Paper Abstract and Keywords |
Presentation |
2015-06-11 16:05
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The Internet is transcending national boundaries to become an important and essential communication approach in the world.
However, it is followed large-scale cyber attacks and this situation comes to be serious gradually.
To deal with this problem, a project called PRACTICE as a countermeasure is organized by international cooperation.
The research is carried out in the field of detecting cyber attacks and rapidly responding to the attacks.
In the PRACTICE research, the darknet traffic data is collected, and then the statistical and analytical results are fed back to participating countries.
In this case it is necessary to prevent one of countries from estimating other countries darknet’s IP address and scale.
In this paper, first, the packet analysis approach for multiple darknet traffics is proposed and the analysis results are discussed.
Secondly, another method for estimating darknet IP address based on the analysis results and public statistical data is proposed.
The proposed methods in this paper are contributed to the research of anonymity processing techniques based on public statistical data in PRACTICE project. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Cyber Attack / Darknet Monitoring / Time Series Analysis / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 115, no. 81, ICSS2015-7, pp. 33-38, June 2015. |
Paper # |
ICSS2015-7 |
Date of Issue |
2015-06-04 (IA, ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IA2015-7 ICSS2015-7 |
Conference Information |
Committee |
IA ICSS |
Conference Date |
2015-06-11 - 2015-06-12 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kyushu Institute of Technology Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Internet Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2015-06-IA-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Traffic Data Analysis for Multiple Darknet and its Applications |
Sub Title (in English) |
|
Keyword(1) |
Cyber Attack |
Keyword(2) |
Darknet Monitoring |
Keyword(3) |
Time Series Analysis |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kensho Murai |
1st Author's Affiliation |
Kobe University (Kobe Univ.) |
2nd Author's Name |
Keisuke Furumoto |
2nd Author's Affiliation |
Kobe University (Kobe Univ.) |
3rd Author's Name |
Kosuke Murakami |
3rd Author's Affiliation |
KDDI CORPORATION (KDDI) |
4th Author's Name |
Koji Nakao |
4th Author's Affiliation |
KDDI CORPORATION/National Institute of Information and Communications Technology (KDDI/NICT) |
5th Author's Name |
Masakatu Morii |
5th Author's Affiliation |
Kobe University (Kobe Univ.) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-06-11 16:05:00 |
Presentation Time |
20 minutes |
Registration for |
ICSS |
Paper # |
IA2015-7, ICSS2015-7 |
Volume (vol) |
vol.115 |
Number (no) |
no.80(IA), no.81(ICSS) |
Page |
pp.33-38 |
#Pages |
6 |
Date of Issue |
2015-06-04 (IA, ICSS) |
|