Okamoto, Mitsuru Maruyama (Kanagawa Institutes of Technology), Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-238 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to protect our resources on... [more] |
NS2017-238 pp.397-401 |
IA, IN (Joint) |
2017-12-15 14:10 |
Hiroshima |
Hiroshima City Univ. |
A study of gini importance-based header feature selection methods for cyber attack detection Yuta Kazato, Yuichi Nakatani, Takeshi Okamoto, Akira Shibata (NTT) IN2017-61 |
Growing the expansion of network services and IoT devices, the risk of cyber attacks is increased by high-frequency and ... [more] |
IN2017-61 pp.91-96 |
ICSS |
2017-11-20 15:40 |
Oita |
Beppu International Convention Center |
Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40 |
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] |
ICSS2017-40 pp.11-16 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
ICTSSL |
2017-07-13 15:40 |
Kagawa |
Kagawa Univ. |
A think of Correspondence Exercise Management at the Multiple Organizations' Emergency Management of Widespread Cyber-attack using information sharing system
-- Application of Comprehensive Emergency Management Support System,"KADAN(R)" -- Yoshihiro Yoshida, Koji Kishi, Tsuneko Kura, Naoko Kosaka (NTT) ICTSSL2017-23 |
In crisis response work in the cyber field of large scale and multiple organizations, efficient information gathering an... [more] |
ICTSSL2017-23 pp.33-38 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
NS, IN (Joint) |
2017-03-03 14:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251 |
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] |
NS2016-251 pp.541-546 |
IA, IN (Joint) |
2016-12-15 16:20 |
Hiroshima |
Hiroshima city university |
Generation of Dropping Request Message by Identifying Source Addresses and Attributes of Attacking Packets Mamoru Yogosawa, Yuki Miyaguchi, Ken Eguchi, Yuya Kishi, Tsuyoshi Ishikawa, Teruaki Tsutsumi, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno, Hiroyuki Kimiyama, Naoki Yonezaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) IA2016-69 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. It naturally lead us to switching ... [more] |
IA2016-69 pp.35-40 |
CQ |
2016-08-29 13:55 |
Ibaraki |
Tsukubasan |
Impact Assessment of Tamper Signal Characteristics in Secure Control Systems with Tamper Detection Observer Jin Hoshino, Hitoshi Kojima, Takahiro Funakoshi, Ryusuke Imai, Ryogo Kubo (Keio Univ.) CQ2016-55 |
Today, networked control systems (NCSs) have become popular in many areas of studies, due to the growth of information a... [more] |
CQ2016-55 pp.39-44 |
ICSS, IA |
2016-06-07 10:35 |
Saga |
Saga University |
An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] |
IA2016-9 ICSS2016-9 pp.45-50 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53 |
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] |
ICSS2015-53 pp.35-40 |
NS, IN (Joint) |
2016-03-04 11:00 |
Miyazaki |
Phoenix Seagaia Resort |
Cyber Attack Prediction using News Article Analysis Baatarsuren Munkhdorj, Sekiya Yuji (UTokyo) IN2015-136 |
The common operation of current cyber defense systems is to search a signature of cyber attack by monitoring network tra... [more] |
IN2015-136 pp.165-170 |
IA |
2016-01-29 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Neutralization of malware-polluted IoT by limiting communications partners using MLB router Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86 |
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] |
IA2015-86 pp.43-48 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
IA, ICSS |
2015-06-12 10:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Experimental Results on an Attack Detection System for Advanced Persistent Threats Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9 |
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] |
IA2015-9 ICSS2015-9 pp.45-50 |
ICSS |
2015-03-03 15:15 |
Okinawa |
Meio Univiersity |
A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68 |
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] |
ICSS2014-68 pp.31-36 |
ICSS |
2015-03-03 15:40 |
Okinawa |
Meio Univiersity |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69 |
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more] |
ICSS2014-69 pp.37-42 |