IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 105 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, ICTSSL, NWS
(Joint)
2016-10-21
10:20
Osaka Osaka Uinv. A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems
Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] IN2016-58
pp.55-60
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Evaluation of the attack detection method based on duration of continuous packet arrival
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] ICSS2015-56
pp.53-58
ICSS, IPSJ-SPT 2016-03-04
14:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] ICSS2015-67
pp.123-128
ICSS 2015-11-26
14:35
Fukushima AIST, Fukushima Renewable Energy Institute TCP Behavior-based Slow DoS Attack Detection
Hiroyuki Nooka, Kazunori Kamiya, Hiroshi Kurakami, Takeshi Yada (NTT) ICSS2015-37
In this paper, we discuss the detection of a form of DoS/DDoS attack known as Slow DoS.
Currently, countermeasures agai... [more]
ICSS2015-37
pp.13-18
CQ, ICM, NS
(Joint)
2015-11-27
10:50
Niigata Niigata University Bandwidth Control Method for DDoS Mitigation considering QoS Fairness of users
Kazufumi Yogo, Nobuya Shirai, Masao Aihara (NTT) NS2015-123
In recent years, cyber-attacks tend to increase and be diverse. In particular, DDoS attack, which is possible to consume... [more] NS2015-123
pp.69-74
CS 2015-11-12
10:45
Hokkaido Hotel Taisetsu (Sounkyo Spa, Hokkaido) Target Link Flooding Attack Prevention Scheme by Monitoring Traceroute Packets Flow
Takayuki Hirayama, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-48
Recently, target link flooding attack has been reported as a threatful DDoS (Distributed Denial of Ser-
vice) attack. T... [more]
CS2015-48
pp.19-24
LOIS, ISEC, SITE 2015-11-07
11:20
Kanagawa Kanagawa Univ. A dynamic filtering method to reduce DDoS packets by using access tokens
Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) ISEC2015-53 SITE2015-40 LOIS2015-47
The flow controls on packets in transmission channel are general measures against DDoS (Distributed Denial of Service) a... [more] ISEC2015-53 SITE2015-40 LOIS2015-47
pp.111-116
NS 2015-05-22
09:55
Tokyo Tokyo Univ. A Study of Algorithm for Mitigating Large-Scale DDoS Attacks based on the Available Bandwidth
Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) NS2015-25
In case that ISPs detect a massive DDoS attack against a specifit destination IP address, they usually forward the DDoS ... [more] NS2015-25
pp.59-64
ISEC 2014-12-19
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. Space-Time Encoding Schemes with No False Positives
Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] ISEC2014-71
pp.11-15
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
IN, NV
(Joint)
2014-07-18
16:30
Hokkaido Hokkaido Univ. Proposal of loadbalancing DDoS traffic for virtual datacenters
Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume (NTT) IN2014-48
In recent years, DDoS(Distributed Denial of Service) attacks have widely occurred in networks.
DDoS attacks are sent h... [more]
IN2014-48
pp.107-112
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:15
Hokkaido San-Refure Hakodate DDoS Attack Path Reconstruction in Space-Time Encoding Schemes
Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
pp.315-319
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:30
Nara Todaiji Total Cultural Center Proposal of DDoS attack mitigation using two-step map table lookup on LISP
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] SITE2012-51 IA2012-89
pp.37-42
IA 2012-11-19
18:00
Fukushima Kanponoyado Iwaki (Fukushima) Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more]
IA2012-58
pp.35-40
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:50
Hokkaido   Proposal of Virtual Experimental System for Computer Virus Infection Situation
Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34
We have been researching individual behavior and consciousness under
computer virus infection. The situation under viru... [more]
ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34
pp.229-235
ICM 2012-07-12
14:00
Hokkaido   [Invited Talk] Issues facing in the field of backbone operation and our efforts
Naoki Mashiko, Kiyohiro Muranaka (NTT Communications) ICM2012-21
Challenges in the field as a backbone operations and monitoring, such as a corresponding of large-scale DDoS and ever-... [more] ICM2012-21
p.19
SITE, IPSJ-CE 2011-12-17
16:15
Shimane   Study on Consciousness and Behavior under Computer Virus Infection
Shun-ichi Kurino, Kazumi Ito, Yuki Ikeda, Noriaki Yoshikai (Nihon Univ.) SITE2011-30
We have been researching individual behavior and consciousness under computer virus infection. The situation under virus... [more] SITE2011-30
pp.29-34
NS, RCS
(Joint)
2011-12-16
15:30
Yamaguchi Yamaguchi University DDoS Attack Detection and Avoidance Mechanism Using Relay Priority for MANET
Qi Wang, Ryo Yamamoto, Yoshiaki Tanaka (Waseda Univ.) NS2011-144
DDoS attack is becoming a serious problem in mobile ad hoc networks. In the attack, widely distributed malicious nodes ... [more] NS2011-144
pp.149-152
SITE, IPSJ-EIP 2011-05-19
10:25
Tokyo Tokyo Univ. of Science A study on Action research and Antivirus awareness that uses Boolean Analysis
Nobuo Iiduka, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2011-2
A virus infection situation can be considered a kind of state of panic. Although such a situation is an area applicable ... [more] SITE2011-2
pp.5-10
ICM 2011-03-11
17:30
Okinawa Miyakojima Marine Terminal Identifying the Anomalous Traffic Using unsupervised learning of Traffic Distribution
Hiroshi Yoshida, Haruo Oishi, Akiyuki Takeda, Hideaki Harada (NTT) ICM2010-75
DDoS (Distributed Denial of Service) attacks cause serious damage for services. For a early recovery against attacks, qu... [more] ICM2010-75
pp.121-126
 Results 41 - 60 of 105 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan