IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2020-03-02
15:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] ICSS2019-80
pp.73-78
IA, ICSS 2015-06-11
16:05
Fukuoka Kyushu Institute of Technology Univ. Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] IA2015-7 ICSS2015-7
pp.33-38
IA, ICSS 2015-06-12
14:10
Fukuoka Kyushu Institute of Technology Univ. Can internet measurement be a noise for analysis of darknet?
Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.) IA2015-15 ICSS2015-15
Darknet is a passive sensor system dedicated to monitoring traffic
routed to unused IP address space.
Darknets have be... [more]
IA2015-15 ICSS2015-15
pp.81-86
ICSS 2015-03-04
11:40
Okinawa Meio Univiersity Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] ICSS2014-82
pp.115-120
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Spam Analysis based on Mail Relay Routing
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] ICSS2013-75
pp.101-106
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
IA, ICSS 2013-06-21
13:50
Niigata Ao-re Nagaoka Network Observation and Analysis Report on nicter -- Close Encounters of Network Incident Sign --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] IA2013-14 ICSS2013-14
pp.79-84
NS, IN
(Joint)
2012-03-09
15:20
Miyazaki Miyazaki Seagia Expanding Darknet Space with Virtual Sensors
Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] IN2011-189
pp.311-316
ICSS 2011-03-25
16:25
Tokyo Suspended Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] ICSS2010-66
pp.59-64
IA, ICSS 2010-06-17
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University A data screening technique for network log data by frequent sequential pattern mining
Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) IA2010-2 ICSS2010-2
To early detect and defend the threats in the Internet caused by botnet,
darknet monitoring is very important to unders... [more]
IA2010-2 ICSS2010-2
pp.7-12
ICSS 2009-11-13
15:55
Miyazaki University of Miyazaki A Consideration of Feature Extraction for Attacks on Darknet
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] ICSS2009-60
pp.37-42
ICSS 2009-11-13
16:20
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan