Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, CS, IN (Joint) |
2007-09-21 13:40 |
Miyagi |
Tohoku University |
A Network Application Identification Method Using Similarity of Packet Payloads Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-19 |
[more] |
CS2007-19 pp.15-20 |
NS, CS, IN (Joint) |
2007-09-21 14:00 |
Miyagi |
Tohoku University |
An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-20 |
Recently, a network anomaly detection method focusing
correlation coefficients between traffic features has been pro... [more] |
CS2007-20 pp.21-26 |
ICM |
2007-05-11 09:40 |
Kochi |
Kochi Uni. of Technology |
Classifying Network Applications Using Transition Pattern of Payload-length Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) |
Recently, information leakage caused by illegal use of network applications (e.g. P2P application) has become a new soci... [more] |
|
CQ, CS (Joint) |
2007-04-24 09:25 |
Kagoshima |
Kagoshima University |
Detecting Causal Hosts of Anomalous Traffic using Difference of Anomaly Score Yuji Waizumi, Hideki Saga, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-7 |
e propose a method to specify hosts which
send anomalous pakects when a notwork anomaly is detected.
Our proposed met... [more] |
CS2007-7 pp.37-42 |
CQ, CS (Joint) |
2007-04-24 09:50 |
Kagoshima |
Kagoshima University |
Transmission Control in Transport Protocols for Mitigating Effects of Pulsing Denial of Service Attacks Hiroshi Tsunoda, Kenjiro Arai, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-8 |
Pulsing Denial-of-Service (DoS) attacks, which can significantly
degrade the communication quality (e.g. throughput) of... [more] |
CS2007-8 pp.43-48 |
CS, IE, ITE-BCT, IPSJ-AVM |
2006-12-15 10:55 |
Aichi |
Nagoya Univ. |
Discriminating Network Applications by using Changes in the Compositon of Communication Data Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-61 IE2006-129 |
A person-to-person imformation sharing is easily realized
by P2P networks that serves are unnecessary to do so.
Leakag... [more] |
CS2006-61 IE2006-129 pp.19-24 |
CS, IE, ITE-BCT, IPSJ-AVM |
2006-12-15 11:20 |
Aichi |
Nagoya Univ. |
Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-62 IE2006-130 |
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the
throughput of TCP flow and consequently pose a grave con... [more] |
CS2006-62 IE2006-130 pp.25-30 |
IN, NS, CS (Joint) |
2006-09-15 15:00 |
Miyagi |
|
Using Multiple Normal states for Network Anomaly Detection Naotoshi Hiramatsu, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-32 |
Network anomaly detection requires modeling the normal state of the
network. When the observation quantities of network... [more] |
CS2006-32 pp.61-66 |
IN, NS, CS (Joint) |
2006-09-15 15:20 |
Miyagi |
|
A Low Cost Worm Detection Technique based on Flow Payload Clustering Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) CS2006-33 |
Recently, damages of information systems by worms have been reported at the global level. To control these damages, some... [more] |
CS2006-33 pp.67-72 |
IN, NS, CS (Joint) |
2006-09-15 15:40 |
Miyagi |
|
Detecting Pulsing Denial-of-Service Attacks by Using Bandwidth Usage Condition Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-34 |
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave conc... [more] |
CS2006-34 pp.73-78 |
IN, NS, CS (Joint) |
2006-09-15 16:00 |
Miyagi |
|
Increasing Efficiency of DoS-Attack Traceback over Mobile Networks Taishi Tochiori, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-35 |
Denial of Service(DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rap... [more] |
CS2006-35 pp.79-84 |
CQ |
2006-07-13 13:00 |
Hokkaido |
Future University-Hakodate |
A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads Hiroshi Tsunoda, Yuji Waizumi, Zheng Sekibe, Yoshiaki Nemoto (Tohoku Univ.) CQ2006-20 |
Security management is a core issue in the current Internet, and
illegal accesses is a serious problem in security mana... [more] |
CQ2006-20 pp.17-22 |
NS |
2006-05-18 17:00 |
Kyoto |
Kyoto University Clock Tower Centenial Hall |
A State Evaluation Method of Network Traffic using Histograms of Correlation Coefficients Yuji Waizumi (Tohoku Univ.), Junichi Hirose (Honda Motor), Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) NS2006-29 |
We propose a network traffic modeling method using a histogram of the probabilities of of occurr
ence of correlation co... [more] |
NS2006-29 pp.33-36 |
ICM, NS, CQ (Joint) |
2005-11-17 14:00 |
Shimane |
Kunibiki-messe (Matsue city) |
Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for Improving DDoS Traceback Accuracy Hironori Utsumi, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) |
For Traffic pattern based traceback techniques, non-DoS traffic included in DoS traffic becomes a source of noise which ... [more] |
NS2005-110 pp.1-4 |
ICM, NS, CQ (Joint) |
2005-11-17 14:25 |
Shimane |
Kunibiki-messe (Matsue city) |
A network state evaluation method based on correlation between types of packets Junichi Hirose, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) |
[more] |
NS2005-111 pp.5-8 |
ICM, NS, CQ (Joint) |
2005-11-17 14:50 |
Shimane |
Kunibiki-messe (Matsue city) |
Detecting Worms based on Similarity of Flow Payloads Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) |
Owing to the excessive amount of damage they are causing, epidemic worms have become a social problem. Recent researches... [more] |
NS2005-112 pp.9-12 |
CS, IN, NS (Joint) |
2005-09-15 10:15 |
Miyagi |
Tohoku Univ. |
A Detection Technique of Epidemic Worms using Clustering of Packet Payload Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.) |
Global damages of information systems by epidemic worms
have been reported because the spreading speed of worms has be... [more] |
CS2005-19 pp.19-24 |
CS, IN, NS (Joint) |
2005-09-16 10:15 |
Miyagi |
Tohoku Univ. |
A Network Anomaly Detection based on Multi-Stage Traffic Analysis Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) |
The explosive growth of the Internet has increasingly given rise to better sophisticated and larger number of intrusions... [more] |
IN2005-72 pp.67-72 |
NS |
|
Toyama |
Toyama Prefectural University |
Improving Accuracy of Network-based Anomaly Detection Using Multiple Detection Modules Yohei Sato, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) |
[more] |
NS2004-144 pp.45-48 |
NS, CS, IN |
2004-09-03 09:00 |
Miyagi |
Tohoku University |
Proposal of tracing DoS attack roots by analysing traffic patterns using Independent Component Analysis Tohru Satoh, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) |
In recent years, DoS(Denial of Service) attack and more powerful DDoS(Distributed DoS) attack pose security problems on... [more] |
NS2004-101 IN2004-60 CS2004-56 pp.1-6 |