IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 40 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, CS, IN
(Joint)
2007-09-21
13:40
Miyagi Tohoku University A Network Application Identification Method Using Similarity of Packet Payloads
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-19
 [more] CS2007-19
pp.15-20
NS, CS, IN
(Joint)
2007-09-21
14:00
Miyagi Tohoku University An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-20
Recently, a network anomaly detection method focusing
correlation coefficients between traffic features has been pro... [more]
CS2007-20
pp.21-26
ICM 2007-05-11
09:40
Kochi Kochi Uni. of Technology Classifying Network Applications Using Transition Pattern of Payload-length
Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
Recently, information leakage caused by illegal use of network applications (e.g. P2P application) has become a new soci... [more]
CQ, CS
(Joint)
2007-04-24
09:25
Kagoshima Kagoshima University Detecting Causal Hosts of Anomalous Traffic using Difference of Anomaly Score
Yuji Waizumi, Hideki Saga, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-7
e propose a method to specify hosts which
send anomalous pakects when a notwork anomaly is detected.
Our proposed met... [more]
CS2007-7
pp.37-42
CQ, CS
(Joint)
2007-04-24
09:50
Kagoshima Kagoshima University Transmission Control in Transport Protocols for Mitigating Effects of Pulsing Denial of Service Attacks
Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-8
Pulsing Denial-of-Service (DoS) attacks, which can significantly
degrade the communication quality (e.g. throughput) of... [more]
CS2007-8
pp.43-48
CS, IE, ITE-BCT, IPSJ-AVM 2006-12-15
10:55
Aichi Nagoya Univ. Discriminating Network Applications by using Changes in the Compositon of Communication Data
Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-61 IE2006-129
A person-to-person imformation sharing is easily realized
by P2P networks that serves are unnecessary to do so.
Leakag... [more]
CS2006-61 IE2006-129
pp.19-24
CS, IE, ITE-BCT, IPSJ-AVM 2006-12-15
11:20
Aichi Nagoya Univ. Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes
Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-62 IE2006-130
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the
throughput of TCP flow and consequently pose a grave con... [more]
CS2006-62 IE2006-130
pp.25-30
IN, NS, CS
(Joint)
2006-09-15
15:00
Miyagi   Using Multiple Normal states for Network Anomaly Detection
Naotoshi Hiramatsu, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-32
Network anomaly detection requires modeling the normal state of the
network. When the observation quantities of network... [more]
CS2006-32
pp.61-66
IN, NS, CS
(Joint)
2006-09-15
15:20
Miyagi   A Low Cost Worm Detection Technique based on Flow Payload Clustering
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-33
Recently, damages of information systems by worms have been reported at the global level. To control these damages, some... [more] CS2006-33
pp.67-72
IN, NS, CS
(Joint)
2006-09-15
15:40
Miyagi   Detecting Pulsing Denial-of-Service Attacks by Using Bandwidth Usage Condition
Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-34
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave conc... [more] CS2006-34
pp.73-78
IN, NS, CS
(Joint)
2006-09-15
16:00
Miyagi   Increasing Efficiency of DoS-Attack Traceback over Mobile Networks
Taishi Tochiori, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-35
Denial of Service(DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rap... [more] CS2006-35
pp.79-84
CQ 2006-07-13
13:00
Hokkaido Future University-Hakodate A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads
Hiroshi Tsunoda, Yuji Waizumi, Zheng Sekibe, Yoshiaki Nemoto (Tohoku Univ.) CQ2006-20
Security management is a core issue in the current Internet, and
illegal accesses is a serious problem in security mana... [more]
CQ2006-20
pp.17-22
NS 2006-05-18
17:00
Kyoto Kyoto University Clock Tower Centenial Hall A State Evaluation Method of Network Traffic using Histograms of Correlation Coefficients
Yuji Waizumi (Tohoku Univ.), Junichi Hirose (Honda Motor), Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) NS2006-29
We propose a network traffic modeling method using a histogram of the probabilities of of occurr
ence of correlation co... [more]
NS2006-29
pp.33-36
ICM, NS, CQ
(Joint)
2005-11-17
14:00
Shimane Kunibiki-messe (Matsue city) Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for Improving DDoS Traceback Accuracy
Hironori Utsumi, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
For Traffic pattern based traceback techniques, non-DoS traffic included in DoS traffic becomes a source of noise which ... [more] NS2005-110
pp.1-4
ICM, NS, CQ
(Joint)
2005-11-17
14:25
Shimane Kunibiki-messe (Matsue city) A network state evaluation method based on correlation between types of packets
Junichi Hirose, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
 [more] NS2005-111
pp.5-8
ICM, NS, CQ
(Joint)
2005-11-17
14:50
Shimane Kunibiki-messe (Matsue city) Detecting Worms based on Similarity of Flow Payloads
Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
Owing to the excessive amount of damage they are causing, epidemic worms have become a social problem. Recent researches... [more] NS2005-112
pp.9-12
CS, IN, NS
(Joint)
2005-09-15
10:15
Miyagi Tohoku Univ. A Detection Technique of Epidemic Worms using Clustering of Packet Payload
Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.)
Global damages of information systems by epidemic worms
have been reported because the spreading speed of worms has be... [more]
CS2005-19
pp.19-24
CS, IN, NS
(Joint)
2005-09-16
10:15
Miyagi Tohoku Univ. A Network Anomaly Detection based on Multi-Stage Traffic Analysis
Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.)
The explosive growth of the Internet has increasingly given rise to better sophisticated and larger number of intrusions... [more] IN2005-72
pp.67-72
NS
Toyama Toyama Prefectural University Improving Accuracy of Network-based Anomaly Detection Using Multiple Detection Modules
Yohei Sato, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
 [more] NS2004-144
pp.45-48
NS, CS, IN 2004-09-03
09:00
Miyagi Tohoku University Proposal of tracing DoS attack roots by analysing traffic patterns using Independent Component Analysis
Tohru Satoh, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
In recent years, DoS(Denial of Service) attack and more powerful DDoS(Distributed DoS) attack pose security problems on... [more] NS2004-101 IN2004-60 CS2004-56
pp.1-6
 Results 21 - 40 of 40 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan