IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:00
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more]
SITE2023-83 IA2023-89
pp.92-97
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
NS, ICM, CQ, NV
(Joint)
2022-11-24
18:05
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] NS2022-116
pp.91-96
IA, ICSS 2022-06-24
11:25
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more]
IA2022-13 ICSS2022-13
pp.71-75
IA, ICSS 2022-06-24
11:50
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] IA2022-14 ICSS2022-14
pp.76-80
IA, SITE, IPSJ-IOT [detail] 2022-03-08
14:20
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A proposal of detection system for malicious DoH communication generated by DGA-based malware
Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72
(To be available after the conference date) [more] SITE2021-59 IA2021-72
pp.79-82
IA 2021-09-08
15:15
Online Online Detection and blocking system for suspicious DNS outbound query using RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] IA2021-24
pp.59-64
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
IA, SITE, IPSJ-IOT [detail] 2020-03-02
14:05
Online Online Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses
Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] SITE2019-89 IA2019-67
pp.7-12
KBSE, SC 2019-11-08
13:30
Nagano Shinshu University Malicious Domain Names Detection Based on TF-IDE and Variational Autoencoder: Classification with Quantum-enhanced Support Vector Machine
Yuwei Sun (UTokyo), Ng S. T. Chong (UNU), Hideya Ochiai (UTokyo) KBSE2019-26 SC2019-23
With the development of network technology, the use of domain name system (DNS) becomes common. However, the attacks on ... [more] KBSE2019-26 SC2019-23
pp.19-23
NS, IN, CS, NV
(Joint)
2019-09-06
11:15
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study on Features Derived from Cache Property for DNS Tunneling Detection
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] NS2019-93
pp.25-30
IN, NS
(Joint)
2019-03-05
11:50
Okinawa Okinawa Convention Center Proposal of malicious device detection method by DNS query/response log analysis using machine learning
Issei Nakasone, Kitaguchi Yoshiaki, Yamaoka Katsunori (Tokyo Tech) IN2018-129
One common way for detecting malware devices in a network is to use a blacklist based on signature detection.However, in... [more] IN2018-129
pp.271-276
IA, SITE, IPSJ-IOT [detail] 2016-03-03
13:00
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services
Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] SITE2015-58 IA2015-90
pp.55-60
IA, SITE, IPSJ-IOT [detail] 2016-03-03
14:15
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Detection and Control of DNS-based Botnet Communications by using SDN-Ryu Solution
Sebastian Li, Yong Jin, Katsuyoshi Iida (Tokyo Tech) SITE2015-61 IA2015-93
Domain Name System (DNS) is the most widely used protocol in the Internet for domain name Resolution. Since DNS provides... [more] SITE2015-61 IA2015-93
pp.73-78
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS, IPSJ-SPT 2014-03-28
11:40
Okinawa Meio Univiersity DNS Traffic Analysis Platform with Hadoop Framework
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] ICSS2013-80
pp.131-135
IA, SITE 2009-03-05
14:20
Kumamoto   Entropy Study on A Resource Record DNS Query Traffic from the Campus Network
Kazuya Takemori, Wei Juan Kong, Dennis Arturo Ludena Romana, Shinichiro Kubota, Kenichi Sugitani, Yasuo Musashi (Kumamoto Univ.) SITE2008-61 IA2008-84
We investigated the source IP address (SIP)- and query keyword (QK)-based entropy changes in the A and PTR resource reco... [more] SITE2008-61 IA2008-84
pp.101-106
IA, SITE 2009-03-05
21:40
Kumamoto   Installation of Security Policy into Kumamoto University and DNS based Detection of Security Incidents in the Campus Network
Yasuo Musashi (Kumamoto Univ.) SITE2008-76 IA2008-99
In Kumamoto University, we created policies and standards through August 2001 to February 2003, and procedures through M... [more] SITE2008-76 IA2008-99
pp.191-196
CS, IN, NS
(Joint)
2008-09-11
10:40
Miyagi Tohoku University Anomaly Client Detection Monitoring DNS Server Traffic
Akira Yamada, Yutaka Miyake (KDDI Labs.), Masahiro Terabe, Kazuo Hashimoto, Nei Kato (Tohoku Univ.) NS2008-44
Most protocols, such as HTTP or SMTP are based on the Domain Name System (DNS) as the name resolution. Because these cli... [more] NS2008-44
pp.11-16
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan