Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, IN (Joint) |
2020-12-15 11:40 |
Online |
Online |
Application Identification Method with Meta-Learning Shun Tobiyama, Bo Hu, Kazunori Kamiya (NTT), Kenji Takahashi (NTT Ltd.) IN2020-40 |
With the continuous evolution of the Internet, a variety of web applications, such as video streaming, social network se... [more] |
IN2020-40 pp.43-48 |
ICM |
2020-03-03 10:20 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Large-Scale NW Traffic Identification Technique with Domain Adaptation Shun Tobiyama, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Ltd.) ICM2019-51 |
[more] |
ICM2019-51 pp.55-60 |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Period Analysis for Visualization of Industrial Network Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) ICSS2018-88 |
Since communications of the industrial network have strong periodicity, profiling the period of communications between d... [more] |
ICSS2018-88 pp.173-178 |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Regulatory Compliance Monitoring on the Web Using Paragraph Vector Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) ICSS2018-71 |
There are a certain number of employees who violate regulatory compliance by non-malicious acts. Since their violation m... [more] |
ICSS2018-71 pp.19-24 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS, IPSJ-SPT |
2018-03-07 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52 |
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] |
ICSS2017-52 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-08 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77 |
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] |
ICSS2017-77 pp.157-160 |
ICSS, IPSJ-SPT |
2018-03-08 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-79 |
[more] |
ICSS2017-79 pp.167-172 |
ICSS |
2017-11-21 11:45 |
Oita |
Beppu International Convention Center |
A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47 |
[more] |
ICSS2017-47 pp.53-58 |
ICSS, IPSJ-SPT |
2017-03-13 15:15 |
Nagasaki |
University of Nagasaki |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51 |
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] |
ICSS2016-51 pp.43-48 |
ICSS, IPSJ-SPT |
2017-03-13 15:40 |
Nagasaki |
University of Nagasaki |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52 |
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] |
ICSS2016-52 pp.49-54 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Evaluation of the attack detection method based on duration of continuous packet arrival Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56 |
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] |
ICSS2015-56 pp.53-58 |
ICSS |
2015-11-26 14:35 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
TCP Behavior-based Slow DoS Attack Detection Hiroyuki Nooka, Kazunori Kamiya, Hiroshi Kurakami, Takeshi Yada (NTT) ICSS2015-37 |
In this paper, we discuss the detection of a form of DoS/DDoS attack known as Slow DoS.
Currently, countermeasures agai... [more] |
ICSS2015-37 pp.13-18 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74 |
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] |
ICSS2013-74 pp.95-100 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |
CS, CQ (Joint) |
2012-04-19 09:40 |
Okinawa |
Ishigakijima |
Visualizing Traffic on Routing Topology Kazunori Kamiya, Shu Sugimoto, Takanori Mizuguchi (NTT-COM) CS2012-3 |
[more] |
CS2012-3 pp.11-16 |