IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 56  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2023-12-22
15:40
Hiroshima Satellite Campus Hiroshima A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI
Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more]
IA2023-55
pp.59-66
ICSS 2023-11-17
13:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Analysis of the influence of DDoS attacks on Snort and legitimate users
Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65
(To be available after the conference date) [more] ICSS2023-65
pp.101-107
IA 2023-09-22
09:50
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Implementation of DDoS Detection and Automatic Mitigation System Using eBPF and XDP
Atsuya Osaki, Seiki Makino (Keio), Ryusei Shiiba (Sokendai), Kensuke Fukuda (NII/Sokendai), Tadashi Okoshi, Jin Nakazawa (Keio) IA2023-21
(To be available after the conference date) [more] IA2023-21
pp.60-66
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:20
Hokkaido Hokkaido Jichiro Kaikan Analysis of Snort's impact due to DDoS attacks
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
pp.127-132
NS 2022-05-13
10:15
Kyoto Rakuyu Kaikan, Kyoto Univ. + Online
(Primary: On-site, Secondary: Online)
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN
Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] NS2022-16
pp.40-46
CQ, CBE
(Joint)
2021-01-22
10:10
Online Online Improvement Using White List and QoS Control for SYN Cookie Method
Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] CQ2020-93
pp.116-121
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
COMP 2018-10-26
13:45
Kyoto Kyoto University
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] COMP2018-25
pp.33-39
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] ICSS2017-82
pp.199-204
NS, IN
(Joint)
2018-03-01
09:40
Miyazaki Phoenix Seagaia Resort A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks
Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more]
IN2017-91
pp.11-14
NS, IN
(Joint)
2018-03-01
10:00
Miyazaki Phoenix Seagaia Resort A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems
Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] IN2017-92
pp.15-20
NS, IN
(Joint)
2018-03-02
15:00
Miyazaki Phoenix Seagaia Resort Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure
Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more]
NS2017-237
pp.391-396
IA 2017-11-10
10:40
Kumamoto Hotel Greenpia Minamiaso Evaluation of DDoS Mitigation Method based on Diffusion Flow Control
Kuya Taira, Chisa Takano, Kaori Maeda (HCU) IA2017-23
In recent years, a DDoS attack that intentionally sends a large amount of data from multiple computers to a specific org... [more] IA2017-23
pp.1-6
NS 2017-10-27
11:35
Osaka I-site nanba A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture
Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] NS2017-110
pp.95-100
SIP 2017-08-24
14:15
Tokyo Tokyo Denki University A DDoS Attack Detection Based on Group Sparsities of OD Flow Matrices
Masaya Endo, Masao Yamagishi, Isao Yamada (Tokyo Inst. of Tech.) SIP2017-52
To realize effective detection schemes applicable to diverse network traffic anomalies, we first propose to use group sp... [more] SIP2017-52
pp.21-26
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-10
11:40
Okinawa Kumejima Island Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts
Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] CPSY2016-150 DC2016-96
pp.327-332
NS, IN
(Joint)
2017-03-03
14:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet
Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] NS2016-251
pp.541-546
IN, ICTSSL, NWS
(Joint)
2016-10-21
10:20
Osaka Osaka Uinv. A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems
Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] IN2016-58
pp.55-60
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Evaluation of the attack detection method based on duration of continuous packet arrival
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] ICSS2015-56
pp.53-58
ICSS, IPSJ-SPT 2016-03-04
14:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] ICSS2015-67
pp.123-128
 Results 1 - 20 of 56  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan