Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SRW, SeMI, CNR (Joint) |
2020-11-26 17:20 |
Online |
Online |
[Poster Presentation]
Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32 |
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] |
SeMI2020-32 pp.67-72 |
PN |
2020-03-03 09:50 |
Kagoshima |
(Cancelled but technical report was issued) |
DDoS defense method by logically isolating attackers Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63 |
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] |
PN2019-63 pp.65-71 |
IA |
2017-11-15 14:40 |
Overseas |
KMITL, Bangkok, Thailand |
SDN based Design for Detection of Distributed Denial of Service (DDoS) attack Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong (PSU) IA2017-32 |
Networking Technologies are more advanced in Information and communication Technology (ICT). So,networking devices are n... [more] |
IA2017-32 pp.13-18 |
NS |
2017-10-27 11:35 |
Osaka |
I-site nanba |
A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
NS2017-110 pp.95-100 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 10:20 |
Osaka |
Osaka Uinv. |
A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
IN2016-58 pp.55-60 |
IN, NS (Joint) |
2011-03-04 09:10 |
Okinawa |
Okinawa Convention Center |
An Adaptive Defense Against Large DDoS Attack Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI Labs.) IN2010-195 |
Distributed Denial-of-Service attack is one of the serious problem on network security. The attack exhausts not only com... [more] |
IN2010-195 pp.307-312 |
NC |
2009-10-23 14:55 |
Saga |
Saga University |
Network IP packet analysis method using statistical information by Self-Organizing Maps Takeru Kabashima, Hiroshi Dozono (Saga Univ.) NC2009-38 |
Recently, the spread of the Internet makes familiar to the crimes concerning the Internet, such as a DoS attack and a DD... [more] |
NC2009-38 pp.7-12 |
NS |
2008-05-15 15:25 |
Hokkaido |
Future University-Hakodate |
Entropy-based Input-Output Traffic Mode Detection Scheme for DoS/DDoS Attacks Zhang Fengxiang (SOKENDAI), Shunji Abe (NII) NS2008-2 |
Nowadays Distributed Denial of Service(DDoS) attacks are threatening the widely used Internet. How to detect DDoS attack... [more] |
NS2008-2 pp.7-12 |
IN |
2007-06-22 15:25 |
Hokkaido |
Future University-Hakodate |
Adaptive Timer-Based Defense Mechanisms against TCP SYN Flood Attack Hirofumi Akaike, Masaki Aida (Tokyo Metropolitan Univ.), Masayuki Murata, Makoto Imase (Osaka Univ.) IN2007-26 |
Through the rapid development of the Internet in recent years, the security in networks becomes urgent
issues. Distribu... [more] |
IN2007-26 pp.91-96 |
IN |
2006-12-15 14:25 |
Osaka |
|
An Introduction of Pushback Mechanism into Path Identification Methods for DDoS Defence Yoichi Kaneko, Shigetomo Kimura, Yoshihiko Ebihara (Univ. of Tsukuba) IN2006-132 |
Pi (Path Identification) method is proposed as a mechanism for defending DDoS (Distributed Denial of Service) attack. In... [more] |
IN2006-132 pp.109-114 |
IN, NS, CS (Joint) |
2006-09-14 13:30 |
Miyagi |
|
[Invited Talk]
On Tracing and Mitigating Distributed Denial of Service Attacks Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22 |
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major conc... [more] |
NS2006-76 IN2006-56 CS2006-22 pp.33-43(NS), pp.43-53(IN), pp.1-11(CS) |
IN |
2006-02-17 09:30 |
Kochi |
Kochi Univ. of Technology |
Methods for Improving Performance on Packet Marking by Reducing Marking Duplicates Hiroomi Isozaki, Shingo Ata, Ikuo Oka (Osaka City Univ) |
Probabilistic Packet Marking (PPM) is one of the methods on IP traceback. In this method, intermediate router embeds (i.... [more] |
IN2005-151 pp.49-54 |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Identification of attack sources by estimating traffic matrix Yuichi Ohsita (Osak Univ), Shingo Ata (Osaka City Univ), Masayuki Murata (Osak Univ) |
Distributed denial-of-service attacks on public servers have recently become more serious. The most effective way to pre... [more] |
NS2005-86 IN2005-74 CS2005-32 pp.43-48(NS), pp.79-84(IN), pp.91-96(CS) |
NS, IN |
2005-03-04 09:00 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Performance Improvement on Probabilistic Packet Marking using History Caching Hiroomi Isozaki, Shingo Ata, Ikuo Oka (Osaka City Univ.) |
Probabilistic Packet Marking(PPM) is one of the methods on IP traceback, which embeds (i.e., marks) the address of an in... [more] |
NS2004-249 IN2004-249 pp.35-40 |
IN |
2004-12-16 13:50 |
Hiroshima |
Hiroshima City Univ. |
Deployable Overlay Network for Defense against Distributed SYN Flood Attacks Yuichi Ohsita (Osaka Univ.), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.) |
Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, s... [more] |
IN2004-125 pp.13-18 |
IA |
2004-10-28 13:15 |
Ibaraki |
AIST |
Simulation of IP Traceback for the Denial of Service Attack
-- Simulation of IP Marking Traceback -- Masahito Yamana, Katsuhiro Hirata, Hiroshi Shimizu, Hiroshige Nakatani, Toshihumi Kai (MEW), Katsuji Tsukamoto (Kogakuin Univ.) |
Recently, Denial of Service (DoS) Attacks become serious problems. In order to protect DoS Attacks, various kinds of IP ... [more] |
IA2004-13 pp.1-6 |
IA |
2004-07-12 10:30 |
Tokyo |
The University of Tokyo (Hongo Campus) |
Simulation of IP Traceback for the Denial of Service Attack Masahito Yamana, Katsuhiro Hirata, Hiroshi Shimizu, Hiroshige Nakatani, Toshihumi Kai (Matshushita Electric..), Katsuji Tsukamoto (Kogakuin Univ.) |
Recently, Denial of Service (DoS) Attacks become serious problems. In order to protect DoS Attacks, various kinds of IP ... [more] |
IA2004-7 pp.1-6 |