Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-02 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80 |
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] |
ICSS2019-80 pp.73-78 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
IA, ICSS |
2015-06-12 14:10 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Can internet measurement be a noise for analysis of darknet? Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.) IA2015-15 ICSS2015-15 |
Darknet is a passive sensor system dedicated to monitoring traffic
routed to unused IP address space.
Darknets have be... [more] |
IA2015-15 ICSS2015-15 pp.81-86 |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82 |
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] |
ICSS2014-82 pp.115-120 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
IA, ICSS |
2013-06-21 13:50 |
Niigata |
Ao-re Nagaoka |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14 |
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] |
IA2013-14 ICSS2013-14 pp.79-84 |
NS, IN (Joint) |
2012-03-09 15:20 |
Miyazaki |
Miyazaki Seagia |
Expanding Darknet Space with Virtual Sensors Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189 |
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] |
IN2011-189 pp.311-316 |
ICSS |
2011-03-25 16:25 |
Tokyo |
Suspended |
Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66 |
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] |
ICSS2010-66 pp.59-64 |
IA, ICSS |
2010-06-17 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A data screening technique for network log data by frequent sequential pattern mining Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) IA2010-2 ICSS2010-2 |
To early detect and defend the threats in the Internet caused by botnet,
darknet monitoring is very important to unders... [more] |
IA2010-2 ICSS2010-2 pp.7-12 |
ICSS |
2009-11-13 15:55 |
Miyazaki |
University of Miyazaki |
A Consideration of Feature Extraction for Attacks on Darknet Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60 |
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] |
ICSS2009-60 pp.37-42 |
ICSS |
2009-11-13 16:20 |
Miyazaki |
University of Miyazaki |
The relation betwenn the arrangement of network sensors and the information obtained by the sensors Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more] |
|