|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221 |
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] |
NS2023-221 pp.288-293 |
PN |
2023-03-02 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Distributed DDoS Protection Method in the Core Network with Reconfigurable Device Edge Coordination Tomoki Naoi, Masaki Murakami, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka (Keidai) PN2022-58 |
Distributed Denial-of-Service (DDoS) attacks are a growing problem today, and it is difficult for individual users to mi... [more] |
PN2022-58 pp.83-89 |
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
NS, IN (Joint) |
2008-03-06 11:50 |
Okinawa |
Bankoku Shinryokan |
Identification Method of Attacking Source Using Traffic Flow in Backbone Networks Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169 |
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] |
IN2007-169 pp.61-66 |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Identification of attack sources by estimating traffic matrix Yuichi Ohsita (Osak Univ), Shingo Ata (Osaka City Univ), Masayuki Murata (Osak Univ) |
Distributed denial-of-service attacks on public servers have recently become more serious. The most effective way to pre... [more] |
NS2005-86 IN2005-74 CS2005-32 pp.43-48(NS), pp.79-84(IN), pp.91-96(CS) |
NS, IN |
2005-03-04 09:00 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Performance Improvement on Probabilistic Packet Marking using History Caching Hiroomi Isozaki, Shingo Ata, Ikuo Oka (Osaka City Univ.) |
Probabilistic Packet Marking(PPM) is one of the methods on IP traceback, which embeds (i.e., marks) the address of an in... [more] |
NS2004-249 IN2004-249 pp.35-40 |
IA |
2004-10-28 13:15 |
Ibaraki |
AIST |
Simulation of IP Traceback for the Denial of Service Attack
-- Simulation of IP Marking Traceback -- Masahito Yamana, Katsuhiro Hirata, Hiroshi Shimizu, Hiroshige Nakatani, Toshihumi Kai (MEW), Katsuji Tsukamoto (Kogakuin Univ.) |
Recently, Denial of Service (DoS) Attacks become serious problems. In order to protect DoS Attacks, various kinds of IP ... [more] |
IA2004-13 pp.1-6 |
IA |
2004-07-12 10:30 |
Tokyo |
The University of Tokyo (Hongo Campus) |
Simulation of IP Traceback for the Denial of Service Attack Masahito Yamana, Katsuhiro Hirata, Hiroshi Shimizu, Hiroshige Nakatani, Toshihumi Kai (Matshushita Electric..), Katsuji Tsukamoto (Kogakuin Univ.) |
Recently, Denial of Service (DoS) Attacks become serious problems. In order to protect DoS Attacks, various kinds of IP ... [more] |
IA2004-7 pp.1-6 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|