Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, IPSJ-CSEC, IPSJ-IOT |
2019-05-24 09:25 |
Osaka |
|
Feature Value for Low-Bandwidth L3, L4 DDoS Detection based on Number of 5-tuple Flows in 3-tuple Flow Yuhei Hayashi (NTT), Hikofumi Suzuki (Shindai), Takeaki Nishioka (NTT) ICM2019-5 |
Recently, new sophisticated attacks such as pulse-wave DDoS has been observed. The DDoS attack repeats short duration at... [more] |
ICM2019-5 pp.65-70 |
IN, NS (Joint) |
2019-03-05 14:10 |
Okinawa |
Okinawa Convention Center |
Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-271 pp.455-460 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 09:15 |
Ishikawa |
|
Development of System to Analyze Advanced Attacks Using Self-Organizing Map Akifumi Iwasa, Hikohmi Suzuki (Shinshu Univ.), Tetsuya Ui (NEC) NS2018-140 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
NS2018-140 pp.57-61 |
COMP |
2018-10-26 13:45 |
Kyoto |
Kyoto University |
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25 |
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] |
COMP2018-25 pp.33-39 |
IN, NS, CS, NV (Joint) |
2018-09-06 16:30 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
[Invited Lecture]
Layer-2 Network Control Techniques for Multi-service Accommodation toward 5G/IoT era Hiroyuki Uzawa, Takahiro Kubo, Yu Nakayama, Daisuke Hisano, Naotaka Shibata, Youichi Fukada, Jun Terada (NTT) NS2018-94 IN2018-28 CS2018-47 |
To realize cost-effective radio access system, a layer-2-based time-sensitive converged network that can aggregate mobil... [more] |
NS2018-94 IN2018-28 CS2018-47 pp.35-40 |
IA |
2018-09-04 15:15 |
Hokkaido |
Hokkaido Univ. Conference Hall |
A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28 |
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] |
IA2018-28 pp.77-81 |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-11 13:10 |
Hokkaido |
Hakodate Arena |
[Encouragement Talk]
Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-41 pp.25-30 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82 |
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] |
ICSS2017-82 pp.199-204 |
NS, IN (Joint) |
2018-03-01 09:40 |
Miyazaki |
Phoenix Seagaia Resort |
A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91 |
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more] |
IN2017-91 pp.11-14 |
NS, IN (Joint) |
2018-03-01 10:00 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92 |
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] |
IN2017-92 pp.15-20 |
NS, IN (Joint) |
2018-03-01 11:30 |
Miyazaki |
Phoenix Seagaia Resort |
Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2017-182 pp.85-90 |
NS, IN (Joint) |
2018-03-02 15:00 |
Miyazaki |
Phoenix Seagaia Resort |
Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more] |
NS2017-237 pp.391-396 |
SS, MSS |
2018-01-19 10:15 |
Hiroshima |
|
On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2 Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50 |
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] |
MSS2017-63 SS2017-50 pp.91-95 |
IA |
2017-11-15 14:40 |
Overseas |
KMITL, Bangkok, Thailand |
SDN based Design for Detection of Distributed Denial of Service (DDoS) attack Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong (PSU) IA2017-32 |
Networking Technologies are more advanced in Information and communication Technology (ICT). So,networking devices are n... [more] |
IA2017-32 pp.13-18 |
IA |
2017-11-10 10:40 |
Kumamoto |
Hotel Greenpia Minamiaso |
Evaluation of DDoS Mitigation Method based on Diffusion Flow Control Kuya Taira, Chisa Takano, Kaori Maeda (HCU) IA2017-23 |
In recent years, a DDoS attack that intentionally sends a large amount of data from multiple computers to a specific org... [more] |
IA2017-23 pp.1-6 |
NS |
2017-10-27 11:35 |
Osaka |
I-site nanba |
A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
NS2017-110 pp.95-100 |
SIP |
2017-08-24 14:15 |
Tokyo |
Tokyo Denki University |
A DDoS Attack Detection Based on Group Sparsities of OD Flow Matrices Masaya Endo, Masao Yamagishi, Isao Yamada (Tokyo Inst. of Tech.) SIP2017-52 |
To realize effective detection schemes applicable to diverse network traffic anomalies, we first propose to use group sp... [more] |
SIP2017-52 pp.21-26 |
CCS |
2017-08-11 13:30 |
Hokkaido |
Bibai Onsen Yu-rinkan |
Proposal of DDoS Mitigation System based on Diffusion Flow Control Kuya Taira, Chisa Takano, Kaori Maeda (Hiroshima City Univ.) CCS2017-19 |
A DNS amplification attack greatly affects not only the load of the target server but also the load of the networks on r... [more] |
CCS2017-19 pp.51-56 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 11:40 |
Okinawa |
Kumejima Island |
Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96 |
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] |
CPSY2016-150 DC2016-96 pp.327-332 |
NS, IN (Joint) |
2017-03-03 14:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251 |
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] |
NS2016-251 pp.541-546 |