Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2018-12-06 09:50 |
Hiroshima |
Satellite Campus Hiroshima |
Secure PUF Authentication Method against Machine Learning Attack Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35 |
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] |
VLD2018-49 DC2018-35 pp.77-82 |
SITE, ISEC, LOIS |
2018-11-04 11:30 |
Fukuoka |
|
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35 |
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] |
ISEC2018-75 SITE2018-53 LOIS2018-35 pp.63-68 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Classification for Important Decoy Documents Based on Supervised Learning Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72 |
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] |
ICSS2017-72 pp.127-132 |
ICSS, IPSJ-SPT |
2018-03-08 12:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing web application vulnerability reports by machine learning Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) ICSS2017-74 |
Web application vulnerability testing is important for preventing cyberattacks. However, it is difficult to test all URL... [more] |
ICSS2017-74 pp.139-144 |
NS, IN (Joint) |
2018-03-02 13:30 |
Miyazaki |
Phoenix Seagaia Resort |
Network Abnormality Detection Using Machine Learning TsukasaMannen, Kohei Shiomoto (TCU) NS2017-226 |
Today, through the widespread use of internet, we need to take measures of Malicious Software. Once computers on the int... [more] |
NS2017-226 pp.327-332 |
NS, IN (Joint) |
2018-03-02 15:20 |
Miyazaki |
Phoenix Seagaia Resort |
Method for Generating a Data Set to Detect Cyber Attacks for Autonomous and Distributed Internet Security Infrastructure Yusei Katsura, Hiroyuki Kimiyama (Tokyo Denki Univ.), Akihiro Nakao (Tokyo Univ.), Naoki Yonezaki, Tomoaki Tsutsumi, Kaoru Sano (Tokyo Denki Univ.), Takeshi Okamoto, Mitsuru Maruyama (Kanagawa Institutes of Technology), Hiroshi Kobayashi (Tokyo Denki Univ.) NS2017-238 |
We proposed "Autonomous and distributed Internet security (AIS) infrastructure" that enables to protect our resources on... [more] |
NS2017-238 pp.397-401 |
VLD, HWS (Joint) |
2018-03-02 14:30 |
Okinawa |
Okinawa Seinen Kaikan |
Modeling Attacks on Double-Arbiter PUF Using Deep Neural Network Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda (UTokyo) VLD2017-127 |
A deep neural network-based modeling attack for Double-Arbiter PUF (DAPUF) is proposed. Although DAPUF is known to be hi... [more] |
VLD2017-127 pp.231-236 |
IA, IN (Joint) |
2017-12-15 14:10 |
Hiroshima |
Hiroshima City Univ. |
A study of gini importance-based header feature selection methods for cyber attack detection Yuta Kazato, Yuichi Nakatani, Takeshi Okamoto, Akira Shibata (NTT) IN2017-61 |
Growing the expansion of network services and IoT devices, the risk of cyber attacks is increased by high-frequency and ... [more] |
IN2017-61 pp.91-96 |
ICSS |
2017-11-20 15:15 |
Oita |
Beppu International Convention Center |
Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39 |
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] |
ICSS2017-39 pp.5-10 |
IA |
2017-11-15 13:50 |
Overseas |
KMITL, Bangkok, Thailand |
Machine Learning Approach for Phishing Detection in SDN Networking Yu-Hung Chen, Jiun-Yu Yang, Po-Chun Hou, Jiann-Liang Chen (National Taiwan University of Science & Technology) IA2017-30 |
People have become increasingly dependent on information technology since the emergence of the Internet. Therefore, many... [more] |
IA2017-30 pp.1-6 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2017-11-07 09:50 |
Kumamoto |
Kumamoto-Kenminkouryukan Parea |
A PUF Based on the Instantaneous Response of Ring Oscillator Determined by the Convergence Time of Bistable Ring Oscillator Circuit Yuki Tanaka, Song Bian, Masayuki Hiromoto, Takashi Sato (Kyoto Univ.) VLD2017-40 DC2017-46 |
Studies on physical unclonable function (PUF) have been actively conducted as one of the countermeasures against counter... [more] |
VLD2017-40 DC2017-46 pp.79-84 |
NS |
2017-10-27 11:10 |
Osaka |
I-site nanba |
A Study of Infection Attack Detection Mechanism on a Carrier Network Considering Lightweight Feature Extraction Yukihiro Togari, Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-109 |
As many hosts which is not equipped with any security functions with respect to production cost connect to Internet and ... [more] |
NS2017-109 pp.89-94 |
IBISML |
2016-11-17 14:00 |
Kyoto |
Kyoto Univ. |
Anomaly Deteciton with K-Means
-- Comparison with Supervised Methods -- Hisashi Takahara (UNP) IBISML2016-75 |
Today, almost all computers have access to the Internet. Computers connected to the Internet are susceptible to various ... [more] |
IBISML2016-75 pp.207-214 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS |
2015-03-03 14:15 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66 |
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] |
ICSS2014-66 pp.19-24 |
SWIM |
2014-11-29 11:20 |
Tokyo |
Tokyo Polytechnic Univ. |
A study of learning method for intrusion detection system using machine learning Tadashi Ogino (Okinawa National College of Tech.) SWIM2014-18 |
The network intrusion is becoming a big threat. Recent intrusions are becoming more clever and difficult to detect. Many... [more] |
SWIM2014-18 pp.23-28 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
ICSS |
2014-11-28 11:35 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting infected hosts with machine learning analysis of DNS responses Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62 |
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] |
ICSS2014-62 pp.67-72 |
ET |
2014-11-14 13:50 |
Osaka |
Osaka Prefecture University (Nakamozu Campus) |
A Consideration of Attacker Agent in Virtual Machine-based System to Support Network Security Learning Kazuki Fukuyama, Yoshiaki Taniguchi, Nobukazu Iguchi (Kinki Univ.) ET2014-67 |
Education of network security has attracted a lot of attentions due to increasing unauthorized access, lack of engineers... [more] |
ET2014-67 pp.37-42 |