Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2020-03-03 10:20 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Large-Scale NW Traffic Identification Technique with Domain Adaptation Shun Tobiyama, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Ltd.) ICM2019-51 |
[more] |
ICM2019-51 pp.55-60 |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Period Analysis for Visualization of Industrial Network Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) ICSS2018-88 |
Since communications of the industrial network have strong periodicity, profiling the period of communications between d... [more] |
ICSS2018-88 pp.173-178 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Traffic analysis to detect abnormal smartphone application behavior Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87 |
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] |
ICSS2018-87 pp.167-172 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Performance survey for IoT security function on smartphone Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68 |
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] |
ICSS2018-68 pp.1-6 |
ICSS, IPSJ-SPT |
2018-03-07 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52 |
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] |
ICSS2017-52 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of decentralized IoT Security Controller Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58 |
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] |
ICSS2017-58 pp.43-48 |
ICSS, IPSJ-SPT |
2018-03-08 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-77 |
Blacklist is frequently deployed for detecting malware-infected hosts. However, even when request traffic from one host ... [more] |
ICSS2017-77 pp.157-160 |
ICSS, IPSJ-SPT |
2018-03-08 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-79 |
[more] |
ICSS2017-79 pp.167-172 |
ICSS, IPSJ-SPT |
2017-03-13 15:15 |
Nagasaki |
University of Nagasaki |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51 |
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] |
ICSS2016-51 pp.43-48 |
ICSS, IPSJ-SPT |
2017-03-13 15:40 |
Nagasaki |
University of Nagasaki |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52 |
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] |
ICSS2016-52 pp.49-54 |
ICSS, IPSJ-SPT |
2017-03-14 09:55 |
Nagasaki |
University of Nagasaki |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59 |
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] |
ICSS2016-59 pp.117-122 |
ICSS, IPSJ-SPT |
2017-03-14 10:20 |
Nagasaki |
University of Nagasaki |
Attack Pattern Extraction by Clustering Parameters Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60 |
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] |
ICSS2016-60 pp.123-128 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2015-09-15 15:00 |
Ehime |
|
Proposal of selection of training data using misdetected goodware for preventing misdetection of a static detector of malware Yasushi Okano, Atsutoshi Kumagai, Masaki Tanikawa, Yoshihito Oshima (NTT), Kenji Aiko, Kazumi Umehashi, Junichi Murakami (FFRI) PRMU2015-90 IBISML2015-50 |
A lot of variant and new malware is produced day by day, it is therefore the urgent need to countermeasure such as "unkn... [more] |
PRMU2015-90 IBISML2015-50 pp.163-170 |