Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IA |
2016-06-07 10:35 |
Saga |
Saga University |
An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ) IA2016-9 ICSS2016-9 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. A shift in thinking is required fr... [more] |
IA2016-9 ICSS2016-9 pp.45-50 |
NS, IN (Joint) |
2016-03-04 11:00 |
Miyazaki |
Phoenix Seagaia Resort |
Cyber Attack Prediction using News Article Analysis Baatarsuren Munkhdorj, Sekiya Yuji (UTokyo) IN2015-136 |
The common operation of current cyber defense systems is to search a signature of cyber attack by monitoring network tra... [more] |
IN2015-136 pp.165-170 |
IA |
2016-01-29 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Neutralization of malware-polluted IoT by limiting communications partners using MLB router Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86 |
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] |
IA2015-86 pp.43-48 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
IA, ICSS |
2015-06-12 10:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Experimental Results on an Attack Detection System for Advanced Persistent Threats Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9 |
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] |
IA2015-9 ICSS2015-9 pp.45-50 |
ICSS |
2015-03-03 13:50 |
Okinawa |
Meio Univiersity |
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow -- Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65 |
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] |
ICSS2014-65 pp.13-18 |
ICSS |
2015-03-03 15:15 |
Okinawa |
Meio Univiersity |
A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68 |
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] |
ICSS2014-68 pp.31-36 |
ICSS |
2015-03-03 15:40 |
Okinawa |
Meio Univiersity |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69 |
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more] |
ICSS2014-69 pp.37-42 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81 |
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] |
ICSS2014-81 pp.109-114 |
ICSS |
2015-03-04 12:05 |
Okinawa |
Meio Univiersity |
Finding Network Address Blocks Intensively Used for Cyber Attacks Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83 |
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] |
ICSS2014-83 pp.121-126 |
IA |
2014-10-07 16:55 |
Osaka |
Grand Front OSAKA Tower-B 10F |
Recent cyber attack methodology and protection
-- The Consideration based on Interop Tokyo 2014 ShowNet Security -- Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33 |
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] |
IA2014-33 pp.51-56 |
IA |
2014-09-12 10:00 |
Tokyo |
Tokyo Tech Front |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14 |
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] |
IA2014-14 pp.1-6 |
IA |
2014-09-12 10:30 |
Tokyo |
Tokyo Tech Front |
An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15 |
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] |
IA2014-15 pp.7-12 |
R |
2014-05-23 14:20 |
Aichi |
|
Optimal Monitoring Policy for a System with Cyber Attack Mitsuhiro Imaizumi (Aichi Gakusen Univ.), Mitsutaka Kimura (Gifu City Women's Coll.) R2014-3 |
Recently, the case that malware enters into an organization's LAN through e-mail and so on, has become a serious problem... [more] |
R2014-3 pp.13-16 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
ICSS, IPSJ-SPT |
2014-03-28 11:15 |
Okinawa |
Meio Univiersity |
Timeline-Based Event Log Viewer over Multi-Host Environment Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79 |
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more] |
ICSS2013-79 pp.125-130 |
IA, ICSS |
2013-06-21 14:15 |
Niigata |
Ao-re Nagaoka |
NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15 |
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] |
IA2013-15 ICSS2013-15 pp.85-90 |
ICSS |
2013-03-25 15:30 |
Kanagawa |
Yokohama National University |
[Invited Talk]
PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66 |
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] |
ICSS2012-66 p.55 |
SSS |
2012-11-22 15:00 |
Tokyo |
|
[Invited Talk]
Change the way of thinking Countermeasure for cyber attack, considering "Virus shuld be inside" Takeyasu Kishiro (HISYS) |
(To be available after the conference date) [more] |
|