Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, ICTSSL, NWS (Joint) |
2016-10-21 10:20 |
Osaka |
Osaka Uinv. |
A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
IN2016-58 pp.55-60 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Evaluation of the attack detection method based on duration of continuous packet arrival Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56 |
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] |
ICSS2015-56 pp.53-58 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |
ICSS |
2015-11-26 14:35 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
TCP Behavior-based Slow DoS Attack Detection Hiroyuki Nooka, Kazunori Kamiya, Hiroshi Kurakami, Takeshi Yada (NTT) ICSS2015-37 |
In this paper, we discuss the detection of a form of DoS/DDoS attack known as Slow DoS.
Currently, countermeasures agai... [more] |
ICSS2015-37 pp.13-18 |
CQ, ICM, NS (Joint) |
2015-11-27 10:50 |
Niigata |
Niigata University |
Bandwidth Control Method for DDoS Mitigation considering QoS Fairness of users Kazufumi Yogo, Nobuya Shirai, Masao Aihara (NTT) NS2015-123 |
In recent years, cyber-attacks tend to increase and be diverse. In particular, DDoS attack, which is possible to consume... [more] |
NS2015-123 pp.69-74 |
CS |
2015-11-12 10:45 |
Hokkaido |
Hotel Taisetsu (Sounkyo Spa, Hokkaido) |
Target Link Flooding Attack Prevention Scheme by Monitoring Traceroute Packets Flow Takayuki Hirayama, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-48 |
Recently, target link flooding attack has been reported as a threatful DDoS (Distributed Denial of Ser-
vice) attack. T... [more] |
CS2015-48 pp.19-24 |
LOIS, ISEC, SITE |
2015-11-07 11:20 |
Kanagawa |
Kanagawa Univ. |
A dynamic filtering method to reduce DDoS packets by using access tokens Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) ISEC2015-53 SITE2015-40 LOIS2015-47 |
The flow controls on packets in transmission channel are general measures against DDoS (Distributed Denial of Service) a... [more] |
ISEC2015-53 SITE2015-40 LOIS2015-47 pp.111-116 |
NS |
2015-05-22 09:55 |
Tokyo |
Tokyo Univ. |
A Study of Algorithm for Mitigating Large-Scale DDoS Attacks based on the Available Bandwidth Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) NS2015-25 |
In case that ISPs detect a massive DDoS attack against a specifit destination IP address, they usually forward the DDoS ... [more] |
NS2015-25 pp.59-64 |
ISEC |
2014-12-19 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Space-Time Encoding Schemes with No False Positives Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71 |
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] |
ISEC2014-71 pp.11-15 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
IN, NV (Joint) |
2014-07-18 16:30 |
Hokkaido |
Hokkaido Univ. |
Proposal of loadbalancing DDoS traffic for virtual datacenters Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume (NTT) IN2014-48 |
In recent years, DDoS(Distributed Denial of Service) attacks have widely occurred in networks.
DDoS attacks are sent h... [more] |
IN2014-48 pp.107-112 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] |
ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 pp.315-319 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:30 |
Nara |
Todaiji Total Cultural Center |
Proposal of DDoS attack mitigation using two-step map table lookup on LISP Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] |
SITE2012-51 IA2012-89 pp.37-42 |
IA |
2012-11-19 18:00 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more] |
IA2012-58 pp.35-40 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:50 |
Hokkaido |
|
Proposal of Virtual Experimental System for Computer Virus Infection Situation Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 |
We have been researching individual behavior and consciousness under
computer virus infection. The situation under viru... [more] |
ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 pp.229-235 |
ICM |
2012-07-12 14:00 |
Hokkaido |
|
[Invited Talk]
Issues facing in the field of backbone operation and our efforts Naoki Mashiko, Kiyohiro Muranaka (NTT Communications) ICM2012-21 |
Challenges in the field as a backbone operations and monitoring, such as a corresponding of large-scale DDoS and ever-... [more] |
ICM2012-21 p.19 |
SITE, IPSJ-CE |
2011-12-17 16:15 |
Shimane |
|
Study on Consciousness and Behavior under Computer Virus Infection Shun-ichi Kurino, Kazumi Ito, Yuki Ikeda, Noriaki Yoshikai (Nihon Univ.) SITE2011-30 |
We have been researching individual behavior and consciousness under computer virus infection. The situation under virus... [more] |
SITE2011-30 pp.29-34 |
NS, RCS (Joint) |
2011-12-16 15:30 |
Yamaguchi |
Yamaguchi University |
DDoS Attack Detection and Avoidance Mechanism Using Relay Priority for MANET Qi Wang, Ryo Yamamoto, Yoshiaki Tanaka (Waseda Univ.) NS2011-144 |
DDoS attack is becoming a serious problem in mobile ad hoc networks. In the attack, widely distributed malicious nodes ... [more] |
NS2011-144 pp.149-152 |
SITE, IPSJ-EIP |
2011-05-19 10:25 |
Tokyo |
Tokyo Univ. of Science |
A study on Action research and Antivirus awareness that uses Boolean Analysis Nobuo Iiduka, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2011-2 |
A virus infection situation can be considered a kind of state of panic. Although such a situation is an area applicable ... [more] |
SITE2011-2 pp.5-10 |
ICM |
2011-03-11 17:30 |
Okinawa |
Miyakojima Marine Terminal |
Identifying the Anomalous Traffic Using unsupervised learning of Traffic Distribution Hiroshi Yoshida, Haruo Oishi, Akiyuki Takeda, Hideaki Harada (NTT) ICM2010-75 |
DDoS (Distributed Denial of Service) attacks cause serious damage for services. For a early recovery against attacks, qu... [more] |
ICM2010-75 pp.121-126 |