IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 43 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2017-03-13
13:50
Nagasaki University of Nagasaki Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] ICSS2016-48
pp.13-18
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] ICSS2016-57
pp.103-108
ICSS 2016-11-25
15:20
Kanagawa Institute of Information Security Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set
Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] ICSS2016-42
pp.21-26
ICSS, IPSJ-SPT 2016-03-03
12:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices
Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-47
IoTPOT, which we previously implemented as a honeypot system for embedded devices, can only emulate Telnet service. In t... [more] ICSS2015-47
pp.1-6
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University Observing Cyber Attacks on Building Control System by Honeypot
Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2015-48
Although several reports describe that scans on control system such as building control system have been increasing, the... [more] ICSS2015-48
pp.7-12
ICSS 2015-03-04
12:05
Okinawa Meio Univiersity Finding Network Address Blocks Intensively Used for Cyber Attacks
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] ICSS2014-83
pp.121-126
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
SITE 2012-12-12
14:00
Osaka   Trend and ethical problem of the honeypot
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more]
SITE2012-45
pp.13-18
IN, RCS
(Joint)
2012-05-17
15:50
Tokyo Kuramae-Kaikan, Tokyo Institute of Technology [Invited Talk] Design of a blacklisting system for Countermeasures against Malware Infection
Takeshi Yagi (NTT) IN2012-16 RCS2012-30
With the widespread use of the Internet, the number of security problems, such as phishing and spam, continues to steadi... [more] IN2012-16 RCS2012-30
pp.25-30(IN), pp.49-54(RCS)
ICSS 2012-03-16
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. A malicious packet visualization in darknet and its application to malware analysis
Naoto Sone (Naruto Univ.), Tatsuya Syoriki, Akihisa Torii, Taketo Murao, Masakatu Morii (Kobe Univ.) ICSS2011-46
We analyzed malicious IP packets in the darknet with visualization tool for IP packet which we developed. Furthermore ... [more] ICSS2011-46
pp.43-48
IA, ICSS 2011-06-17
13:50
Fukuoka Kyushu Institute of Technology DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11
(To be available after the conference date) [more] IA2011-11 ICSS2011-11
pp.63-68
IA, ICSS 2011-06-17
15:00
Fukuoka Kyushu Institute of Technology Analysis of Website Infections using Malware
Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] IA2011-13 ICSS2011-13
pp.75-80
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
IA, ICSS 2010-06-18
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Empirical Investigation of Gumblar Evolution
Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more]
IA2010-13 ICSS2010-13
pp.69-74
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
ICSS 2010-03-26
15:30
Fukuoka The University of Kitakyushu Investigation of Attacks to Websites using Multi-domain Web-based Honeypots
Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] ICSS2009-66
pp.25-28
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
IN 2010-02-04
13:00
Okinawa   Development of Invasion Prevention System with NIDS and Honeypot
Tetsuya Higa, Tomokazu Nagata, Yuji Taniguchi, Shiro Tamaki (Univ. of Ryukyu) IN2009-126
In recent years, the Internet becomes necessary to social and business infrastructure. Moreover, the Internet in spread,... [more] IN2009-126
pp.1-4
ICSS 2009-11-13
16:20
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
 Results 21 - 40 of 43 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan