IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 116 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2022-06-24
11:50
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] IA2022-14 ICSS2022-14
pp.76-80
ICSS, IPSJ-SPT 2022-03-07
15:20
Online Online Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] ICSS2021-65
pp.38-43
IA, SITE, IPSJ-IOT [detail] 2022-03-08
14:20
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A proposal of detection system for malicious DoH communication generated by DGA-based malware
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72
(To be available after the conference date) [more] SITE2021-59 IA2021-72
pp.79-82
IN, IA
(Joint)
2021-12-17
14:55
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48
(To be available after the conference date) [more] IA2021-48
pp.85-92
IA 2021-09-08
15:15
Online Online Detection and blocking system for suspicious DNS outbound query using RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] IA2021-24
pp.59-64
RCS, SR, NS, SeMI, RCC
(Joint)
2021-07-15
10:30
Online Online Extraction of User Communication Behavior from DNS Query Logs by Non-Negative Tensor Factorization Approach
Kotaro Hatanaka, Tatsuaki Kimura, Tetsuya Takine (Osaka Univ.) NS2021-43
Understanding user communication behavior by analyzing network logs has been playing an important role in security monit... [more] NS2021-43
pp.57-62
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online Detection of Infected Device Using DNS Traffic
Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] ICSS2020-27
pp.7-12
ICSS, IPSJ-SPT 2021-03-01
10:00
Online Online Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more]
ICSS2020-28
pp.13-18
KBSE 2021-01-23
15:00
Online Online Consideration of evaluation datasets for DNS tunnel detection research
Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more]
KBSE2020-32
pp.19-24
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
IA 2020-11-09
14:35
Hokkaido
(Primary: On-site, Secondary: Online)
Reduction of DNS queries using intelligent caching system
Tatsuya Masamune, Hideya Ochiai, Hiroshi Esaki (The Univ. of Tokyo) IA2020-18
Page loading time of websites is one of the dominant criteria for the UX (user experience) during web browsing. In this ... [more] IA2020-18
pp.1-6
CS, IN, NS, NV
(Joint)
2020-09-10
14:50
Online Online [Invited Talk] Recent Research Trends in Detection and Blocking System of Botnet Communications by DNS Traffic Analysis
Katsuyoshi Iida (Hokkaido Univ.), Hikaru Ichise, Yong Jin (Tokyo Tech.) NS2020-41
Botnet, a logical network used by bot-type malware, is becoming a social issue. In this paper, we give an outline of the... [more] NS2020-41
pp.3-6
NS 2020-04-16
13:50
Online Online A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] NS2020-2
pp.7-12
ISEC, IT, WBS 2020-03-10
13:25
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Research on DNS tunnel detection by machine learning using appearance characters -- Consideration of implementation of evaluation program --
Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more]
IT2019-103 ISEC2019-99 WBS2019-52
pp.87-94
IA, SITE, IPSJ-IOT [detail] 2020-03-02
14:05
Online Online Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses
Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] SITE2019-89 IA2019-67
pp.7-12
KBSE, SC 2019-11-08
13:30
Nagano Shinshu University Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine
Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] KBSE2019-26 SC2019-23
pp.19-23
ISEC, SITE, LOIS 2019-11-02
10:50
Osaka Osaka Univ. Detection System of DNS Cache Poisoning Using Blockchain Technology
Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more]
ISEC2019-78 SITE2019-72 LOIS2019-37
pp.107-112
ISEC, SITE, LOIS 2019-11-02
15:25
Osaka Osaka Univ. Research on DNS tunnel detection by machine learning using appearance characters
Tetsuya Asakura, Takeo Tatsumi (OUJ) ISEC2019-84 SITE2019-78 LOIS2019-43
In this study, as a detection technique of DNS tunnel, it was tried to detect abnormal DNS query string by machine learn... [more] ISEC2019-84 SITE2019-78 LOIS2019-43
pp.141-148
NS, IN, CS, NV
(Joint)
2019-09-06
11:15
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study on Features Derived from Cache Property for DNS Tunneling Detection
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] NS2019-93
pp.25-30
NS, IN, CS, NV
(Joint)
2019-09-06
13:05
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Method for Complementing Device Information by Using Similarity of DNS Queries
Takuya Hirasawa, Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2019-27
In recent networks, which is becoming more and more complicated, it is important to maintain detailed information of dev... [more] IN2019-27
pp.23-28
 Results 21 - 40 of 116 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan