IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 95  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches
Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] NS2023-221
pp.288-293
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center DDoS Attack Evaluation Against Tele-Operated Driving System in 5G MEC Scenarios
Masato Osumi, Daishi Kondo, Hideki Tode (OMU) NS2023-228
MEC technology, which combines 5G communication with edge computing that places computing resources in edge network, has... [more] NS2023-228
pp.329-335
IN, IA
(Joint)
2023-12-22
15:40
Hiroshima Satellite Campus Hiroshima A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI
Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more]
IA2023-55
pp.59-66
ICSS 2023-11-17
13:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Analysis of the influence of DDoS attacks on Snort and legitimate users
Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65
(To be available after the conference date) [more] ICSS2023-65
pp.101-107
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:20
Hokkaido Hokkaido Jichiro Kaikan Analysis of Snort's impact due to DDoS attacks
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
pp.127-132
IN, NS
(Joint)
2023-03-03
10:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Defense Method with Drop-Request Protocol against DRDoS Attack
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-102
pp.217-222
PN 2023-03-02
11:40
Okinawa
(Primary: On-site, Secondary: Online)
Distributed DDoS Protection Method in the Core Network with Reconfigurable Device Edge Coordination
Tomoki Naoi, Masaki Murakami, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka (Keidai) PN2022-58
Distributed Denial-of-Service (DDoS) attacks are a growing problem today, and it is difficult for individual users to mi... [more] PN2022-58
pp.83-89
IN, IA
(Joint)
2022-12-13
16:15
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Investigation of a drop request protocol for defense against DRDoS attacks
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-51
pp.40-45
CCS, NLP 2022-06-09
13:00
Osaka
(Primary: On-site, Secondary: Online)
Conditional entropy based DDoS Attack detection in Software Defined Network
Tian QiWen, miyata sumiko (SIT) NLP2022-1 CCS2022-1
In order to detect each network attack in an SDN environment, an attack detection method has been proposed based on the ... [more] NLP2022-1 CCS2022-1
pp.1-6
NS 2022-05-13
10:15
Kyoto Rakuyu Kaikan, Kyoto Univ. + Online
(Primary: On-site, Secondary: Online)
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN
Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] NS2022-16
pp.40-46
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
CQ, CBE
(Joint)
2021-01-22
10:10
Online Online Improvement Using White List and QoS Control for SYN Cookie Method
Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] CQ2020-93
pp.116-121
SRW, SeMI, CNR
(Joint)
2020-11-26
17:20
Online Online [Poster Presentation] Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge
Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] SeMI2020-32
pp.67-72
PN 2020-03-03
09:50
Kagoshima
(Cancelled but technical report was issued)
DDoS defense method by logically isolating attackers
Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] PN2019-63
pp.65-71
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:45
Hyogo Rokkodai 2nd Campus, Kobe Univ. Analysis of UTM traffic log using LLL algorithm
Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] NS2019-124
pp.27-30
PN 2019-11-14
17:20
Kanagawa   Network-based DDoS prevention with newly developed Reconfigurable Communication Processors
Naoto Sumita, Masaki Murakami, Yu Nishio, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-26
In order to cope with traffic growth and service diversity the Photonic Network Processor (PNP) has been proposed. As a ... [more] PN2019-26
pp.15-22
IA, ICSS 2019-06-07
11:20
Miyagi Research Institute for Electrical Communication, Tohoku University Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network
Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] IA2019-8 ICSS2019-8
pp.37-41
ICM, IPSJ-CSEC, IPSJ-IOT 2019-05-24
09:25
Osaka   Feature Value for Low-Bandwidth L3, L4 DDoS Detection based on Number of 5-tuple Flows in 3-tuple Flow
Yuhei Hayashi (NTT), Hikofumi Suzuki (Shindai), Takeaki Nishioka (NTT) ICM2019-5
Recently, new sophisticated attacks such as pulse-wave DDoS has been observed. The DDoS attack repeats short duration at... [more] ICM2019-5
pp.65-70
IN, NS
(Joint)
2019-03-05
14:10
Okinawa Okinawa Convention Center Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack
Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] NS2018-271
pp.455-460
 Results 1 - 20 of 95  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan