IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 31 of 31 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2014-11-28
11:35
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] ICSS2014-62
pp.67-72
IA 2014-09-12
11:00
Tokyo Tokyo Tech Front Use case analysis of TXT records in DNS
Hikaru Ichise, Jin Yong, Katsuyoshi Iida (Tokyo Inst. of Tech.) IA2014-16
Recent reports indicated that the DNS TXT record based bot communications can be used in the botnet attacks. Thus, it is... [more] IA2014-16
pp.13-18
ICSS, IPSJ-SPT 2014-03-28
11:40
Okinawa Meio Univiersity DNS Traffic Analysis Platform with Hadoop Framework
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] ICSS2013-80
pp.131-135
ICSS 2009-11-13
15:55
Miyazaki University of Miyazaki A Consideration of Feature Extraction for Attacks on Darknet
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] ICSS2009-60
pp.37-42
IN 2009-07-09
15:15
Hokkaido HOKKAIDO UNIVERSITY [Invited Talk] Anomalous Traffic Observed in DNS
Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] IN2009-28
pp.19-24
DC, CPSY 2009-04-21
14:30
Tokyo Akihabara Satellite Campus, Tokyo Metropolitan Univ. [Invited Talk] Evolution and threat of botnet
Toshiaki Sudou (NTT Communications) CPSY2009-6 DC2009-6
The damage of a variety of security problems such as Information leakage ,DDoS, and spam from terminal that hooks up to ... [more] CPSY2009-6 DC2009-6
pp.31-35
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. A study of incident detection based on correlation analysis between network traffic time series
Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more]
IT2008-93 ISEC2008-151 WBS2008-106
pp.321-328
IN 2009-02-05
16:20
Kagawa Kagawa University [Invited Talk] Outbound Intrusion Detection for Policy Watch
Satoru Torii (Fujitsu Labs) IN2008-126
The present condition, such as illegal access, a virus, and a botnet, is introduced. The trend of the network monitoring... [more] IN2008-126
pp.25-26
NS 2006-10-25
15:45
Gunma Kiryu City Performing Arts Center [Encouragement Talk] Analysis of Malicious Traffic in the mobile network
Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-111
As the mobile network evolutes to be “ubiquitous”, we have faced a paradigm shift: the interfaces of the mobile terminal... [more] NS2006-111
pp.69-72
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:20
Okayama Okayama Univ. A Proposal of Response Delay Method for Spam Mail from BOTNET
Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU)
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] ISEC2006-35 SITE2006-32
pp.191-197
NS 2006-04-21
10:25
Kochi   A Study on botnet detection and protection of the mobile network.
Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-13
As the mobile network evolutes to be “ubiquitous”, we acknowledge a paradigm shift: the interfaces of the mobile termin... [more] NS2006-13
pp.49-52
 Results 21 - 31 of 31 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan