Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2022-11-21 15:55 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
The visibility of port scan traffic analysis in many small-scale darknets Kodai Mizutani, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-43 |
Darknets are one of information sources to grasp a trend of cyber-attcks. While the demand for IPv4 addresses is high, t... [more] |
IA2022-43 pp.39-46 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:45 |
Hokkaido |
Sapporo Convention Center |
Real-time Botnet Detection Using Nonnegative Tucker Decomposition Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 |
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] |
ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 pp.297-304 |
ISEC |
2018-05-16 14:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Analysis of the cryptocurrency network using darknet traffic Mitsuyoshi Imamura (Univ-Tsukuba/NomuraAM), Kazumasa Omote (Univ-Tsukuba) ISEC2018-6 |
Cryptocurrency such as bitcoins ia a peer-to-peer(P2P) network systems based on distributed ledger technology called blo... [more] |
ISEC2018-6 pp.29-34 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
IA, ICSS |
2015-06-12 14:10 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Can internet measurement be a noise for analysis of darknet? Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.) IA2015-15 ICSS2015-15 |
Darknet is a passive sensor system dedicated to monitoring traffic
routed to unused IP address space.
Darknets have be... [more] |
IA2015-15 ICSS2015-15 pp.81-86 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
IA, ICSS |
2013-06-21 13:50 |
Niigata |
Ao-re Nagaoka |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14 |
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] |
IA2013-14 ICSS2013-14 pp.79-84 |
ICSS |
2012-03-16 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A malicious packet visualization in darknet and its application to malware analysis Naoto Sone (Naruto Univ.), Tatsuya Syoriki, Akihisa Torii, Taketo Murao, Masakatu Morii (Kobe Univ.) ICSS2011-46 |
We analyzed malicious IP packets in the darknet with visualization tool for IP packet which we developed. Furthermore ... [more] |
ICSS2011-46 pp.43-48 |
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |