IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 136  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, MICT, WBS, RCC
(Joint) [detail]
2024-05-16
17:20
Miyazaki KITEN Convention hall (Miyazaki)
(Primary: On-site, Secondary: Online)
Event-Triggered Control of Distributed Network Systems under DoS Attacks
Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.)
(To be available after the conference date) [more]
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches
Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] NS2023-221
pp.288-293
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center DDoS Attack Evaluation Against Tele-Operated Driving System in 5G MEC Scenarios
Masato Osumi, Daishi Kondo, Hideki Tode (OMU) NS2023-228
MEC technology, which combines 5G communication with edge computing that places computing resources in edge network, has... [more] NS2023-228
pp.329-335
IN, IA
(Joint)
2023-12-22
15:40
Hiroshima Satellite Campus Hiroshima A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI
Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more]
IA2023-55
pp.59-66
ICSS 2023-11-17
13:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Analysis of the influence of DDoS attacks on Snort and legitimate users
Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65
(To be available after the conference date) [more] ICSS2023-65
pp.101-107
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:20
Hokkaido Hokkaido Jichiro Kaikan Analysis of Snort's impact due to DDoS attacks
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
pp.127-132
IN, NS
(Joint)
2023-03-03
10:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Defense Method with Drop-Request Protocol against DRDoS Attack
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-102
pp.217-222
PN 2023-03-02
11:40
Okinawa
(Primary: On-site, Secondary: Online)
Distributed DDoS Protection Method in the Core Network with Reconfigurable Device Edge Coordination
Tomoki Naoi, Masaki Murakami, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka (Keidai) PN2022-58
Distributed Denial-of-Service (DDoS) attacks are a growing problem today, and it is difficult for individual users to mi... [more] PN2022-58
pp.83-89
IN, IA
(Joint)
2022-12-13
16:15
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Investigation of a drop request protocol for defense against DRDoS attacks
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-51
pp.40-45
R 2022-06-16
14:50
Online Online A Note on Interval Reliability Analysis of Intrusion Tolerant Systems Subject to DoS Attacks
Junjun Zheng (Ritsumeikan Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-8
This paper focuses on the transient behavior of intrusion tolerant systems with preventive maintenance subject to DoS (D... [more] R2022-8
pp.13-18
CCS, NLP 2022-06-09
13:00
Osaka
(Primary: On-site, Secondary: Online)
Conditional entropy based DDoS Attack detection in Software Defined Network
Tian QiWen, miyata sumiko (SIT) NLP2022-1 CCS2022-1
In order to detect each network attack in an SDN environment, an attack detection method has been proposed based on the ... [more] NLP2022-1 CCS2022-1
pp.1-6
NS 2022-05-13
10:15
Kyoto Rakuyu Kaikan, Kyoto Univ. + Online
(Primary: On-site, Secondary: Online)
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN
Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] NS2022-16
pp.40-46
ICSS 2021-11-30
09:30
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis
Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more]
ICSS2021-54
pp.49-54
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
ICSS, IPSJ-SPT 2021-03-02
11:30
Online Online Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes
Koki Tamura, Yuichi Futa (TUT) ICSS2020-46
In this paper, We propose an attack detection system using multiple thresholds in order to increase the detection rate o... [more] ICSS2020-46
pp.120-125
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
CQ, CBE
(Joint)
2021-01-22
10:10
Online Online Improvement Using White List and QoS Control for SYN Cookie Method
Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] CQ2020-93
pp.116-121
SRW, SeMI, CNR
(Joint)
2020-11-26
17:20
Online Online [Poster Presentation] Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge
Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] SeMI2020-32
pp.67-72
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
 Results 1 - 20 of 136  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan