IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS
(Joint)
2023-03-03
10:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Defense Method with Drop-Request Protocol against DRDoS Attack
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-102
pp.217-222
IN, IA
(Joint)
2022-12-13
16:15
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Investigation of a drop request protocol for defense against DRDoS attacks
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-51
pp.40-45
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] ICSS2017-82
pp.199-204
ICSS, IPSJ-SPT 2018-03-08
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Analyzing Victims of DRDoS Attacks Observed by Honeypots
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] ICSS2017-83
pp.205-210
ICSS, IPSJ-SPT 2017-03-13
13:50
Nagasaki University of Nagasaki Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] ICSS2016-48
pp.13-18
IA 2007-10-25
16:45
Fukuoka Fukuoka SRP Center Building Application of the iTrace-PT Method to Reflector based DDoS Attack and Its Effect
Tomonori Takada, Masaya Nakayama (Univ. of Tokyo) IA2007-35
Recently, reflector-based DDoS (DRDoS) attack has become a new threat.
It uses DNS, Web, and other servers as reflector... [more]
IA2007-35
pp.27-31
CS, IN, NS
(Joint)
2005-09-16
09:50
Miyagi Tohoku Univ. A proposal of a Traceback method between ASes against DRDoS attacks
Teruaki Takahashi (Kogakuin Univ.), Toshihumi Kai (MEW, Ltd.), Katsuyuki Shinohara (Kogakuin Univ.)
In recent years, the damage by illegal access is seen as a problem with the development of the information infrastructur... [more] IN2005-71
pp.61-66
NS, CS, IN 2004-09-03
09:25
Miyagi Tohoku University Detecting DRDoS Attacks with Bidirectional Packet Confirmation
Atsunori Yamamoto (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Hiroshi Tsunoda, Nei Kato, Yoshiaki Nemoto (Tohoku Univ.)
In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from ... [more] NS2004-102 IN2004-61 CS2004-57
pp.7-12
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan