|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2010-08-06 14:00 |
Tokyo |
IIJ Kanda Jinbocho Bldg. |
Study of impact on TLD DNS servers induced by lame delegations Izuru Shirai (Japan Registry Services Co., Ltd.) IA2010-22 |
In analyzing the DNS queries on TLD DNS servers, the number of periodical re-query from the same cache servers is detect... [more] |
IA2010-22 pp.37-40 |
IA, SITE |
2009-03-05 14:00 |
Kumamoto |
|
Evaluation of Black Domain List by Using DNS Query Graph Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato, Makoto Iwamura (NTT) SITE2008-47 IA2008-70 |
Botnet hosts, which can be controlled by malicious operators for executing DDoS attacks or spamming,
have been one of t... [more] |
SITE2008-47 IA2008-70 pp.19-24 |
IA, SITE |
2009-03-05 14:20 |
Kumamoto |
|
Entropy Study on A Resource Record DNS Query Traffic from the Campus Network Kazuya Takemori, Wei Juan Kong, Dennis Arturo Ludena Romana, Shinichiro Kubota, Kenichi Sugitani, Yasuo Musashi (Kumamoto Univ.) SITE2008-61 IA2008-84 |
We investigated the source IP address (SIP)- and query keyword (QK)-based entropy changes in the A and PTR resource reco... [more] |
SITE2008-61 IA2008-84 pp.101-106 |
ICM |
2008-05-09 12:10 |
Kagoshima |
Kagoshima Public Access Center |
DNS based Entropy and Forensic Analysis on the PCs for Learners in a University Dennis A. Ludena R., Shinichiro Kubota, Kenichi Sugitani, Yasuo Musashi (Kumamoto Univ.) ICM2008-19 |
We performed an entropy study on the DNS query traffic from the outside of a university campus network to the top domain... [more] |
ICM2008-19 pp.103-108 |
NS |
2007-10-19 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study on Network Architecture Based on New Addressing Scheme Correspond to Domain Name Eikei Seki, Takeshi Ikenaga (KIT) NS2007-92 |
The Domain Name System (DNS), which manages the mappings between domain name and IP address, is essential for the operat... [more] |
NS2007-92 pp.69-74 |
MoNA, IN (Joint) |
2005-11-18 14:30 |
Fukuoka |
Fukuoka Institute of Technology |
An FPGA Implementation of DNS Servers Using a Simple Hash Function Tadashi Saito, Shigetomo Kimura, Yoshihiko Ebihara (Univ. of Tsukuba), Koichiro Seto, Kenji Aoshima (Hitachi Cable) |
Recently, the Internet has been widely spread, and the number of its user has remarkably increased. When these users try... [more] |
IN2005-107 pp.43-47 |
CS, IN, NS (Joint) |
2005-09-16 09:00 |
Miyagi |
Tohoku Univ. |
Detecting Mass-mailing Worm with DNS Traffic Monitoring Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama (NTT) |
is often difficult to determine whether a DNS query is caused by malicious or normal activity, because
information... [more] |
IN2005-69 pp.49-54 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|