Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2017-03-13 13:50 |
Nagasaki |
University of Nagasaki |
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48 |
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] |
ICSS2016-48 pp.13-18 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-47 |
IoTPOT, which we previously implemented as a honeypot system for embedded devices, can only emulate Telnet service. In t... [more] |
ICSS2015-47 pp.1-6 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Observing Cyber Attacks on Building Control System by Honeypot Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2015-48 |
Although several reports describe that scans on control system such as building control system have been increasing, the... [more] |
ICSS2015-48 pp.7-12 |
ICSS |
2015-03-04 12:05 |
Okinawa |
Meio Univiersity |
Finding Network Address Blocks Intensively Used for Cyber Attacks Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83 |
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] |
ICSS2014-83 pp.121-126 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
SITE |
2012-12-12 14:00 |
Osaka |
|
Trend and ethical problem of the honeypot Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45 |
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more] |
SITE2012-45 pp.13-18 |
IN, RCS (Joint) |
2012-05-17 15:50 |
Tokyo |
Kuramae-Kaikan, Tokyo Institute of Technology |
[Invited Talk]
Design of a blacklisting system for Countermeasures against Malware Infection Takeshi Yagi (NTT) IN2012-16 RCS2012-30 |
With the widespread use of the Internet, the number of security problems, such as phishing and spam, continues to steadi... [more] |
IN2012-16 RCS2012-30 pp.25-30(IN), pp.49-54(RCS) |
ICSS |
2012-03-16 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A malicious packet visualization in darknet and its application to malware analysis Naoto Sone (Naruto Univ.), Tatsuya Syoriki, Akihisa Torii, Taketo Murao, Masakatu Morii (Kobe Univ.) ICSS2011-46 |
We analyzed malicious IP packets in the darknet with visualization tool for IP packet which we developed. Furthermore ... [more] |
ICSS2011-46 pp.43-48 |
IA, ICSS |
2011-06-17 13:50 |
Fukuoka |
Kyushu Institute of Technology |
DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11 |
(To be available after the conference date) [more] |
IA2011-11 ICSS2011-11 pp.63-68 |
IA, ICSS |
2011-06-17 15:00 |
Fukuoka |
Kyushu Institute of Technology |
Analysis of Website Infections using Malware Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13 |
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] |
IA2011-13 ICSS2011-13 pp.75-80 |
IN, MoNA (Joint) |
2010-11-18 14:50 |
Fukuoka |
Fukuoka Institute of Technology |
Architecture Design of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85 |
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] |
IN2010-85 pp.25-30 |
IA, ICSS |
2010-06-18 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Empirical Investigation of Gumblar Evolution Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13 |
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more] |
IA2010-13 ICSS2010-13 pp.69-74 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
IN |
2010-02-04 13:00 |
Okinawa |
|
Development of Invasion Prevention System with NIDS and Honeypot Tetsuya Higa, Tomokazu Nagata, Yuji Taniguchi, Shiro Tamaki (Univ. of Ryukyu) IN2009-126 |
In recent years, the Internet becomes necessary to social and business infrastructure. Moreover, the Internet in spread,... [more] |
IN2009-126 pp.1-4 |
ICSS |
2009-11-13 16:20 |
Miyazaki |
University of Miyazaki |
The relation betwenn the arrangement of network sensors and the information obtained by the sensors Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more] |
|
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |