Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2023-12-22 15:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55 |
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more] |
IA2023-55 pp.59-66 |
IA |
2023-09-22 09:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Implementation of DDoS Detection and Automatic Mitigation System Using eBPF and XDP Atsuya Osaki, Seiki Makino (Keio), Ryusei Shiiba (Sokendai), Kensuke Fukuda (NII/Sokendai), Tadashi Okoshi, Jin Nakazawa (Keio) IA2023-21 |
(To be available after the conference date) [more] |
IA2023-21 pp.60-66 |
PN |
2023-03-02 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Distributed DDoS Protection Method in the Core Network with Reconfigurable Device Edge Coordination Tomoki Naoi, Masaki Murakami, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka (Keidai) PN2022-58 |
Distributed Denial-of-Service (DDoS) attacks are a growing problem today, and it is difficult for individual users to mi... [more] |
PN2022-58 pp.83-89 |
SRW, SeMI, CNR (Joint) |
2020-11-26 17:20 |
Online |
Online |
[Poster Presentation]
Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32 |
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] |
SeMI2020-32 pp.67-72 |
COMP |
2018-10-26 13:45 |
Kyoto |
Kyoto University |
Kento Masuda, Shinji Imahori (Chuo Univ.), Yasuhiro Ohara (NTT Communications) COMP2018-25 |
The number and scale of DDoS attacks are increasing by DDoS attacks agencies and IoT devices. DDoS mitigation is one of ... [more] |
COMP2018-25 pp.33-39 |
IA |
2018-09-04 15:15 |
Hokkaido |
Hokkaido Univ. Conference Hall |
A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28 |
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] |
IA2018-28 pp.77-81 |
NS, IN (Joint) |
2018-03-01 10:00 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92 |
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] |
IN2017-92 pp.15-20 |
IA |
2017-11-10 10:40 |
Kumamoto |
Hotel Greenpia Minamiaso |
Evaluation of DDoS Mitigation Method based on Diffusion Flow Control Kuya Taira, Chisa Takano, Kaori Maeda (HCU) IA2017-23 |
In recent years, a DDoS attack that intentionally sends a large amount of data from multiple computers to a specific org... [more] |
IA2017-23 pp.1-6 |
NS |
2017-10-27 11:35 |
Osaka |
I-site nanba |
A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
NS2017-110 pp.95-100 |
CCS |
2017-08-11 13:30 |
Hokkaido |
Bibai Onsen Yu-rinkan |
Proposal of DDoS Mitigation System based on Diffusion Flow Control Kuya Taira, Chisa Takano, Kaori Maeda (Hiroshima City Univ.) CCS2017-19 |
A DNS amplification attack greatly affects not only the load of the target server but also the load of the networks on r... [more] |
CCS2017-19 pp.51-56 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 11:40 |
Okinawa |
Kumejima Island |
Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96 |
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] |
CPSY2016-150 DC2016-96 pp.327-332 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 10:20 |
Osaka |
Osaka Uinv. |
A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
IN2016-58 pp.55-60 |
CQ, ICM, NS (Joint) |
2015-11-27 10:50 |
Niigata |
Niigata University |
Bandwidth Control Method for DDoS Mitigation considering QoS Fairness of users Kazufumi Yogo, Nobuya Shirai, Masao Aihara (NTT) NS2015-123 |
In recent years, cyber-attacks tend to increase and be diverse. In particular, DDoS attack, which is possible to consume... [more] |
NS2015-123 pp.69-74 |
NS |
2015-05-22 09:55 |
Tokyo |
Tokyo Univ. |
A Study of Algorithm for Mitigating Large-Scale DDoS Attacks based on the Available Bandwidth Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) NS2015-25 |
In case that ISPs detect a massive DDoS attack against a specifit destination IP address, they usually forward the DDoS ... [more] |
NS2015-25 pp.59-64 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:30 |
Nara |
Todaiji Total Cultural Center |
Proposal of DDoS attack mitigation using two-step map table lookup on LISP Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] |
SITE2012-51 IA2012-89 pp.37-42 |
IA |
2012-11-19 18:00 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more] |
IA2012-58 pp.35-40 |
NS, CS, IN (Joint) |
2007-09-21 09:50 |
Miyagi |
Tohoku University |
A Practical Feasibility Study of a Network Control Method for Sharing DDoS-Attack Mitigation Devices Takeshi Yagi, Takeshi Kuwahara, Junichi Murayama (NTT) IN2007-60 |
This paper reports results of feasibility study about dynamic traffic control methods to re-route traffic into DDoS-atta... [more] |
IN2007-60 pp.99-104 |
NS, IN (Joint) |
2007-03-08 10:50 |
Okinawa |
Okinawa Convention Center |
A Load Balancing Method between Distributed DDoS-Attack Mitigation Systems by dividing anomaly traffic Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-200 |
This paper proposes a large-volume DDoS-attack defense method which scrubs anomaly traffic with a DDoS-attack mitigatio... [more] |
IN2006-200 pp.119-124 |
IN |
2006-12-15 14:00 |
Osaka |
|
Evaluations of a Network Control Scheme for Sharing DDoS Attack Mitigation System called as Scrubingbox Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-131 |
This paper evaluates dynamic traffic control methods to re-route traffic into DDoS-attack mitigation devices, namely Scr... [more] |
IN2006-131 pp.103-108 |