Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 15:00 |
Shizuoka |
Shizuoka University |
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses Shunichi Mizoguchi, Hiroyuki Inaba (KIT) ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 |
Recently, illegal access to network is increasing. Therefore the importance of a network intrusion detection system (IDS... [more] |
ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 pp.19-24 |
ISEC, IT, WBS |
2011-03-04 13:25 |
Osaka |
Osaka University |
An anomaly detection method using gamma-divergence and its application to system call sequence Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.) IT2010-98 ISEC2010-102 WBS2010-77 |
Nowadays, damage by malwares is increasing. In this paper, we discuss anomaly detection by machine learning and its appl... [more] |
IT2010-98 ISEC2010-102 WBS2010-77 pp.191-197 |
AP |
2011-01-20 10:55 |
Saga |
Saga Univ. |
Experimental Study on Indoor Intrusion Detection with Asynchronous Distributed Transmitters Kei Tanaka, Yuta Kurosaki, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2010-137 |
In recent years, several indoor intrusion/event detection methods using radio propagation change caused by intruder have... [more] |
AP2010-137 pp.25-30 |
IA |
2010-11-24 17:45 |
Yamanashi |
Seisen-Ryo |
Construction of high performance network intrusion system Moriteru Ishida (Kyoto Univ.), Hiroki Takakura (Nagoya Univ.), Yasuo Okabe (Kyoto Univ.) IA2010-56 |
Intrusion detection systems(IDSs) are equipments important to network security. Recently, there’s been an increase in re... [more] |
IA2010-56 pp.31-36 |
AP, SAT (Joint) |
2010-07-21 13:00 |
Hokkaido |
Kitami Inst. Tech. |
Fundamental Study on Indoor Intrusion/Location Detection using Radio Propagation Change Yuta Kurosaki, Kei Tanaka, Hiroyoshi Yamada, Yoshio Yamaguchi (Niigata Univ.) AP2010-42 |
In recent years, several indoor intrusion/event detection methods using radio propagation change caused by intruder have... [more] |
AP2010-42 pp.25-30 |
SANE |
2010-04-23 09:55 |
Okinawa |
Okinawa Subtropical Environment Remote-Sensing Center, NICT |
An Intruder-Detection algorithm by Wide-area Perimeter Surveillance Sensor with Leaky Coaxial Cabels Koichi Ikuta, Naoki Aizawa, Sayu Takamatsu, Kenji Inomata, Hiroshi Kage, Kazuhiko Sumi (Mitsubishi Electric Corp.) SANE2010-6 |
This paper presents an intruder-detection algorithm by wide-area perimeter surveillance sensor with
LCX(Leaky Coaxial ... [more] |
SANE2010-6 pp.31-35 |
IA |
2009-11-25 16:00 |
Saga |
Saga-Ken |
An analysis of IDS alerts to grasp attack situation in the third party's network Kensuke Nakata, Hiroki Takakura, Yasuo Okabe (Kyoto Univ) IA2009-62 |
To fight against emerging cyber attacks on Internet,
various types of security solutions have been proposed.
As one ... [more] |
IA2009-62 pp.25-30 |
IA, SITE |
2009-03-05 14:40 |
Kumamoto |
|
String Matching Algorithms specialized for IDS Takashi Imaizumi (Chiba Univ.), Keisuke Mizuno (Nara Inst. of S and T) SITE2008-62 IA2008-85 |
While we use intrusion detection system, we can not be free from false positive alerts. In other words, there is little... [more] |
SITE2008-62 IA2008-85 pp.107-112 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37 |
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] |
ISEC2008-37 pp.15-22 |
NS, IN (Joint) |
2008-03-07 08:15 |
Okinawa |
Bankoku Shinryokan |
Evaluation of Manager-Based Architecture for Intrusion Detection System in Ad Hoc Networks Muhammad Arifin Ritonga, Masaya Nakayama (Univ. of Tokyo) NS2007-181 |
Ad hoc network faces more security problems that we need to deploy intrusion detection system in this network. However, ... [more] |
NS2007-181 pp.279-284 |
IN |
2007-12-14 13:30 |
Hiroshima |
Hiroshima City University |
A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114 |
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] |
IN2007-114 pp.91-96 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] |
ISEC2006-32 SITE2006-29 pp.167-173 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 09:55 |
Iwate |
Iwate Prefectural University |
A Study on Implementation of the Worm Prevention System Following the Infection Process Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA) |
The network incidents caused by Internet worms are increasing every year. Infection of worms that exploit the vulnerabil... [more] |
ISEC2005-10 SITE2005-8 pp.7-14 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:35 |
Iwate |
Iwate Prefectural University |
A Note of Intrusion Detection using Alteration of Data Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.) |
These days, Attacks which alter data in memory illegally are one of the most serious security threats.Although a lot of ... [more] |
ISEC2005-14 SITE2005-12 pp.37-44 |
NS |
2005-04-21 14:25 |
Aichi |
Nanzan-Univ. |
Design and Implementation of Anomaly Detection System with Classified Packet Counting Kunio Goto, Koji Kojima (Nanzan Univ.) |
In this research, practical application for quasi-realtime intrusion and network failure detection was designed and impl... [more] |
NS2005-4 pp.13-16 |
ICM |
2005-03-11 15:45 |
Okinawa |
Ishigaki City Hall |
Study of a distributed processing type intrusion detection system method Takao Kurahashi, Teruyuki Soba, Kazuo Kitamura (NTT SL Lab.) |
Recently, IDS(Intrusion Detection System) is paid to attention as a security system to diversified unlawful computer acc... [more] |
TM2004-114 pp.73-77 |
ISEC, IPSJ-CSEC |
2004-07-20 11:35 |
Tokushima |
Tokushima Univ. |
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka (KDDI Labs.) |
Although many anomaly detection systems based on learning algorithms
have been proposed to detect unknown attacks or v... [more] |
ISEC2004-31 pp.119-126 |