Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, NWS (Joint) |
2021-01-22 13:30 |
Online |
Online |
[Encouragement Talk]
A Study on Detection and Prevention of Stealthy DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116 |
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] |
NS2020-116 pp.31-36 |
ICSS |
2020-11-26 14:00 |
Online |
Online |
Malware detection for IoT devices using whitelist and Isolation Forest Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake (KDDI Research) ICSS2020-20 |
As the number of IoT (Internet of Things) devices increases, the countermeasures against cyberattacks related to IoT dev... [more] |
ICSS2020-20 pp.7-12 |
NS |
2020-04-16 13:50 |
Online |
Online |
A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2 |
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] |
NS2020-2 pp.7-12 |
SSS |
2018-06-20 13:00 |
Tokyo |
|
Application of Rationality diagnosis to Railway Signalling system
-- Application to Closing Signal machine -- Yusuke Takano, Takashi Kawano (JRE) SSS2018-7 |
The railway signal system is a system to prevent train collision and derailment and to support safe and stable transport... [more] |
SSS2018-7 pp.1-4 |
ICM |
2018-03-09 11:50 |
Okinawa |
|
[Encouragement Talk]
Evaluation of the improvement method on the regular expressions generator for the log monitoring Shinichiro Goto, Toyonori Fujiura, Masafumi Higuchi (NTT) ICM2017-72 |
We proposed the efficient generating method of whitelists for log monitoring, and showed its effectiveness. However, in... [more] |
ICM2017-72 pp.97-101 |
ICSS, IPSJ-SPT |
2018-03-07 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of security requirements and function implementation for home networks in a period of IoT expansion Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59 |
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] |
ICSS2017-59 pp.49-54 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-06 12:05 |
Tochigi |
Kinugawa Onsen Hotel |
Evaluation for application of white list based network switches to hospital network systems Osamu Takaki (Gunma Univ.), Keigo Uchizumi, Ichiroh Suzuta (ALAXALA Networks Corp.), Kota Torikai, Yuichiro Saito (Gunma Univ.), Tetsuya Sato, Hiroki Endo (Carecom Corp.), Yoshifumi Atarashi (ALAXALA Networks Corp.) SITE2017-73 IA2017-84 |
It is useful to apply a network switch, which is called a white list switch or WLS, with monitoring and/or filtering fun... [more] |
SITE2017-73 IA2017-84 pp.193-198 |
SIP |
2017-08-24 15:40 |
Tokyo |
Tokyo Denki University |
[Special Invited Talk]
Cyber security in IoT Era Hiroshi Yasuda (TDU) |
This paper first describes research on image compression technology and related international standardization activity w... [more] |
|
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
A Study on Parameter Adjustment of Whitelist Detection Rule Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) ICSS2016-56 |
Recently, the whitelist detection rule has been used as security measures for various system such control systems.
Only... [more] |
ICSS2016-56 pp.97-102 |
ICM, LOIS |
2017-01-20 11:10 |
Nagasaki |
The Nagasaki Chamber of Commerce & Industry |
A Study on Improving the Operationality and the Performance of the Whitelist Generator Shinichiro Goto, Hiroki Miura, Tetsuaki Kamata, Toyonori Fujiura, Masayoshi Nose (NTT) ICM2016-51 LOIS2016-60 |
We have proposed a log filtering method using whitelists with numeric character regular expression, and validated it thr... [more] |
ICM2016-51 LOIS2016-60 pp.69-74 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-27 13:40 |
Shimane |
|
Feasibility study of an Automated Whitelist Generator for Log Monitoring Hiroki Miura, Tetsuaki Kamata, Toyonori Fujiura, Yuzuru Mori (NTT) ICM2016-7 |
The log monitoring with the white list has a big problem that takes to create a white list.
So far, we proposed an Auto... [more] |
ICM2016-7 pp.139-144 |
IA |
2016-01-29 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Neutralization of malware-polluted IoT by limiting communications partners using MLB router Yuto Yamamoto, Soushu Kawashita, Shingo Tanaka, Hiroshi Yamaki, Hiroshi kobayashi (Tokyo Denki Univ) IA2015-86 |
Security measures of IoT devices and social infrastructure have become urgent issues. A bidirectional white list to limi... [more] |
IA2015-86 pp.43-48 |
CQ, ICM, NS (Joint) |
2015-11-27 09:00 |
Niigata |
Niigata University |
An Automated Whitelist Generator for Log Monitoring Atsushi Sasaki, Toyonori Fujiura, Tetsuaki Kamata, Yuzuru Mori (NTT) ICM2015-22 |
We have traditionally monitored log messages in system managements mainly with a blacklist, whether the log messages coi... [more] |
ICM2015-22 pp.27-32 |
LOIS, ISEC, SITE |
2015-11-07 11:20 |
Kanagawa |
Kanagawa Univ. |
A dynamic filtering method to reduce DDoS packets by using access tokens Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) ISEC2015-53 SITE2015-40 LOIS2015-47 |
The flow controls on packets in transmission channel are general measures against DDoS (Distributed Denial of Service) a... [more] |
ISEC2015-53 SITE2015-40 LOIS2015-47 pp.111-116 |
IN |
2011-01-21 14:55 |
Osaka |
Osaka Univ. |
Face Routing Protocol based on Incomplete Location Information of Neighbor Nodes Tomokazu Ezaki, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-137 |
In Face ad-hoc routing protocols, a wireless multihop transmission route from a source node to a destination one is dete... [more] |
IN2010-137 pp.109-114 |
IN |
2007-06-22 14:35 |
Hokkaido |
Future University-Hakodate |
Identifying Worm-Infected Hosts Using White List Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24 |
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] |
IN2007-24 pp.79-84 |