Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-11 13:10 |
Hokkaido |
Hakodate Arena |
[Encouragement Talk]
Proposal of Automatic Data Collection and Repository Generation for Statistical Analysis and Visualization of Dark Web Markets Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2018-41 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-41 pp.25-30 |
NS, IN (Joint) |
2018-03-01 11:30 |
Miyazaki |
Phoenix Seagaia Resort |
Statistical Analysis on Dark Web Market Focusing on DDoS/Botnet Takahiro Iwanaga, Akihiro Nakao (The Univ. of Tokyo) NS2017-182 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2017-182 pp.85-90 |
IA |
2017-11-15 14:15 |
Overseas |
KMITL, Bangkok, Thailand |
Design and implementation of NS record history database for detecting DNS-based botnet communication Hikaru Ichise (Tokyo Tech./Hokkaido Univ.), Yong Jin (Tokyo Tech.), Katsuyoshi Iida (Tokyo Tech./Hokkaido Univ.) IA2017-31 |
DNS (Domain Name System) based domain name resolution service is one of the most fundamental
Internet services for the... [more] |
IA2017-31 pp.7-11 |
NS, IN (Joint) |
2017-03-02 09:30 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Detection of Bot-infected PCs based on C&C Session Classification Hinako Moroi, Masatoshi Kawarasaki (Tsukuba Univ) IN2016-99 |
In malware detection by traffic characterization analysis, general-purpose detection and methods specialized to specific... [more] |
IN2016-99 pp.13-18 |
RCS, RCC, ASN, NS, SR (Joint) |
2016-07-21 13:20 |
Aichi |
|
[Encouragement Talk]
The Effect of Network Topology on the Spread of Self-Evolving Botnets Takanori Kudo (Setsunan Univ.), Tomotaka Kimura (Tokyo Univ. of Science), Yoshiaki Inoue (Osaka Univ.), Hirohisa Aman (Ehime Univ.), Kouji Hirata (Kansai Univ.) NS2016-63 |
As the previous work, we have proposed an epidemic model of new botnets
named self-evolving botnets that autonomously ... [more] |
NS2016-63 pp.69-74 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 14:15 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Detection and Control of DNS-based Botnet Communications by using SDN-Ryu Solution Sebastian Li, Yong Jin, Katsuyoshi Iida (Tokyo Tech) SITE2015-61 IA2015-93 |
Domain Name System (DNS) is the most widely used protocol in the Internet for domain name Resolution. Since DNS provides... [more] |
SITE2015-61 IA2015-93 pp.73-78 |
NS |
2016-01-22 15:55 |
Fukuoka |
|
A study on dynamic resource management and control for Optical Transport SDN Keiichi Nakatsugawa, Masatake Miyabe, Akiko Yamada, Shinji Yamashita, Toshio Soumiya (FUJITSU) NS2015-166 |
Toward the SDN-enabled wide area network, we have been studying the dynamic management and control of the optical core n... [more] |
NS2015-166 pp.115-120 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 10:50 |
Fukushima |
|
Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method Hikaru Ichise, Yong Jin, Katsuyoshi Iida (Tokyo Inst. of Tech) SITE2014-74 IA2014-106 |
Direct outbound DNS queries from inside PCs to outside computers without any authority information are not considered as... [more] |
SITE2014-74 IA2014-106 pp.173-178 |
ICSS |
2015-03-03 14:15 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66 |
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] |
ICSS2014-66 pp.19-24 |
EST, OPE, LQE, EMT, PN, MWP, IEE-EMT [detail] |
2015-01-30 13:10 |
Osaka |
|
A study on resource pool management for Optical Transport SDN Koki Inoue (Osaka Univ.), Keiichi Nakatsugawa, Akiko Yamada (Fujitsu Lab.) PN2014-71 OPE2014-196 LQE2014-183 EST2014-125 MWP2014-93 |
We study on Optical Transport SDN by which users can use optical paths immediately when they order a bandwidth. In order... [more] |
PN2014-71 OPE2014-196 LQE2014-183 EST2014-125 MWP2014-93 pp.271-276 |
ICSS |
2014-11-28 11:35 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting infected hosts with machine learning analysis of DNS responses Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62 |
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] |
ICSS2014-62 pp.67-72 |
IA |
2014-09-12 11:00 |
Tokyo |
Tokyo Tech Front |
Use case analysis of TXT records in DNS Hikaru Ichise, Jin Yong, Katsuyoshi Iida (Tokyo Inst. of Tech.) IA2014-16 |
Recent reports indicated that the DNS TXT record based bot communications can be used in the botnet attacks. Thus, it is... [more] |
IA2014-16 pp.13-18 |
OPE, OCS |
2014-05-16 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Fellow Memorial Lecture]
Reserach, Development, and Standardization on High-speed Ethernet Optical Transport Technologies
-- LAN & WAN Paradigm Conflict and Marriage -- Osamu Ishida (NEL) OCS2014-11 OPE2014-11 |
Paradigm conflict and marriage between LAN and WAN technologies are reviewed by looking back on 10G/40G/100G research, d... [more] |
OCS2014-11 OPE2014-11 pp.49-52 |
ICSS, IPSJ-SPT |
2014-03-28 11:40 |
Okinawa |
Meio Univiersity |
DNS Traffic Analysis Platform with Hadoop Framework Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80 |
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] |
ICSS2013-80 pp.131-135 |
NS, OCS, PN (Joint) |
2012-06-21 16:30 |
Yamagata |
Yamagata Univ. |
[Invited Talk]
Network interoperability testing with multi-vendor 100GE over OTU4 interfaces Toru Katagiri (Fujitsu Labs.), Hiroyuki Suzuki, Satoru Saitoh, Hideo Abe (Fujitsu), Tomoki Yoshihara, Tsutomu Tajima, Morihiko Ota (NEC), Koji Takatori, Hiroshi Takeuchi (Hitachi), Koichi Kibe, Takashi Furuya (Anritsu) NS2012-34 OCS2012-15 PN2012-6 |
To support rapidly increasing traffic demand because of widely spreading video stream service, popularization of smart p... [more] |
NS2012-34 OCS2012-15 PN2012-6 pp.25-30(NS), pp.31-36(OCS), pp.25-30(PN) |
OCS, OPE (Joint) |
2012-05-18 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg(Tokyo) |
[Invited Talk]
Report on OFC/NFOEC2012
-- Optical Networks -- Takuya Ohara (NTT) OCS2012-3 OPE2012-2 |
This paper reports topics of optical networks in OFC/NFOEC 2012, held in March 4-8, 2012, at Los Angeles Convention Cent... [more] |
OCS2012-3 OPE2012-2 pp.9-12(OCS), pp.5-8(OPE) |
CS, NS, IN (Joint) |
2011-09-02 13:50 |
Miyagi |
Tohoku University |
A study on bandwidth allocation method of optical metro-access hybrid aggregation network Yoshifumi Hotta, Hiroyuki Sato (MELCO) CS2011-44 |
In this paper, we discuss requirements for post 10G-EPON future access network and propose scalable and bandwidth effici... [more] |
CS2011-44 pp.99-104 |
OCS, CS (Joint) |
2011-01-28 15:15 |
Tokushima |
The University of Tokushima |
Waiting Time Jitter Analysis and Suppression Method of Client Signal Transport over OTN Masahiro Suzuki, Takuya Ohara, Takashi Ono, Shigeki Aisawa, Masahito Tomizawa (NTT) OCS2010-116 |
Waiting time Jitter is low frequency jitter introduced whenever client signals are asynchronously mapped into OTN frame.... [more] |
OCS2010-116 pp.99-104 |
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |
IN |
2009-07-09 15:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
Anomalous Traffic Observed in DNS Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28 |
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] |
IN2009-28 pp.19-24 |