IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2020-03-02
15:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] ICSS2019-80
pp.73-78
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
pp.297-304
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
ICSS, IPSJ-SPT 2016-03-03
12:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Malicious-Spam-Mail Detection System with Autonomous Learning Ability
Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more]
ICSS2015-50
pp.19-24
ICSS, IPSJ-SPT 2016-03-04
14:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] ICSS2015-67
pp.123-128
ICSS 2015-03-04
11:40
Okinawa Meio Univiersity Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] ICSS2014-82
pp.115-120
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Spam Analysis based on Mail Relay Routing
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] ICSS2013-75
pp.101-106
ICSS 2013-11-12
15:50
Fukuoka Nishijin Plaza Experimental Evaluation of A Botnet Detection Method based on Non-negative Matrix Factorization
Yuki Kawamura (Kyushu Univ.), Junpei Shimamura, Junji Nakazato (NICT), Katsunari Yoshioka (Yokohama National Univ.), Masashi Eto, Daisuke Inoue (NICT), Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2013-61
 [more] ICSS2013-61
pp.23-28
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:30
Hokkaido   Network Observation and Analysis Report on nicter -- Malware infection to embedded systems --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
 [more] ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
pp.381-385
IA, ICSS 2013-06-21
13:50
Niigata Ao-re Nagaoka Network Observation and Analysis Report on nicter -- Close Encounters of Network Incident Sign --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] IA2013-14 ICSS2013-14
pp.79-84
ICSS, IA 2012-06-22
09:25
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University Network Observation and Analysis Report on nicter -- Transition and Categorization of DDoS Backscatter --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2012-7 ICSS2012-7
Since e-commerce progressed quickly, a DDoS attack became a social problem. A lot of rebounding packets called backscatt... [more] IA2012-7 ICSS2012-7
pp.37-42
IA, ICSS 2011-06-16
16:35
Fukuoka Kyushu Institute of Technology A Practical Usage of Large-scale Darknet Monitoring for Disaster Recovery
Daisuke Inoue, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Koji Nakao (NICT) IA2011-5 ICSS2011-5
 [more] IA2011-5 ICSS2011-5
pp.25-30
ICSS 2011-03-25
16:00
Tokyo Suspended Network Observation and Analysis Report on nicter -- Transition Analysis of Cyber Attacks Based on Long-term Observation --
Junji Nakazato (NICT), Jumpei Shimamura (For Schooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-65
 [more] ICSS2010-65
pp.53-58
ICSS 2010-03-26
16:20
Fukuoka The University of Kitakyushu Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] ICSS2009-68
pp.35-39
ICSS 2009-11-13
16:45
Miyazaki University of Miyazaki A classification method for packet generation logic of darknet traffic based on characteristics of packet header
Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] ICSS2009-61
pp.43-48
ICSS 2009-05-15
14:45
Hyogo Kobe University Network Observation and Analysis Report on nicter
Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4
(To be available after the conference date) [more] ICSS2009-4
pp.15-20
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan