Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, CAS, MSS, VLD |
2017-06-19 11:40 |
Niigata |
Niigata University, Ikarashi Campus |
An Implementation Method of Reconfigurable Network Intrusion Detection Systems Based on Random Forests Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7 |
In this paper, we propose an implementation method of reconfigurable network intrusion detection system based on random ... [more] |
CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7 pp.37-42 |
NLP |
2017-05-12 11:00 |
Okayama |
Okayama University of Science |
Investigation of Fast Construction for Intrusion Detection System using Multi-Layer Extreme Learning Machine. Daichi Noguchi, Masaharu Adachi (Tokyo Denki Univ.) NLP2017-18 |
Recently, there are incremental threats of cyber security for holding the Olympic Games in Tokyo in 2020. The fast const... [more] |
NLP2017-18 pp.87-92 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
CS, NS, IN (Joint) |
2014-09-12 13:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Detection of Malicious Database Queries based on Matching with HTTP Requests Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65 |
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] |
IN2014-65 pp.99-104 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] |
ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 pp.75-80 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:25 |
Okinawa |
Ryukyu Univ. |
Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55 |
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] |
SITE2013-55 pp.157-161 |
SWIM |
2013-11-29 13:50 |
Kanagawa |
Tokyo Polytechnic University |
A Study about Cyber Attack Detection System using Machine Learning Tadashi Ogino (Okinawa National College of Technology) SWIM2013-13 |
The network intrusion is becoming a big thread for a lot of companies, organization and so on. Many of today’s intrusion... [more] |
SWIM2013-13 pp.9-14 |
AP, SAT (Joint) |
2013-07-25 14:30 |
Hokkaido |
Sun Refre Hakodate |
Study on Antenna Arrangement for MIMO Sensor in Outdoor Environment Keita Konno, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Yoshitaka Tsunekawa (Iwate Univ.) AP2013-57 |
In this report, we investigate the use of the intrusion-detection MIMO (Multiple-Input Multiple-Output) sensor in the ou... [more] |
AP2013-57 pp.59-64 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 11:15 |
Nara |
Todaiji Total Cultural Center |
Proposal of Active IDS by Risk Level Probe Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102 |
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] |
SITE2012-64 IA2012-102 pp.169-174 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB [detail] |
2013-03-14 14:05 |
Nagasaki |
|
Development of High Speed Network Intrusion Detection System with High Scalability Using High-performance FPGA Mamoru Sekiyama, Kenji Toda, Tetsuo Kotoku (AIST) CPSY2012-96 DC2012-102 |
We developed intrusion detection system (IDS) , that uses pattern matching circuit for Snort rules, on a high-performanc... [more] |
CPSY2012-96 DC2012-102 pp.265-269 |
SANE, SAT (Joint) |
2013-02-21 17:40 |
Okinawa |
Youth Center of Okinawa prefecture |
On Detection Performance of MIMO Security Sensor System for Indoor Intrusion Detection Ken Ogawa, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) SANE2012-154 |
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention.In the... [more] |
SANE2012-154 pp.31-36 |
SITE |
2012-12-12 14:00 |
Osaka |
|
Trend and ethical problem of the honeypot Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45 |
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more] |
SITE2012-45 pp.13-18 |
IA |
2012-11-19 17:10 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
IA2012-56 pp.23-28 |
VLD |
2012-03-07 11:10 |
Oita |
B-con Plaza |
Implmentation of Look-ahead Assertion for Pattern-independent Regular Expression Matching Engine Yoichi Wakaba, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2011-136 |
In this paper, we propose a look-ahead assertion matching method for regular expression matching hardware engine. In net... [more] |
VLD2011-136 pp.97-102 |
IN, IA (Joint) |
2011-12-16 12:50 |
Hiroshima |
Hiroshima City University |
Overlay Based, Distributed Defense-Framework against DDoS Attacks Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51 |
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] |
IA2011-51 pp.37-42 |
AP, SAT (Joint) |
2011-07-15 13:25 |
Nagano |
Fac. Eng., Shinshu Univ. |
Experimental Study on Channe lModel of MIMO Sensor for Event Detection Akira Kumakura, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-42 |
In recent years, researches on radio security sensors by using array antenna or MIMO system has been attracting attentio... [more] |
AP2011-42 pp.87-90 |
AP, SAT (Joint) |
2011-07-15 13:50 |
Nagano |
Fac. Eng., Shinshu Univ. |
Performance Evaluation of Environment Change Detection method Using MIMO Sensor Ken Ogawa, Hiroyoshi Yamada, Yuta Kurosaki, Yoshio Yamaguchi (Niigata Univ) AP2011-43 |
Recently, several indoor intrusion/event detection methods using radio propagation change have been proposed. One of the... [more] |
AP2011-43 pp.91-95 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 15:00 |
Shizuoka |
Shizuoka University |
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses Shunichi Mizoguchi, Hiroyuki Inaba (KIT) ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 |
Recently, illegal access to network is increasing. Therefore the importance of a network intrusion detection system (IDS... [more] |
ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 pp.19-24 |