Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
WBS, IT, ISEC |
2021-03-05 14:45 |
Online |
Online |
Consideration of embedding methods and machine learning models for detecting malicious URLs Qisheng Chen, Kazumasa omote (Univ. of Tsukuba) IT2020-157 ISEC2020-87 WBS2020-76 |
Nowadays, Internet access is becoming more and more popular, which makes the harm of malicious websites more and more se... [more] |
IT2020-157 ISEC2020-87 WBS2020-76 pp.281-287 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
IA |
2019-11-15 13:15 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Malicious URL Classification using Machine Learning Techniques Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41 |
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] |
IA2019-41 pp.79-83 |
ICSS |
2019-11-13 14:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
ICSS2019-63 |
E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] |
ICSS2019-63 pp.19-23 |
IN, NS (Joint) |
2019-03-05 11:30 |
Okinawa |
Okinawa Convention Center |
A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128 |
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] |
IN2018-128 pp.265-270 |
ICTSSL, IN (Joint) |
2017-10-10 14:50 |
Shizuoka |
|
A Verification of Effect of Malicious User on Delay Tolerant Network Naoya Mikamoto, Yoichi Utsunomiya, Takashi Okuda (Aichi Prefectural Univ.) IN2017-36 |
Delay Tolerant Networking (DTN) system provides communication services under the challenging network condition where a c... [more] |
IN2017-36 pp.7-12 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
IN, ICTSSL, NWS (Joint) |
2016-10-20 13:55 |
Osaka |
Osaka Uinv. |
Malicious Wifi AP Detection Using Similarity of Relay Traffic Toshiaki Harada, Tatsuya Mori (Waseda Univ.) IN2016-52 |
The spread of public WiFi service causes the threat of malicious wireless access points (APs). Malicious APs pretends to... [more] |
IN2016-52 pp.19-24 |
NLC, TL |
2016-06-04 16:25 |
Hokkaido |
Otaru University of Commerce |
A SVM-based Method of Victim Representation Extraction from Bad-mouth Comments in Social Media Yuki Nakano, Yuki Kawahara, Takashi Inui (Tsukuba Univ.) TL2016-6 NLC2016-6 |
Bad-mouth comments found on the Social media are negative side of information-oriented society. In this paper, we discus... [more] |
TL2016-6 NLC2016-6 pp.23-28 |
ICSS, IPSJ-SPT |
2016-03-04 10:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Static Detection of ROP Chain Based on Hidden Markov Model Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59 |
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] |
ICSS2015-59 pp.71-76 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS |
2013-03-25 13:00 |
Kanagawa |
Yokohama National University |
Finding Malicious Authoritative DNS Servers Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-61 |
This study proposes an approach to find authoritative DNS servers that are heavily involved with
malicious online activ... [more] |
ICSS2012-61 pp.25-30 |
NS, IN (Joint) |
2012-03-08 11:40 |
Miyazaki |
Miyazaki Seagia |
Proposal and Evaluation of Distributed Management Method for Preventing Malicious Use of Game Information in P2P Massively Multi-player Online Role Playing Game Kotaro Yamazaki, Yuzo Taenaka, Yasushi Wakahara (Univ. of Tokyo) IN2011-150 |
Recently an online game MMORPG has been explosively spread. However, MMORPG has a problem that the load of the server is... [more] |
IN2011-150 pp.79-84 |