Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2017-03-13 13:00 |
Nagasaki |
University of Nagasaki |
Clustering of Bot Port Scan and Brute-force Activities Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-46 |
Cyber-attacks targeting IoT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages ... [more] |
ICSS2016-46 pp.1-6 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-13 13:50 |
Nagasaki |
University of Nagasaki |
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48 |
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] |
ICSS2016-48 pp.13-18 |
ICSS, IPSJ-SPT |
2017-03-13 14:25 |
Nagasaki |
University of Nagasaki |
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49 |
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] |
ICSS2016-49 pp.31-36 |
ICSS, IPSJ-SPT |
2017-03-13 14:50 |
Nagasaki |
University of Nagasaki |
A Brief Review on Anomaly Detection and its Applications to Cybersecurity Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) ICSS2016-50 |
[more] |
ICSS2016-50 pp.37-42 |
ICSS, IPSJ-SPT |
2017-03-13 15:15 |
Nagasaki |
University of Nagasaki |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51 |
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] |
ICSS2016-51 pp.43-48 |
ICSS, IPSJ-SPT |
2017-03-13 15:40 |
Nagasaki |
University of Nagasaki |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52 |
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] |
ICSS2016-52 pp.49-54 |
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
Evaluation of memory image acquisition/analysis function in forensics tools Ikuo Tanaka, Masaki Hashimoto (IISEC) ICSS2016-53 |
Currently, the information system is established as a social infrastructure, and accompanying it, the types and occurren... [more] |
ICSS2016-53 pp.79-84 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54 |
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] |
ICSS2016-54 pp.85-90 |
ICSS, IPSJ-SPT |
2017-03-13 17:05 |
Nagasaki |
University of Nagasaki |
Effective Analysis of Macro Malware Based on Clustering Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) ICSS2016-55 |
[more] |
ICSS2016-55 pp.91-96 |
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
A Study on Parameter Adjustment of Whitelist Detection Rule Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) ICSS2016-56 |
Recently, the whitelist detection rule has been used as security measures for various system such control systems.
Only... [more] |
ICSS2016-56 pp.97-102 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |
ICSS, IPSJ-SPT |
2017-03-14 09:55 |
Nagasaki |
University of Nagasaki |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59 |
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] |
ICSS2016-59 pp.117-122 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Attack Pattern Extraction by Clustering Parameters Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60 |
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] |
ICSS2016-60 pp.123-128 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
ICSS2016-61 |
(To be available after the conference date) [more] |
ICSS2016-61 pp.129-134 |
ICSS, IPSJ-SPT |
2017-03-14 09:55 |
Nagasaki |
University of Nagasaki |
ICSS2016-62 |
[more] |
ICSS2016-62 pp.135-140 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Assignment and Solution regarding Access Control of a Camera on a Computer Yuri Yoshino, Masaki Inamura (TDU) ICSS2016-63 |
Since macOS does not display a confirmation dialog to the user when applications access a webcam, an attacker can watch ... [more] |
ICSS2016-63 pp.141-146 |
ICSS, IPSJ-SPT |
2017-03-14 10:55 |
Nagasaki |
University of Nagasaki |
Low rate attack detection method based on duration of burst state by using quick packet matching function Yuhei Hayashi, Jia Yong Zhen, Satoshi Nishiyama, Akira Misawa (NTT) ICSS2016-66 |
[more] |
ICSS2016-66 pp.159-164 |
ICSS, IPSJ-SPT |
2017-03-14 11:20 |
Nagasaki |
University of Nagasaki |
Graph based Detection of Advanced Persistent Threat on LAN Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65 |
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more] |
ICSS2016-65 pp.153-158 |