Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2023-12-22 15:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55 |
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more] |
IA2023-55 pp.59-66 |
ICSS |
2023-11-17 13:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Analysis of the influence of DDoS attacks on Snort and legitimate users Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65 |
(To be available after the conference date) [more] |
ICSS2023-65 pp.101-107 |
IA |
2023-09-22 09:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Implementation of DDoS Detection and Automatic Mitigation System Using eBPF and XDP Atsuya Osaki, Seiki Makino (Keio), Ryusei Shiiba (Sokendai), Kensuke Fukuda (NII/Sokendai), Tadashi Okoshi, Jin Nakazawa (Keio) IA2023-21 |
(To be available after the conference date) [more] |
IA2023-21 pp.60-66 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of Snort's impact due to DDoS attacks Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 |
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] |
ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 pp.127-132 |
NS |
2022-05-13 10:15 |
Kyoto |
Rakuyu Kaikan, Kyoto Univ. + Online (Primary: On-site, Secondary: Online) |
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16 |
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] |
NS2022-16 pp.40-46 |
CQ, CBE (Joint) |
2021-01-22 10:10 |
Online |
Online |
Improvement Using White List and QoS Control for SYN Cookie Method Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93 |
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] |
CQ2020-93 pp.116-121 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
COMP |
2018-10-26 13:45 |
Kyoto |
Kyoto University |
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25 |
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] |
COMP2018-25 pp.33-39 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82 |
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] |
ICSS2017-82 pp.199-204 |
NS, IN (Joint) |
2018-03-01 09:40 |
Miyazaki |
Phoenix Seagaia Resort |
A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91 |
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more] |
IN2017-91 pp.11-14 |
NS, IN (Joint) |
2018-03-01 10:00 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92 |
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] |
IN2017-92 pp.15-20 |
NS, IN (Joint) |
2018-03-02 15:00 |
Miyazaki |
Phoenix Seagaia Resort |
Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more] |
NS2017-237 pp.391-396 |
IA |
2017-11-10 10:40 |
Kumamoto |
Hotel Greenpia Minamiaso |
Evaluation of DDoS Mitigation Method based on Diffusion Flow Control Kuya Taira, Chisa Takano, Kaori Maeda (HCU) IA2017-23 |
In recent years, a DDoS attack that intentionally sends a large amount of data from multiple computers to a specific org... [more] |
IA2017-23 pp.1-6 |
NS |
2017-10-27 11:35 |
Osaka |
I-site nanba |
A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
NS2017-110 pp.95-100 |
SIP |
2017-08-24 14:15 |
Tokyo |
Tokyo Denki University |
A DDoS Attack Detection Based on Group Sparsities of OD Flow Matrices Masaya Endo, Masao Yamagishi, Isao Yamada (Tokyo Inst. of Tech.) SIP2017-52 |
To realize effective detection schemes applicable to diverse network traffic anomalies, we first propose to use group sp... [more] |
SIP2017-52 pp.21-26 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 11:40 |
Okinawa |
Kumejima Island |
Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96 |
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] |
CPSY2016-150 DC2016-96 pp.327-332 |
NS, IN (Joint) |
2017-03-03 14:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251 |
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] |
NS2016-251 pp.541-546 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 10:20 |
Osaka |
Osaka Uinv. |
A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
IN2016-58 pp.55-60 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Evaluation of the attack detection method based on duration of continuous packet arrival Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56 |
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] |
ICSS2015-56 pp.53-58 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |