Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, CAS, MSS, VLD |
2017-06-19 11:40 |
Niigata |
Niigata University, Ikarashi Campus |
An Implementation Method of Reconfigurable Network Intrusion Detection Systems Based on Random Forests Binbin Xue, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7 |
In this paper, we propose an implementation method of reconfigurable network intrusion detection system based on random ... [more] |
CAS2017-7 VLD2017-10 SIP2017-31 MSS2017-7 pp.37-42 |
NLP |
2017-05-12 11:00 |
Okayama |
Okayama University of Science |
Investigation of Fast Construction for Intrusion Detection System using Multi-Layer Extreme Learning Machine. Daichi Noguchi, Masaharu Adachi (Tokyo Denki Univ.) NLP2017-18 |
Recently, there are incremental threats of cyber security for holding the Olympic Games in Tokyo in 2020. The fast const... [more] |
NLP2017-18 pp.87-92 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 14:50 |
Okinawa |
Culture Resort Festone (Okinawa) |
Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98 |
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more] |
SITE2016-68 IA2016-98 pp.41-46 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
CS, NS, IN (Joint) |
2014-09-12 13:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Detection of Malicious Database Queries based on Matching with HTTP Requests Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65 |
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] |
IN2014-65 pp.99-104 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] |
ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 pp.75-80 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:25 |
Okinawa |
Ryukyu Univ. |
Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55 |
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] |
SITE2013-55 pp.157-161 |
SWIM |
2013-11-29 13:50 |
Kanagawa |
Tokyo Polytechnic University |
A Study about Cyber Attack Detection System using Machine Learning Tadashi Ogino (Okinawa National College of Technology) SWIM2013-13 |
The network intrusion is becoming a big thread for a lot of companies, organization and so on. Many of today’s intrusion... [more] |
SWIM2013-13 pp.9-14 |
AP, SAT (Joint) |
2013-07-25 14:30 |
Hokkaido |
Sun Refre Hakodate |
Study on Antenna Arrangement for MIMO Sensor in Outdoor Environment Keita Konno, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Yoshitaka Tsunekawa (Iwate Univ.) AP2013-57 |
In this report, we investigate the use of the intrusion-detection MIMO (Multiple-Input Multiple-Output) sensor in the ou... [more] |
AP2013-57 pp.59-64 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 11:15 |
Nara |
Todaiji Total Cultural Center |
Proposal of Active IDS by Risk Level Probe Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102 |
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] |
SITE2012-64 IA2012-102 pp.169-174 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB [detail] |
2013-03-14 14:05 |
Nagasaki |
|
Development of High Speed Network Intrusion Detection System with High Scalability Using High-performance FPGA Mamoru Sekiyama, Kenji Toda, Tetsuo Kotoku (AIST) CPSY2012-96 DC2012-102 |
We developed intrusion detection system (IDS) , that uses pattern matching circuit for Snort rules, on a high-performanc... [more] |
CPSY2012-96 DC2012-102 pp.265-269 |
SANE, SAT (Joint) |
2013-02-21 17:40 |
Okinawa |
Youth Center of Okinawa prefecture |
On Detection Performance of MIMO Security Sensor System for Indoor Intrusion Detection Ken Ogawa, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) SANE2012-154 |
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention.In the... [more] |
SANE2012-154 pp.31-36 |
SITE |
2012-12-12 14:00 |
Osaka |
|
Trend and ethical problem of the honeypot Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45 |
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more] |
SITE2012-45 pp.13-18 |
IA |
2012-11-19 17:10 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
IA2012-56 pp.23-28 |
VLD |
2012-03-07 11:10 |
Oita |
B-con Plaza |
Implmentation of Look-ahead Assertion for Pattern-independent Regular Expression Matching Engine Yoichi Wakaba, Shinobu Nagayama, Masato Inagi, Shin'ichi Wakabayashi (Hiroshima City Univ.) VLD2011-136 |
In this paper, we propose a look-ahead assertion matching method for regular expression matching hardware engine. In net... [more] |
VLD2011-136 pp.97-102 |
IN, IA (Joint) |
2011-12-16 12:50 |
Hiroshima |
Hiroshima City University |
Overlay Based, Distributed Defense-Framework against DDoS Attacks Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51 |
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] |
IA2011-51 pp.37-42 |
AP, SAT (Joint) |
2011-07-15 13:25 |
Nagano |
Fac. Eng., Shinshu Univ. |
Experimental Study on Channe lModel of MIMO Sensor for Event Detection Akira Kumakura, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-42 |
In recent years, researches on radio security sensors by using array antenna or MIMO system has been attracting attentio... [more] |
AP2011-42 pp.87-90 |
AP, SAT (Joint) |
2011-07-15 13:50 |
Nagano |
Fac. Eng., Shinshu Univ. |
Performance Evaluation of Environment Change Detection method Using MIMO Sensor Ken Ogawa, Hiroyoshi Yamada, Yuta Kurosaki, Yoshio Yamaguchi (Niigata Univ) AP2011-43 |
Recently, several indoor intrusion/event detection methods using radio propagation change have been proposed. One of the... [more] |
AP2011-43 pp.91-95 |