Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2023-06-21 09:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Proposal for Access Control Method based on File Relation Inference from Users Behavior Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8 |
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] |
IA2023-8 ICSS2023-8 pp.40-47 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 13:00 |
Online |
Online |
[Invited Talk]
NII-SOCS: Recommended Trends in Winter 2020 Hiroki Kashiwazaki, Hideki Tanaka, Ruo Ando, Jia Liu, Nader Shahata, Masaharu Hayashi, Yusuke Kimura, Hiroki Takakura (NII) ICSS2020-19 |
[more] |
ICSS2020-19 pp.1-6 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
IA |
2017-11-16 11:05 |
Overseas |
KMITL, Bangkok, Thailand |
A Proposal of Dynamic Access Control with SDN for Practical Network Separation Satoki Nakamura (NIT), Hirokazu Hasegawa (Nagoya Univ.), Yuichiro Tateiwa (NIT), Hiroki Takakura (NII), Yonghwan KIM, Yoshiaki Katayama (NIT) IA2017-45 |
As one of effective countermeasures against recent sophisticated cyber attacks, many researches have paid attention to n... [more] |
IA2017-45 pp.65-69 |
ICSS, IPSJ-SPT |
2017-03-13 13:00 |
Nagasaki |
University of Nagasaki |
Clustering of Bot Port Scan and Brute-force Activities Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-46 |
Cyber-attacks targeting IoT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages ... [more] |
ICSS2016-46 pp.1-6 |
IA, IN (Joint) |
2016-12-15 14:55 |
Hiroshima |
Hiroshima city university |
A novel parsing method of pcap file using LALR(1) Ruo Ando, Hiroki Takakura (NII) IA2016-66 |
Recently, parsing large scale pcap file is required in network forensics with rapid increase of network speed. In ... [more] |
IA2016-66 pp.17-21 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:10 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105 |
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] |
SITE2015-73 IA2015-105 pp.221-226 |
IN, IA (Joint) |
2015-12-17 17:10 |
Hiroshima |
Hiroshima City University |
Dynamic construction of to-many communication topology by using OpenFlow Shun Yanase, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2015-76 |
To-many communication such as streaming and multi-point video conferencing basically uses tree structure of content dist... [more] |
IA2015-76 pp.43-48 |
ICSS |
2015-11-26 14:10 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36 |
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] |
ICSS2015-36 pp.7-12 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |
IA |
2014-11-06 15:30 |
Overseas |
Thailand |
Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52 |
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] |
IA2014-52 pp.91-96 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] |
ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 pp.75-80 |
ICSS, IA |
2014-06-06 13:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Implementation of the Administration Policy Description Method on Automatic Network Organization System Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10 |
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] |
IA2014-10 ICSS2014-10 pp.49-54 |
ICSS, IPSJ-SPT |
2014-03-28 13:55 |
Okinawa |
Meio Univiersity |
Proposal of malware classification method based on pattern similarity of traffic Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2013-83 |
[more] |
ICSS2013-83 pp.149-154 |