Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 17:20 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Event-Triggered Control of Distributed Network Systems under DoS Attacks Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) |
(To be available after the conference date) [more] |
|
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221 |
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] |
NS2023-221 pp.288-293 |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
DDoS Attack Evaluation Against Tele-Operated Driving System in 5G MEC Scenarios Masato Osumi, Daishi Kondo, Hideki Tode (OMU) NS2023-228 |
MEC technology, which combines 5G communication with edge computing that places computing resources in edge network, has... [more] |
NS2023-228 pp.329-335 |
IN, IA (Joint) |
2023-12-22 15:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55 |
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more] |
IA2023-55 pp.59-66 |
ICSS |
2023-11-17 13:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Analysis of the influence of DDoS attacks on Snort and legitimate users Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65 |
(To be available after the conference date) [more] |
ICSS2023-65 pp.101-107 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of Snort's impact due to DDoS attacks Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 |
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] |
ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 pp.127-132 |
IN, NS (Joint) |
2023-03-03 10:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A Defense Method with Drop-Request Protocol against DRDoS Attack Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-102 pp.217-222 |
PN |
2023-03-02 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Distributed DDoS Protection Method in the Core Network with Reconfigurable Device Edge Coordination Tomoki Naoi, Masaki Murakami, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka (Keidai) PN2022-58 |
Distributed Denial-of-Service (DDoS) attacks are a growing problem today, and it is difficult for individual users to mi... [more] |
PN2022-58 pp.83-89 |
IN, IA (Joint) |
2022-12-13 16:15 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Investigation of a drop request protocol for defense against DRDoS attacks Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-51 pp.40-45 |
R |
2022-06-16 14:50 |
Online |
Online |
A Note on Interval Reliability Analysis of Intrusion Tolerant Systems Subject to DoS Attacks Junjun Zheng (Ritsumeikan Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-8 |
This paper focuses on the transient behavior of intrusion tolerant systems with preventive maintenance subject to DoS (D... [more] |
R2022-8 pp.13-18 |
CCS, NLP |
2022-06-09 13:00 |
Osaka |
(Primary: On-site, Secondary: Online) |
Conditional entropy based DDoS Attack detection in Software Defined Network Tian QiWen, miyata sumiko (SIT) NLP2022-1 CCS2022-1 |
In order to detect each network attack in an SDN environment, an attack detection method has been proposed based on the ... [more] |
NLP2022-1 CCS2022-1 pp.1-6 |
NS |
2022-05-13 10:15 |
Kyoto |
Rakuyu Kaikan, Kyoto Univ. + Online (Primary: On-site, Secondary: Online) |
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16 |
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] |
NS2022-16 pp.40-46 |
ICSS |
2021-11-30 09:30 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54 |
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more] |
ICSS2021-54 pp.49-54 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes Koki Tamura, Yuichi Futa (TUT) ICSS2020-46 |
In this paper, We propose an attack detection system using multiple thresholds in order to increase the detection rate o... [more] |
ICSS2020-46 pp.120-125 |
NS, NWS (Joint) |
2021-01-22 13:30 |
Online |
Online |
[Encouragement Talk]
A Study on Detection and Prevention of Stealthy DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116 |
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] |
NS2020-116 pp.31-36 |
CQ, CBE (Joint) |
2021-01-22 10:10 |
Online |
Online |
Improvement Using White List and QoS Control for SYN Cookie Method Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93 |
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] |
CQ2020-93 pp.116-121 |
SRW, SeMI, CNR (Joint) |
2020-11-26 17:20 |
Online |
Online |
[Poster Presentation]
Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32 |
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] |
SeMI2020-32 pp.67-72 |
IA |
2020-11-09 14:57 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Development and evaluation of efficient vulnerability scanning system for IoT networks Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19 |
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] |
IA2020-19 pp.7-12 |