Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN |
2009-07-09 15:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
Anomalous Traffic Observed in DNS Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28 |
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] |
IN2009-28 pp.19-24 |
IA, ICSS |
2009-06-19 10:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Validation of packet origin using public route information Meidai Saito (National Police Academy), Keisuke Ishibashi (NTT Corp.) IA2009-14 ICSS2009-22 |
uRPF is widely used technology to filter source IP spoofed packets, using route information. With uRPF filtering, a rout... [more] |
IA2009-14 ICSS2009-22 pp.73-78 |
IA, SITE |
2009-03-05 14:00 |
Kumamoto |
|
Evaluation of Black Domain List by Using DNS Query Graph Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato, Makoto Iwamura (NTT) SITE2008-47 IA2008-70 |
Botnet hosts, which can be controlled by malicious operators for executing DDoS attacks or spamming,
have been one of t... [more] |
SITE2008-47 IA2008-70 pp.19-24 |
IN |
2009-02-06 10:25 |
Kagawa |
Kagawa University |
Monitoring DNS Cache Poisoning Attacks Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT), Meidai Saito (National Police Academy) IN2008-129 |
In this paper, we propose a method to detect the new type of DNS cache poisoning attack, which was discovered July 2008 ... [more] |
IN2008-129 pp.43-48 |
ICM, CQ, NS (Joint) |
2008-11-13 13:00 |
Fukushima |
Nihon University |
[Encouragement Talk]
The Proposal of Large-scale VoIP Traffic Quality Measuring Method Using Flow-based Measurement Atsushi Kobayashi (NTT), Masashi Nishino, Shingo Kimura (NTT-AT), Keisuke Ishibashi (NTT) NS2008-89 |
[more] |
NS2008-89 pp.1-6 |
NS |
2008-05-15 15:00 |
Hokkaido |
Future University-Hakodate |
Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic Shigeaki Harada, Ryoichi Kawahara, Noriaki Kamiyama, Tsuyoshi Kondoh, Keisuke Ishibashi (NTT), Shoichiro Asano (NII) NS2008-1 |
To mitigate the anomalous traffic such as DDoS attacks,
it is necessary to accurately identify the anomalous traffic so... [more] |
NS2008-1 pp.1-6 |
NS, IN (Joint) |
2008-03-06 11:50 |
Okinawa |
Bankoku Shinryokan |
Identification Method of Attacking Source Using Traffic Flow in Backbone Networks Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169 |
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] |
IN2007-169 pp.61-66 |
IN |
2007-12-13 17:20 |
Hiroshima |
Hiroshima City University |
[Invited Talk]
Network-wide Internet Traffic Measurement/Analysis and Anomolous Traffic Detection Keisuke Ishibashi (NTT) IN2007-107 |
In this paper, we survey current status on Internet traffic measurement,
especailly on spatial characteristics of Inter... [more] |
IN2007-107 pp.49-54 |
NS, ICM, CQ (Joint) |
2007-11-15 13:15 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
The Large-scale VoIP Quality Measurement Method using selective sFlow Atsushi Kobayashi, Keisuke Ishibashi, Haruhiko Nishida (NTT) NS2007-95 |
[more] |
NS2007-95 pp.7-12 |
NS, CS, IN (Joint) |
2007-09-21 10:10 |
Miyagi |
Tohoku University |
A Proposal of Detection Method for Application Anomaly Traffic over Large-scale Backbone Networks Takeshi Kuwahara, Takeshi Yagi, Atsushi Kobayashi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-61 |
This paper proposes a novel anomaly detection method for application traffic over large-scale backbone networks. The pro... [more] |
IN2007-61 pp.105-110 |
NS, CS, IN (Joint) |
2007-09-21 10:30 |
Miyagi |
Tohoku University |
Identifying the Anomalous Traffic Using Delta Traffic Tsuyoshi Kondoh, Keisuke Ishibashi (NTT) IN2007-62 |
This paper reports a technique of identifying the anomalous traffic and its evaluation result. Our identification techni... [more] |
IN2007-62 pp.111-116 |
ICM |
2007-05-11 09:15 |
Kochi |
Kochi Uni. of Technology |
[Encouragement Talk]
The Designing for Large Scale Traffic Collector using Flow Mediator Atsushi Kobayashi (NTT), Daisuke Matsubara (Hitachi), Tsuyoshi Kondoh, Keisuke Ishibashi (NTT) |
Recently traffic volume of Internet backbone network becomes more and more, and the diversity of networks increases, suc... [more] |
|
NS, IN (Joint) |
2007-03-08 11:10 |
Okinawa |
Okinawa Convention Center |
Effect of sampling rate and monitoring granularity on anomaly detectability Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori, Tsuyoshi Kondoh (NTT), Shoichiro Asano (NII) IN2006-201 |
In this paper, we quantitatively evaluate how sampling decrease detectability of anomalous traffic. We build equations ... [more] |
IN2006-201 pp.125-130 |
NS, IN (Joint) |
2007-03-08 11:30 |
Okinawa |
Okinawa Convention Center |
Detection accuracy of network anomaly detection using sampled flow statistics Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada (NTT), Shoichiro Asano (NII) IN2006-202 |
We showed so far that network anomalies generating a huge number of
small flows, such as network scans or SYN flooding... [more] |
IN2006-202 pp.131-136 |
NS, IN (Joint) |
2007-03-09 11:30 |
Okinawa |
Okinawa Convention Center |
Proposal of Traffic Analysis Method using selective sFlow Atsushi Kobayashi, Keisuke Ishibashi, Kimihiro Yamamoto, Katsuyasu Toyama (NTT) NS2006-233 |
Recently, the traffic volume in internet backbone network has been increasing year by year. In this circumstance, the ef... [more] |
NS2006-233 pp.391-396 |
CQ, MVE (Joint) |
2007-01-26 09:25 |
Fukuoka |
Asia-pacific Import Mart |
Method of Measuring VoIP Traffic Fluctuation with Selective sFlow Atsushi Kobayashi (NTT), Motoyuki Saitou (NTT-AT), Keisuke Ishibashi, Katsuyasu Toyama (NTT) CQ2006-87 |
We have studied the delay and fluctuation of VoIP traffic in a real network and focused on traffic fluctuation that can ... [more] |
CQ2006-87 pp.47-52 |
CQ, NS, ICM (Joint) |
2006-11-16 13:10 |
Tottori |
Tottori Univ. of Environmental Studies |
[Encouragement Talk]
A Proposal of Traffic Matrix Monitoring Collector for Next Generation Backbone Atsushi Kobayashi, Tsuyoshi Kondoh, Yutaka Hirokawa, Keisuke Ishibashi, Kimihiro Yamamoto (NTT) NS2006-123 CQ2006-64 TM2006-37 |
In large-scale networks, traffic monitoring system needs to handle huge traffic flow records. So, this system's capabili... [more] |
NS2006-123 CQ2006-64 TM2006-37 pp.1-6(NS), pp.31-36(CQ), pp.1-6(TM) |
CQ, NS, ICM (Joint) |
2006-11-16 13:30 |
Tottori |
Tottori Univ. of Environmental Studies |
A study on detecting network anomalies using sampled flow statistics Ryoichi Kawahara, Tatsuya Mori, Keisuke Ishibashi, Noriaki Kamiyama, Shigeaki Harada (NTT), Shoichiro Asano (NII) NS2006-124 CQ2006-65 TM2006-38 |
[more] |
NS2006-124 CQ2006-65 TM2006-38 pp.7-12(NS), pp.37-42(CQ), pp.7-12(TM) |
CQ, NS, ICM (Joint) |
2006-11-16 13:50 |
Tottori |
Tottori Univ. of Environmental Studies |
Inferring original traffic pattern from sampled flow statistics Tatsuya Mori, Ryoichi Kawahara, Noriaki Kamiyama, Keisuke Ishibashi, Shigeaki Harada (NTT) NS2006-125 CQ2006-66 TM2006-39 |
[more] |
NS2006-125 CQ2006-66 TM2006-39 pp.13-18(NS), pp.43-48(CQ), pp.13-18(TM) |
IN, PN (Joint) |
2006-10-12 11:45 |
Tokyo |
|
Optimal construction of per-prefix counters for traffic anomaly detection Masahiro Terayama, Shigeo Shioda (Chiba Univ.), Keisuke Ishibashi (NTT) IN2006-78 |
[more] |
IN2006-78 pp.7-12 |