Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
NS, RCS (Joint) |
2023-12-15 17:35 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Device Type Classification based on Periodicity Analysis of Evenly Spaced Interpolated Traffic Chikako Takasaki, Tomohiro Korikawa, Kyota Hattori, Hidenari Ohwada (NTT) NS2023-154 |
In the beyond 5G and 6G networks, the number of connected devices and their types will greatly increase including not on... [more] |
NS2023-154 pp.163-168 |
NS |
2023-10-05 13:25 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
IoT Device Identification based on Traffic Pattern Analysis with Two-stage Clustering Mizuki Asano, Takumi Miyoshi, Taku Yamazaki (Shibaura Inst. Tech.) NS2023-90 |
In recent years, the realization of smart homes, which will provide more effective and comfortable lifestyles by leverag... [more] |
NS2023-90 pp.105-110 |
IA |
2023-09-22 10:40 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
OLIViS: An OSINT-Based Lightweight Method for Identifying Video Content Services for Capacity Planning in Backbone ISPs Yuki Tamura, Fumio Teraoka, Takao Kondo (Keio Univ.) IA2023-23 |
As of 2022, 66% of Internet traffic is generated by video content services, among which Netflix and YouTube are the domi... [more] |
IA2023-23 pp.75-82 |
CS |
2023-07-27 10:02 |
Tokyo |
Hachijo-machi Chamber of Commerce and Industry |
Study on Traffic Reduction Scheme with Super-Resolution for Object Detection Hotaka Hoshino, Takuya Shindo, Takefumi Hiraguri, Nobuhiko Itoh (NIT) CS2023-27 |
Drones send images of tomato flowers to a pollination classification device that estimates from the shape of the flower ... [more] |
CS2023-27 pp.35-36 |
IA |
2022-11-21 14:30 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
A Study of Application Identification Schemes and Impact on Video Transmission Quality in The Customer and Application-Aware SR-TE Framework Ryunosuke Saito, Harunobu Yoshida, Shintaro Ishihara, Toyokazu Akiyama, Kazumasa Kobayashi (Kyoto Sangyo Univ.), Wataru Mishima (NTT Com) IA2022-40 |
Customers using Internet service providers (ISP) generate traffic for a variety of applications, each with different req... [more] |
IA2022-40 pp.20-24 |
AP |
2022-10-19 09:30 |
Gifu |
GIFU CITY CULTURE CENTER (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Study on Identification Accuracy of Multiple Targets in Traffic Monitoring Using Millimeter-wave FM-CW Radar Kazuho Suzuki, Hiroyoshi Yamada (Niigata Univ.) AP2022-109 |
Recently, millimeter-wave radar-based traffic monitoring systems have been attracting attention, and research on target ... [more] |
AP2022-109 pp.70-75 |
IN, NS, CS, NV (Joint) |
2021-09-09 13:30 |
Online |
Online |
{Architecture for Configurable Real-time Device Identification in Campus Core Networks Kohei Hayashi (Osaka City Univ.), Kota Tuchie, Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata (Osaka City Univ.) IN2021-14 |
In recent years, data traffic of IoT devices is increasing rapidly. In order to achieve a secure management of large-sca... [more] |
IN2021-14 pp.13-18 |
ICM |
2021-03-19 10:50 |
Online |
Online |
[Encouragement Talk]
Utility of Training Data in Sequential Accumulation Learning-Based Anomaly Detection Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2020-69 |
In Network-based Intrusion Detection Systems (NIDS) using supervised learning, one of important challengings is how to c... [more] |
ICM2020-69 pp.52-57 |
ICM |
2020-07-17 09:25 |
Online |
Online |
Study on which data we should label in a few-shot learning for service identification over encrypted web services Shouta Yoshida, Yutaka Eguchi, Kohei Shiomoto (TCU) ICM2020-14 |
It is very important to monitor and control the communication traffic to cope with the
increasing communication traffic... [more] |
ICM2020-14 pp.37-42 |
ICM |
2020-03-03 10:00 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Automatic Accumulation of Learning Data on Learning-based Anomaly Detection Utilizing Communication Traffics Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2019-50 |
With the advancement and diversification of information infrastructure in recent years, the importance
of network secur... [more] |
ICM2019-50 pp.49-54 |
LOIS, ICM |
2020-01-10 11:25 |
Nagasaki |
ARKAS SASEBO |
[Encouragement Talk]
A Two-stage Clustering Method for P2PTV Unit Traffic Classification and Its Evaluation Rina Ooka, Takumi Miyoshi, Taku Yamazaki (Shibaura Inst. of Tech.) ICM2019-39 LOIS2019-54 |
Peer-to-peer-based video streaming (P2PTV) in which user terminals (peers) directly communicate with each other has attr... [more] |
ICM2019-39 LOIS2019-54 pp.51-56 |
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
|
Due to the sophistication and diversification of information infrastructure in recent years, the risk due to connections... [more] |
|
ICM, IPSJ-CSEC, IPSJ-IOT |
2019-05-23 16:20 |
Osaka |
|
Characteristic Analysis of Time-series P2PTV Traffic Using Machine Learning Rina Ooka, Koji Hayashi, Takumi Miyoshi, Taku Yamazaki (Shibaura Inst. of Tech.) ICM2019-2 |
P2P-based video streaming service (P2PTV) in which user terminals (peers) directly communicate with each other has attra... [more] |
ICM2019-2 pp.31-36 |
NS |
2019-04-18 13:50 |
Kagoshima |
Tenmonkan Vision Hall |
Traffic Prioritization using Data-Plane programmable node Shu Yamamoto, Akihiro Nakao (UTokyo) NS2019-6 |
With the utilization of IoT technologies, various devices are connected to the network. This causes the increase of traf... [more] |
NS2019-6 pp.31-36 |
IN, NS (Joint) |
2019-03-05 09:20 |
Okinawa |
Okinawa Convention Center |
Characteristic Analysis of P2PTV Traffic and Its Classification Using Machine Learning Koji Hayashi, Takumi Miyoshi (Shibaura Inst. Tech.) NS2018-230 |
Peer-to-peer video streaming service (P2PTV) has attracted attention due to the huge demands for video streaming service... [more] |
NS2018-230 pp.219-224 |
NS |
2018-10-19 10:40 |
Kyoto |
Kyoto Kyoiku Bunka Center |
[Invited Lecture]
Study of Internet Traffic Classification Based on Naive Bayesian Method Yuanzhi Shao (UEC), Ved P. Kafle (NICT) NS2018-127 |
The traditional port- and payload-based traffic detection and classification technique may not meet the security and QoS... [more] |
NS2018-127 pp.111-116 |
IN, NS, CS, NV (Joint) |
2018-09-07 10:45 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study of Scanning Hosts Classification Mechanism in IP Backbone Networks Yukihiro Togari, Hisashi Kojima, Takeshi Kuwahara (NTT) NS2018-102 |
We have researched a lightweight scan detection mechanism in the IP backbone networks. However, the existing mechanism c... [more] |
NS2018-102 pp.83-88 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 |
This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 pp.305-310 |
NS, IN (Joint) |
2018-03-01 09:00 |
Miyazaki |
Phoenix Seagaia Resort |
Classifying OSes on User Devices Using the Similarity of DNS Query Sets Yuka Komai, Masahiro Kobayashi, Shigeaki Harada, Keisuke Ishibashi, Ryoichi Kawahara (NTT), Tatsuya Mori, Shigeki Goto (Waseda Univ.) IN2017-89 |
Due to the emergence of various user devices, it becomes important to manage traffic based on OSes (Operating Systems) o... [more] |
IN2017-89 pp.1-4 |