Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |
IN, IA (Joint) |
2022-12-13 16:40 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
[Short Paper]
A consideration of DoH-based name resolution architecture for Preventing Privady Leakage from IP Header Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyosh Iida (HU) IA2022-67 |
[more] |
IA2022-67 pp.99-100 |
IA, CQ, MIKA (Joint) |
2022-09-15 17:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
A consideration of DoH-exclusive DNS architecture Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23 |
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] |
IA2022-23 pp.50-53 |
IA, ICSS |
2022-06-24 11:25 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13 |
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more] |
IA2022-13 ICSS2022-13 pp.71-75 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:20 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A proposal of detection system for malicious DoH communication generated by DGA-based malware Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72 |
(To be available after the conference date) [more] |
SITE2021-59 IA2021-72 pp.79-82 |
IN, IA (Joint) |
2021-12-17 14:55 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48 |
(To be available after the conference date) [more] |
IA2021-48 pp.85-92 |
IA |
2021-09-08 15:15 |
Online |
Online |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |
CS, IN, NS, NV (Joint) |
2020-09-10 14:50 |
Online |
Online |
[Invited Talk]
Recent Research Trends in Detection and Blocking System of Botnet Communications by DNS Traffic Analysis Katsuyoshi Iida (Hokkaido Univ.), Hikaru Ichise, Yong Jin (Tokyo Tech.) NS2020-41 |
Botnet, a logical network used by bot-type malware, is becoming a social issue. In this paper, we give an outline of the... [more] |
NS2020-41 pp.3-6 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-02 14:05 |
Online |
Online |
Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67 |
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] |
SITE2019-89 IA2019-67 pp.7-12 |
IA |
2017-11-15 14:15 |
Overseas |
KMITL, Bangkok, Thailand |
Design and implementation of NS record history database for detecting DNS-based botnet communication Hikaru Ichise (Tokyo Tech./Hokkaido Univ.), Yong Jin (Tokyo Tech.), Katsuyoshi Iida (Tokyo Tech./Hokkaido Univ.) IA2017-31 |
DNS (Domain Name System) based domain name resolution service is one of the most fundamental
Internet services for the... [more] |
IA2017-31 pp.7-11 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 14:15 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Detection and Control of DNS-based Botnet Communications by using SDN-Ryu Solution Sebastian Li, Yong Jin, Katsuyoshi Iida (Tokyo Tech) SITE2015-61 IA2015-93 |
Domain Name System (DNS) is the most widely used protocol in the Internet for domain name Resolution. Since DNS provides... [more] |
SITE2015-61 IA2015-93 pp.73-78 |
SS |
2015-05-12 10:15 |
Kumamoto |
Kumamoto University |
Towards to Recover Propagation Process of the Patch for Linux Distribution Yong Jin, Kenji Fujiwara, Hajimu Iida (NAIST) SS2015-12 |
In Linux Operating System, there are various kinds of distributions, these are constructed by the combination of softwar... [more] |
SS2015-12 pp.59-62 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 10:50 |
Fukushima |
|
Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method Hikaru Ichise, Yong Jin, Katsuyoshi Iida (Tokyo Inst. of Tech) SITE2014-74 IA2014-106 |
Direct outbound DNS queries from inside PCs to outside computers without any authority information are not considered as... [more] |
SITE2014-74 IA2014-106 pp.173-178 |
IA |
2013-09-06 16:00 |
Tokyo |
IIJ |
Automatic Route Switching Method on HANA-based Multihomed Network Yong Jin, Yusuke Fukushima, Kenji Fujikawa, Yasunaga Kobari, Hiroaki Harai (NICT) IA2013-25 |
Multihomed networks are well used to improve fault-tolerance of the information-network systems and perform traffic dist... [more] |
IA2013-25 pp.47-52 |
NS |
2013-05-16 10:55 |
Kanagawa |
The Graduate Univ. for Advanced Studies |
Design and Implementation of ID/Locator Split Architecture for Improving Availability Yusuke Fukushima, Kenji Fujikawa, Ved P. Kafle, Hajime Tazaki, Yong Jin, Hiroaki Harai (NICT) NS2013-12 |
ID/locator split-based network architectures, such as HIMALIS, LISP and HIP, provide several attrac- tive capabilities b... [more] |
NS2013-12 pp.7-12 |
SIP, RCS |
2013-02-01 09:00 |
Hiroshima |
Viewport-Kure-Hotel (Kure) |
Low Complexity Automatic Modulation Classification Technique for Multiple Modulation Schemes Yong Jin, Shuichi Ohno (Hiroshima Univ.) SIP2012-98 RCS2012-255 |
In this article, we present a low computational complexity automatic modulation classification (AMC) method for multiple... [more] |
SIP2012-98 RCS2012-255 pp.103-108 |
IA |
2012-10-19 17:00 |
Overseas |
Phuket |
Extensions of Hierarchical/Automatic Locator Number Allocation Protocol HANA for DNS Cooperation Kenji Fujikawa, Yong Jin (NICT) IA2012-51 |
We re-defined an address, which is location information in the Internet,
as a locator,
and proposed a HANA protocol, ... [more] |
IA2012-51 pp.101-105 |
IA |
2012-09-21 11:20 |
Tokyo |
|
PI-to-PA Address Space Transition on Multihomed Network Yong Jin, Kenji Fujikawa (NICT) IA2012-12 |
The Internet has become indispensable infrastructure for the human's social activities. Meanwhile, the increasing of the... [more] |
IA2012-12 pp.7-12 |
IA, SITE |
2009-03-05 15:00 |
Kumamoto |
|
Configuration of Redundant Network in Okayama University via Regional IXes and SINET Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin, Keita Kawano, Yoshihiro Oosumi (Okayama Univ.) SITE2008-63 IA2008-86 |
Okayama University has been using an external link and many inter-campus links via Science Information Network (SINET) a... [more] |
SITE2008-63 IA2008-86 pp.113-118 |