Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81 |
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] |
ICSS2014-81 pp.109-114 |
ICSS |
2015-03-04 12:05 |
Okinawa |
Meio Univiersity |
Finding Network Address Blocks Intensively Used for Cyber Attacks Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83 |
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] |
ICSS2014-83 pp.121-126 |
ICSS |
2014-11-27 14:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Dynamic Zoning of the Industrial Control System for Security improvement Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT) ICSS2014-52 |
In the previous paper, our authors proposed a design methodology of zones and conduits not only to isolate incidents cau... [more] |
ICSS2014-52 pp.7-12 |
IA |
2014-11-06 15:30 |
Overseas |
Thailand |
Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52 |
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] |
IA2014-52 pp.91-96 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:40 |
Hokkaido |
San-Refure Hakodate |
Deceptive defense architecture toward protection against APT Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU) ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15 |
It has been difficult to detect all of increasingly-sophisticated cyber-attacks, so that we must assume th... [more] |
ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15 pp.69-74 |
R |
2014-05-23 14:20 |
Aichi |
|
Optimal Monitoring Policy for a System with Cyber Attack Mitsuhiro Imaizumi (Aichi Gakusen Univ.), Mitsutaka Kimura (Gifu City Women's Coll.) R2014-3 |
Recently, the case that malware enters into an organization's LAN through e-mail and so on, has become a serious problem... [more] |
R2014-3 pp.13-16 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
ICSS, IPSJ-SPT |
2014-03-28 11:15 |
Okinawa |
Meio Univiersity |
Timeline-Based Event Log Viewer over Multi-Host Environment Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79 |
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more] |
ICSS2013-79 pp.125-130 |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |
ICSS |
2013-03-25 15:30 |
Kanagawa |
Yokohama National University |
[Invited Talk]
PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66 |
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] |
ICSS2012-66 p.55 |
DE |
2012-12-13 13:00 |
Kyoto |
Campus Plaza Kyoto |
[Invited Talk]
State-of-the-art Cybersecurity Technologies and Challenges for Security Big Data Daisuke Inoue (NICT) DE2012-32 |
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter) in order to fight ... [more] |
DE2012-32 p.105 |
ICSS |
2012-03-16 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47 |
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] |
ICSS2011-47 pp.49-54 |
SSS |
2012-03-16 15:40 |
Tokyo |
Meiji Univ. |
Targeted Email Attack Takehiko Nakayama (National Police Agency) SSS2011-29 |
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] |
SSS2011-29 pp.17-18 |
ICSS |
2009-05-15 13:40 |
Hyogo |
Kobe University |
[Special Talk]
Internatinal Standarization Activities in ITU-T Study Group 17 (Security)
-- Standarizatoin on Network Security and ID Management -- Yutaka Miyake, Ryu Watanabe (KDDI Labs.) ICSS2009-2 |
This paper describes activities of international standard related security issues at the ITU-T which is international st... [more] |
ICSS2009-2 pp.3-8 |