IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 43  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2024-02-29
09:20
Okinawa Okinawa Convention Center Intrusion Detection System Based on Federated Decision Trees
Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Masataka Nakahara, Norihiro Okui, Ayumu Kubota (KDDI Research) NS2023-190
With the proliferation of Internet of things (IoT) devices, cyberattacks targeting these devices have also been increasi... [more] NS2023-190
pp.109-112
NS 2022-10-05
15:10
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
An Anomaly Detection System of IoT Traffic for Smart Home Environments
Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Ryo Yamamoto (UEC) NS2022-83
With the proliferation of Internet of things (IoT) devices, cyberattacks targeting these devices have also been increasi... [more] NS2022-83
pp.8-11
MSS, NLP 2022-03-29
10:45
Online Online A proposal of method for defending against cyber attacks by combining honeypots and IPS
Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] MSS2021-71 NLP2021-142
pp.83-88
ICSS 2021-11-29
15:25
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Masquerade Detection using command log of Honeypot
Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-51
A masquerade attack is an attack in which an attacker impersonates a legitimate user and invades the system. In order to... [more] ICSS2021-51
pp.31-36
ICSS 2021-11-29
15:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
A SDN-based Honeypot System: Attracting Suspicious Traffic in Local Area Networks
Koki Ito, Hideya Ochiai, Esaki Hiroshi (The Univ. of Tokyo) ICSS2021-52
With the increasing informatization of society, attacks via networks are increasing and diversifying, and the need for s... [more] ICSS2021-52
pp.37-42
ICSS 2021-11-29
16:15
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automating the collection of malware behavior captured by honeypots
Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-53
A honeypot is a system that exposes vulnerable systems to cyber attacks on the Internet. They are used to analyze the at... [more] ICSS2021-53
pp.43-48
NS 2021-10-06
16:35
Online Online A Study on IoT Traffic Anomaly Detection in Smart Home Environments
Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Ryo Yamamoto (UEC), Thomas Silverston (Shibaura Inst. Tech.)
(To be available after the conference date) [more]
IA, ICSS 2021-06-22
09:50
Online Online Etherpot: A honeypot for observing cyberattacks on Ethereum client
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] IA2021-11 ICSS2021-11
pp.56-61
ICM 2021-03-19
10:50
Online Online [Encouragement Talk] Utility of Training Data in Sequential Accumulation Learning-Based Anomaly Detection
Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2020-69
In Network-based Intrusion Detection Systems (NIDS) using supervised learning, one of important challengings is how to c... [more] ICM2020-69
pp.52-57
WBS, IT, ISEC 2021-03-05
13:55
Online Online Analysis of Attack Activities for Honeypot Installation in Ethereum Network.
Chin Kota, Omote Kazumasa (Univ. Tsukuba) IT2020-155 ISEC2020-85 WBS2020-74
In recent years, cryptocurrencies based on blockchain have been attracting much attention, and related research has repo... [more] IT2020-155 ISEC2020-85 WBS2020-74
pp.265-272
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
ICM 2020-03-03
10:00
Okinawa Ohama Nobumoto Memorial Hall
(Cancelled but technical report was issued)
Automatic Accumulation of Learning Data on Learning-based Anomaly Detection Utilizing Communication Traffics
Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2019-50
With the advancement and diversification of information infrastructure in recent years, the importance
of network secur... [more]
ICM2019-50
pp.49-54
ICSS, IPSJ-SPT 2020-03-02
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
pp.79-84
ICSS, IPSJ-SPT 2020-03-03
09:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] ICSS2019-85
pp.103-108
RISING
(2nd)
2019-11-26
14:10
Tokyo Fukutake Learning Theater, Hongo Campus, Univ. Tokyo Due to the sophistication and diversification of information infrastructure in recent years, the risk due to connections... [more]
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:45
Kochi Kochi University of Technology Profiling of malicious users towards honeypot installation in the blockchain network
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2019-14 SITE2019-8 BioX2019-6 HWS2019-9 ICSS2019-12 EMM2019-17
Blockchain is a service operated by P2P type distributed network, and protocol control such as JSON-RPC is implemented a... [more] ISEC2019-14 SITE2019-8 BioX2019-6 HWS2019-9 ICSS2019-12 EMM2019-17
pp.15-22
ICSS, IPSJ-SPT 2018-03-08
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Analyzing Victims of DRDoS Attacks Observed by Honeypots
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] ICSS2017-83
pp.205-210
ISEC, COMP 2017-12-21
09:55
Kochi Eikokuji Campus, Kochi University of Technology Fundamental Study of Classification of Attackers by Multiple Honeypots
Kazuya Yamashita, Okino Koji (Univ. of Toyama) ISEC2017-72 COMP2017-26
It is known that stored information in a honeypot is affected by its environment of observation, such as its response an... [more] ISEC2017-72 COMP2017-26
pp.1-5
IA 2017-11-10
11:30
Kumamoto Hotel Greenpia Minamiaso Investigation of A Method for Detecting New Scanning Activities by Correlating Low-Interaction Honeypots with Darknet
Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-25
In this paper, we discuss a method for detecting new scanning activities by using low-interaction honeypots and darknet.... [more] IA2017-25
pp.13-18
IA 2017-11-10
11:55
Kumamoto Hotel Greenpia Minamiaso A Low-Interaction Honeypot Observing Potential Vulnerabilities against HTTP/2
Katsuki Koiwa, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-26
A honeypots are used as a mechanism to detect cyber attacks against unknown vulnerabilities. Honeypot is a decoy system... [more] IA2017-26
pp.19-23
 Results 1 - 20 of 43  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan