Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-02-29 09:20 |
Okinawa |
Okinawa Convention Center |
Intrusion Detection System Based on Federated Decision Trees Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Masataka Nakahara, Norihiro Okui, Ayumu Kubota (KDDI Research) NS2023-190 |
With the proliferation of Internet of things (IoT) devices, cyberattacks targeting these devices have also been increasi... [more] |
NS2023-190 pp.109-112 |
NS |
2022-10-05 15:10 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
An Anomaly Detection System of IoT Traffic for Smart Home Environments Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Ryo Yamamoto (UEC) NS2022-83 |
With the proliferation of Internet of things (IoT) devices, cyberattacks targeting these devices have also been increasi... [more] |
NS2022-83 pp.8-11 |
MSS, NLP |
2022-03-29 10:45 |
Online |
Online |
A proposal of method for defending against cyber attacks by combining honeypots and IPS Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142 |
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] |
MSS2021-71 NLP2021-142 pp.83-88 |
ICSS |
2021-11-29 15:25 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Masquerade Detection using command log of Honeypot Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-51 |
A masquerade attack is an attack in which an attacker impersonates a legitimate user and invades the system. In order to... [more] |
ICSS2021-51 pp.31-36 |
ICSS |
2021-11-29 15:50 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
A SDN-based Honeypot System: Attracting Suspicious Traffic in Local Area Networks Koki Ito, Hideya Ochiai, Esaki Hiroshi (The Univ. of Tokyo) ICSS2021-52 |
With the increasing informatization of society, attacks via networks are increasing and diversifying, and the need for s... [more] |
ICSS2021-52 pp.37-42 |
ICSS |
2021-11-29 16:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automating the collection of malware behavior captured by honeypots Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-53 |
A honeypot is a system that exposes vulnerable systems to cyber attacks on the Internet. They are used to analyze the at... [more] |
ICSS2021-53 pp.43-48 |
NS |
2021-10-06 16:35 |
Online |
Online |
A Study on IoT Traffic Anomaly Detection in Smart Home Environments Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Ryo Yamamoto (UEC), Thomas Silverston (Shibaura Inst. Tech.) |
(To be available after the conference date) [more] |
|
IA, ICSS |
2021-06-22 09:50 |
Online |
Online |
Etherpot: A honeypot for observing cyberattacks on Ethereum client Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11 |
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] |
IA2021-11 ICSS2021-11 pp.56-61 |
ICM |
2021-03-19 10:50 |
Online |
Online |
[Encouragement Talk]
Utility of Training Data in Sequential Accumulation Learning-Based Anomaly Detection Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2020-69 |
In Network-based Intrusion Detection Systems (NIDS) using supervised learning, one of important challengings is how to c... [more] |
ICM2020-69 pp.52-57 |
WBS, IT, ISEC |
2021-03-05 13:55 |
Online |
Online |
Analysis of Attack Activities for Honeypot Installation in Ethereum Network. Chin Kota, Omote Kazumasa (Univ. Tsukuba) IT2020-155 ISEC2020-85 WBS2020-74 |
In recent years, cryptocurrencies based on blockchain have been attracting much attention, and related research has repo... [more] |
IT2020-155 ISEC2020-85 WBS2020-74 pp.265-272 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
ICM |
2020-03-03 10:00 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Automatic Accumulation of Learning Data on Learning-based Anomaly Detection Utilizing Communication Traffics Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2019-50 |
With the advancement and diversification of information infrastructure in recent years, the importance
of network secur... [more] |
ICM2019-50 pp.49-54 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
|
Due to the sophistication and diversification of information infrastructure in recent years, the risk due to connections... [more] |
|
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:45 |
Kochi |
Kochi University of Technology |
Profiling of malicious users towards honeypot installation in the blockchain network Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2019-14 SITE2019-8 BioX2019-6 HWS2019-9 ICSS2019-12 EMM2019-17 |
Blockchain is a service operated by P2P type distributed network, and protocol control such as JSON-RPC is implemented a... [more] |
ISEC2019-14 SITE2019-8 BioX2019-6 HWS2019-9 ICSS2019-12 EMM2019-17 pp.15-22 |
ICSS, IPSJ-SPT |
2018-03-08 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83 |
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] |
ICSS2017-83 pp.205-210 |
ISEC, COMP |
2017-12-21 09:55 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Fundamental Study of Classification of Attackers by Multiple Honeypots Kazuya Yamashita, Okino Koji (Univ. of Toyama) ISEC2017-72 COMP2017-26 |
It is known that stored information in a honeypot is affected by its environment of observation, such as its response an... [more] |
ISEC2017-72 COMP2017-26 pp.1-5 |
IA |
2017-11-10 11:30 |
Kumamoto |
Hotel Greenpia Minamiaso |
Investigation of A Method for Detecting New Scanning Activities by Correlating Low-Interaction Honeypots with Darknet Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-25 |
In this paper, we discuss a method for detecting new scanning activities by using low-interaction honeypots and darknet.... [more] |
IA2017-25 pp.13-18 |
IA |
2017-11-10 11:55 |
Kumamoto |
Hotel Greenpia Minamiaso |
A Low-Interaction Honeypot Observing Potential Vulnerabilities against HTTP/2 Katsuki Koiwa, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-26 |
A honeypots are used as a mechanism to detect cyber attacks against unknown vulnerabilities. Honeypot is a decoy system... [more] |
IA2017-26 pp.19-23 |