IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 105 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, IPSJ-CSEC, IPSJ-IOT 2019-05-24
09:25
Osaka   Feature Value for Low-Bandwidth L3, L4 DDoS Detection based on Number of 5-tuple Flows in 3-tuple Flow
Yuhei Hayashi (NTT), Hikofumi Suzuki (Shindai), Takeaki Nishioka (NTT) ICM2019-5
Recently, new sophisticated attacks such as pulse-wave DDoS has been observed. The DDoS attack repeats short duration at... [more] ICM2019-5
pp.65-70
IN, NS
(Joint)
2019-03-05
14:10
Okinawa Okinawa Convention Center Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack
Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-271
pp.455-460
CQ, ICM, NS, NV
(Joint)
2018-11-16
09:15
Ishikawa   Development of System to Analyze Advanced Attacks Using Self-Organizing Map
Akifumi Iwasa, Hikohmi Suzuki (Shinshu Univ.), Tetsuya Ui (NEC) NS2018-140
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] NS2018-140
pp.57-61
COMP 2018-10-26
13:45
Kyoto Kyoto University
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] COMP2018-25
pp.33-39
IN, NS, CS, NV
(Joint)
2018-09-06
16:30
Miyagi Research Institute of Electrical Communication, Tohoku Univ. [Invited Lecture] Layer-2 Network Control Techniques for Multi-service Accommodation toward 5G/IoT era
Hiroyuki Uzawa, Takahiro Kubo, Yu Nakayama, Daisuke Hisano, Naotaka Shibata, Youichi Fukada, Jun Terada (NTT) NS2018-94 IN2018-28 CS2018-47
To realize cost-effective radio access system, a layer-2-based time-sensitive converged network that can aggregate mobil... [more] NS2018-94 IN2018-28 CS2018-47
pp.35-40
IA 2018-09-04
15:15
Hokkaido Hokkaido Univ. Conference Hall A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space
Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] IA2018-28
pp.77-81
ASN, NS, RCS, SR, RCC
(Joint)
2018-07-11
13:10
Hokkaido Hakodate Arena [Encouragement Talk] Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-41
pp.25-30
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] ICSS2017-82
pp.199-204
NS, IN
(Joint)
2018-03-01
09:40
Miyazaki Phoenix Seagaia Resort A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks
Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more]
IN2017-91
pp.11-14
NS, IN
(Joint)
2018-03-01
10:00
Miyazaki Phoenix Seagaia Resort A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems
Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] IN2017-92
pp.15-20
NS, IN
(Joint)
2018-03-01
11:30
Miyazaki Phoenix Seagaia Resort Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet
Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2017-182
pp.85-90
NS, IN
(Joint)
2018-03-02
15:00
Miyazaki Phoenix Seagaia Resort Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure
Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more]
NS2017-237
pp.391-396
SS, MSS 2018-01-19
10:15
Hiroshima   On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2
Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] MSS2017-63 SS2017-50
pp.91-95
IA 2017-11-15
14:40
Overseas KMITL, Bangkok, Thailand SDN based Design for Detection of Distributed Denial of Service (DDoS) attack
Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong (PSU) IA2017-32
Networking Technologies are more advanced in Information and communication Technology (ICT). So,networking devices are n... [more] IA2017-32
pp.13-18
IA 2017-11-10
10:40
Kumamoto Hotel Greenpia Minamiaso Evaluation of DDoS Mitigation Method based on Diffusion Flow Control
Kuya Taira, Chisa Takano, Kaori Maeda (HCU) IA2017-23
In recent years, a DDoS attack that intentionally sends a large amount of data from multiple computers to a specific org... [more] IA2017-23
pp.1-6
NS 2017-10-27
11:35
Osaka I-site nanba A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture
Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] NS2017-110
pp.95-100
SIP 2017-08-24
14:15
Tokyo Tokyo Denki University A DDoS Attack Detection Based on Group Sparsities of OD Flow Matrices
Masaya Endo, Masao Yamagishi, Isao Yamada (Tokyo Inst. of Tech.) SIP2017-52
To realize effective detection schemes applicable to diverse network traffic anomalies, we first propose to use group sp... [more] SIP2017-52
pp.21-26
CCS 2017-08-11
13:30
Hokkaido Bibai Onsen Yu-rinkan Proposal of DDoS Mitigation System based on Diffusion Flow Control
Kuya Taira, Chisa Takano, Kaori Maeda (Hiroshima City Univ.) CCS2017-19
A DNS amplification attack greatly affects not only the load of the target server but also the load of the networks on r... [more] CCS2017-19
pp.51-56
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-10
11:40
Okinawa Kumejima Island Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts
Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] CPSY2016-150 DC2016-96
pp.327-332
NS, IN
(Joint)
2017-03-03
14:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet
Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] NS2016-251
pp.541-546
 Results 21 - 40 of 105 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan