Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:20 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A proposal of detection system for malicious DoH communication generated by DGA-based malware Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72 |
(To be available after the conference date) [more] |
SITE2021-59 IA2021-72 pp.79-82 |
IN, IA (Joint) |
2021-12-17 14:55 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48 |
(To be available after the conference date) [more] |
IA2021-48 pp.85-92 |
IA |
2021-09-08 15:15 |
Online |
Online |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-15 10:30 |
Online |
Online |
Extraction of User Communication Behavior from DNS Query Logs by Non-Negative Tensor Factorization Approach Kotaro Hatanaka, Tatsuaki Kimura, Tetsuya Takine (Osaka Univ.) NS2021-43 |
Understanding user communication behavior by analyzing network logs has been playing an important role in security monit... [more] |
NS2021-43 pp.57-62 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
Detection of Infected Device Using DNS Traffic Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27 |
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] |
ICSS2020-27 pp.7-12 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28 |
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more] |
ICSS2020-28 pp.13-18 |
KBSE |
2021-01-23 15:00 |
Online |
Online |
Consideration of evaluation datasets for DNS tunnel detection research Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32 |
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more] |
KBSE2020-32 pp.19-24 |
NS, NWS (Joint) |
2021-01-22 13:30 |
Online |
Online |
[Encouragement Talk]
A Study on Detection and Prevention of Stealthy DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116 |
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] |
NS2020-116 pp.31-36 |
IA |
2020-11-09 14:35 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Reduction of DNS queries using intelligent caching system Tatsuya Masamune, Hideya Ochiai, Hiroshi Esaki (The Univ. of Tokyo) IA2020-18 |
Page loading time of websites is one of the dominant criteria for the UX (user experience) during web browsing. In this ... [more] |
IA2020-18 pp.1-6 |
CS, IN, NS, NV (Joint) |
2020-09-10 14:50 |
Online |
Online |
[Invited Talk]
Recent Research Trends in Detection and Blocking System of Botnet Communications by DNS Traffic Analysis Katsuyoshi Iida (Hokkaido Univ.), Hikaru Ichise, Yong Jin (Tokyo Tech.) NS2020-41 |
Botnet, a logical network used by bot-type malware, is becoming a social issue. In this paper, we give an outline of the... [more] |
NS2020-41 pp.3-6 |
NS |
2020-04-16 13:50 |
Online |
Online |
A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2 |
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] |
NS2020-2 pp.7-12 |
ISEC, IT, WBS |
2020-03-10 13:25 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Research on DNS tunnel detection by machine learning using appearance characters
-- Consideration of implementation of evaluation program -- Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52 |
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more] |
IT2019-103 ISEC2019-99 WBS2019-52 pp.87-94 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-02 14:05 |
Online |
Online |
Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67 |
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] |
SITE2019-89 IA2019-67 pp.7-12 |
KBSE, SC |
2019-11-08 13:30 |
Nagano |
Shinshu University |
Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23 |
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] |
KBSE2019-26 SC2019-23 pp.19-23 |
ISEC, SITE, LOIS |
2019-11-02 10:50 |
Osaka |
Osaka Univ. |
Detection System of DNS Cache Poisoning Using Blockchain Technology Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37 |
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more] |
ISEC2019-78 SITE2019-72 LOIS2019-37 pp.107-112 |
ISEC, SITE, LOIS |
2019-11-02 15:25 |
Osaka |
Osaka Univ. |
Research on DNS tunnel detection by machine learning using appearance characters Tetsuya Asakura, Takeo Tatsumi (OUJ) ISEC2019-84 SITE2019-78 LOIS2019-43 |
In this study, as a detection technique of DNS tunnel, it was tried to detect abnormal DNS query string by machine learn... [more] |
ISEC2019-84 SITE2019-78 LOIS2019-43 pp.141-148 |
NS, IN, CS, NV (Joint) |
2019-09-06 11:15 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study on Features Derived from Cache Property for DNS Tunneling Detection Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93 |
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] |
NS2019-93 pp.25-30 |
NS, IN, CS, NV (Joint) |
2019-09-06 13:05 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Method for Complementing Device Information by Using Similarity of DNS Queries Takuya Hirasawa, Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2019-27 |
In recent networks, which is becoming more and more complicated, it is important to maintain detailed information of dev... [more] |
IN2019-27 pp.23-28 |