Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2014-11-28 11:35 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting infected hosts with machine learning analysis of DNS responses Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62 |
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] |
ICSS2014-62 pp.67-72 |
IA |
2014-09-12 11:00 |
Tokyo |
Tokyo Tech Front |
Use case analysis of TXT records in DNS Hikaru Ichise, Jin Yong, Katsuyoshi Iida (Tokyo Inst. of Tech.) IA2014-16 |
Recent reports indicated that the DNS TXT record based bot communications can be used in the botnet attacks. Thus, it is... [more] |
IA2014-16 pp.13-18 |
ICSS, IPSJ-SPT |
2014-03-28 11:40 |
Okinawa |
Meio Univiersity |
DNS Traffic Analysis Platform with Hadoop Framework Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80 |
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] |
ICSS2013-80 pp.131-135 |
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |
IN |
2009-07-09 15:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
Anomalous Traffic Observed in DNS Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28 |
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] |
IN2009-28 pp.19-24 |
DC, CPSY |
2009-04-21 14:30 |
Tokyo |
Akihabara Satellite Campus, Tokyo Metropolitan Univ. |
[Invited Talk]
Evolution and threat of botnet Toshiaki Sudou (NTT Communications) CPSY2009-6 DC2009-6 |
The damage of a variety of security problems such as Information leakage ,DDoS, and spam from terminal that hooks up to ... [more] |
CPSY2009-6 DC2009-6 pp.31-35 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
A study of incident detection based on correlation analysis between network traffic time series Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106 |
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more] |
IT2008-93 ISEC2008-151 WBS2008-106 pp.321-328 |
IN |
2009-02-05 16:20 |
Kagawa |
Kagawa University |
[Invited Talk]
Outbound Intrusion Detection for Policy Watch Satoru Torii (Fujitsu Labs) IN2008-126 |
The present condition, such as illegal access, a virus, and a botnet, is introduced. The trend of the network monitoring... [more] |
IN2008-126 pp.25-26 |
NS |
2006-10-25 15:45 |
Gunma |
Kiryu City Performing Arts Center |
[Encouragement Talk]
Analysis of Malicious Traffic in the mobile network Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-111 |
As the mobile network evolutes to be “ubiquitous”, we have faced a paradigm shift: the interfaces of the mobile terminal... [more] |
NS2006-111 pp.69-72 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:20 |
Okayama |
Okayama Univ. |
A Proposal of Response Delay Method for Spam Mail from BOTNET Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU) |
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] |
ISEC2006-35 SITE2006-32 pp.191-197 |
NS |
2006-04-21 10:25 |
Kochi |
|
A Study on botnet detection and protection of the mobile network. Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-13 |
As the mobile network evolutes to be “ubiquitous”, we acknowledge a paradigm shift: the interfaces of the mobile termin... [more] |
NS2006-13 pp.49-52 |