Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2020-03-03 09:50 |
Kagoshima |
(Cancelled but technical report was issued) |
DDoS defense method by logically isolating attackers Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63 |
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] |
PN2019-63 pp.65-71 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
PN |
2019-11-14 17:20 |
Kanagawa |
|
Network-based DDoS prevention with newly developed Reconfigurable Communication Processors Naoto Sumita, Masaki Murakami, Yu Nishio, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-26 |
In order to cope with traffic growth and service diversity the Photonic Network Processor (PNP) has been proposed. As a ... [more] |
PN2019-26 pp.15-22 |
IA, ICSS |
2019-06-07 11:20 |
Miyagi |
Research Institute for Electrical Communication, Tohoku University |
Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
IA2019-8 ICSS2019-8 pp.37-41 |
ICM, IPSJ-CSEC, IPSJ-IOT |
2019-05-24 09:25 |
Osaka |
|
Feature Value for Low-Bandwidth L3, L4 DDoS Detection based on Number of 5-tuple Flows in 3-tuple Flow Yuhei Hayashi (NTT), Hikofumi Suzuki (Shindai), Takeaki Nishioka (NTT) ICM2019-5 |
Recently, new sophisticated attacks such as pulse-wave DDoS has been observed. The DDoS attack repeats short duration at... [more] |
ICM2019-5 pp.65-70 |
IN, NS (Joint) |
2019-03-05 11:30 |
Okinawa |
Okinawa Convention Center |
A Study on a DoS Resilient Publish/Subscribe Protocol in NDN-based Ad-Hoc Networks Yasunaga Murai, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2018-119 |
Asynchronous group communications are useful for delivering messages among members who perform mission critical tasks, s... [more] |
IN2018-119 pp.211-216 |
IN, NS (Joint) |
2019-03-05 14:10 |
Okinawa |
Okinawa Convention Center |
Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-271 pp.455-460 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 09:15 |
Ishikawa |
|
Development of System to Analyze Advanced Attacks Using Self-Organizing Map Akifumi Iwasa, Hikohmi Suzuki (Shinshu Univ.), Tetsuya Ui (NEC) NS2018-140 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
NS2018-140 pp.57-61 |
COMP |
2018-10-26 13:45 |
Kyoto |
Kyoto University |
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25 |
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] |
COMP2018-25 pp.33-39 |
IN, NS, CS, NV (Joint) |
2018-09-06 16:30 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
[Invited Lecture]
Layer-2 Network Control Techniques for Multi-service Accommodation toward 5G/IoT era Hiroyuki Uzawa, Takahiro Kubo, Yu Nakayama, Daisuke Hisano, Naotaka Shibata, Youichi Fukada, Jun Terada (NTT) NS2018-94 IN2018-28 CS2018-47 |
To realize cost-effective radio access system, a layer-2-based time-sensitive converged network that can aggregate mobil... [more] |
NS2018-94 IN2018-28 CS2018-47 pp.35-40 |
IA |
2018-09-04 15:15 |
Hokkaido |
Hokkaido Univ. Conference Hall |
A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28 |
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] |
IA2018-28 pp.77-81 |
CS |
2018-07-12 10:59 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Study on Routing Control Method for DoS Attack Jun Kiyama, Takuya shindo, Takefumi Hiraguri (NIT) CS2018-24 |
DoS attack that attack a web service and the internet is a big problem in recent years, because DoS attack takes a resou... [more] |
CS2018-24 pp.67-70 |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-11 13:10 |
Hokkaido |
Hakodate Arena |
[Encouragement Talk]
Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-41 pp.25-30 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82 |
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] |
ICSS2017-82 pp.199-204 |
ICSS, IPSJ-SPT |
2018-03-08 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83 |
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] |
ICSS2017-83 pp.205-210 |
NS, IN (Joint) |
2018-03-01 09:40 |
Miyazaki |
Phoenix Seagaia Resort |
A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91 |
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more] |
IN2017-91 pp.11-14 |
NS, IN (Joint) |
2018-03-01 10:00 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92 |
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] |
IN2017-92 pp.15-20 |
NS, IN (Joint) |
2018-03-01 11:30 |
Miyazaki |
Phoenix Seagaia Resort |
Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2017-182 pp.85-90 |
NS, IN (Joint) |
2018-03-02 15:00 |
Miyazaki |
Phoenix Seagaia Resort |
Distributed High-Speed Packet Filtering System for Autonomous and Distributed Internet Security Infrastructure Hiroyuki Kimiyama, Yuya Kishi, Haruka Momo, Kaoru Sano, Naoki Yonezaki, Tomoaki Tsutsumi, Hirofumi Yamaki, Yoichiro Ueno, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-237 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to
protect our resources ... [more] |
NS2017-237 pp.391-396 |