Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
NS, IN (Joint) |
2024-03-01 10:45 |
Okinawa |
Okinawa Convention Center |
A Comprehensive Analysis of Handshake as a Blockchain-based DNS Katsuki Isobe, Daishi Kondo, Hideki Tode (OMU) NS2023-199 |
There are concerns about the risk of domain squatting on the alternative technologies to the domain name system (DNS) us... [more] |
NS2023-199 pp.160-165 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 10:20 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Let's ENScrypt Yuji Suga (IIJ) NS2023-111 |
We considered a service that issues X.509 certificates for ENS-based domains. When deploying a key to a Web server, it i... [more] |
NS2023-111 p.13 |
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
AP, SANE, SAT (Joint) |
2022-07-27 15:30 |
Hokkaido |
Asahikawa Taisetsu Crystal Hall (Primary: On-site, Secondary: Online) |
Time Reversal Algorithm Position Estimation of Cylindrical Target/s Using Direct Path and Multipath Cross-correlation Hanns Christian Jaurigue Chua, Keizo Cho, Hiroaki Nakabayashi, Koji Suizu (Chiba Inst. of Tech) AP2022-43 |
This research proposes the usage of the time-reversal algorithm to estimate one and two passive thin cylindrical targets... [more] |
AP2022-43 pp.50-55 |
NS |
2021-05-13 14:25 |
Online |
Online |
A Study on Privacy Concerns by Single-Word Search Query Leakage from Web Browsers through Domain Name System Katsuki Isobe, Daishi Kondo, Hideki Tode (OPU) NS2021-18 |
Some web browsers used in some specific computers have a specification that a single-word search query (a word that cont... [more] |
NS2021-18 pp.20-25 |
KBSE |
2021-01-23 15:00 |
Online |
Online |
Consideration of evaluation datasets for DNS tunnel detection research Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32 |
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more] |
KBSE2020-32 pp.19-24 |
ISEC, IT, WBS |
2020-03-10 13:25 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Research on DNS tunnel detection by machine learning using appearance characters
-- Consideration of implementation of evaluation program -- Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52 |
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more] |
IT2019-103 ISEC2019-99 WBS2019-52 pp.87-94 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-02 14:05 |
Online |
Online |
Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67 |
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] |
SITE2019-89 IA2019-67 pp.7-12 |
ISEC, SITE, LOIS |
2019-11-02 15:25 |
Osaka |
Osaka Univ. |
Research on DNS tunnel detection by machine learning using appearance characters Tetsuya Asakura, Takeo Tatsumi (OUJ) ISEC2019-84 SITE2019-78 LOIS2019-43 |
In this study, as a detection technique of DNS tunnel, it was tried to detect abnormal DNS query string by machine learn... [more] |
ISEC2019-84 SITE2019-78 LOIS2019-43 pp.141-148 |
ICSS, IPSJ-SPT |
2019-03-07 16:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Analyzing Deceptive Internationalized Domain Names Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76 |
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] |
ICSS2018-76 pp.47-52 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2018-12-06 11:20 |
Hiroshima |
Satellite Campus Hiroshima |
An FPGA-NIC Based 40-Gbit/s Automated Response Circuit for Invalid DNS Packets to Suppress CPU Utilization of DNS Content Server Shoko Ohteru, Saki Hatta, Tomoaki Kawamura (NTT), Koji Yamazaki (NTT-AT), Takahiro Hatano, Akihiko Miyazaki, Koyo Nitta (NTT) VLD2018-55 DC2018-41 |
(To be available after the conference date) [more] |
VLD2018-55 DC2018-41 pp.113-118 |
DE |
2017-06-23 13:40 |
Tokyo |
|
Analyzing trend of foods using multidomain data Masashi Anzawa, Sosuke Amano, Kiyoharu Aizawa (Univ. of Tokyo), Makoto Ogawa (foo.log), Shin'ichi Satou (NII) DE2017-2 |
People's diet is influenced variously such as social and cultural factors. the trend of meal changes by TV and SNS besid... [more] |
DE2017-2 pp.7-10 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
EMCJ, IEE-EMC |
2014-12-19 16:40 |
Shizuoka |
Shizuoka Univ. |
[Special Talk]
SI/PI/EMI Simulation Techniques and Their Exploitation for Chip/Package/Board/Chassis Co-design
-- Multi-domain Simulation -- Hideki Asai (Shizuoka Univ.) EMCJ2014-83 |
With the progress of system integration technology, so-called signal/power integrity (SI/PI) and EMI
(Electromagnetic I... [more] |
EMCJ2014-83 p.81 |
ICSS, IPSJ-SPT |
2014-03-28 11:40 |
Okinawa |
Meio Univiersity |
DNS Traffic Analysis Platform with Hadoop Framework Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80 |
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] |
ICSS2013-80 pp.131-135 |
NS, IN (Joint) |
2013-03-07 09:20 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A proposal of a tree type ring network transporting E-mail packets by domain name of mail server and fixed telephone number address Hideo Tatsuno, Hiroshi Yasukawa (Aichi Pref. Univ.), Tsuneo Mizuno (Mizuno International Intellectual Property Firm) NS2012-201 |
This paper proposes a tree type ring network transporting E-mail packets by domain name of mail server and fixed telepho... [more] |
NS2012-201 pp.207-212 |
CQ, ICM, NS (Joint) |
2012-11-15 15:45 |
Shiga |
Nagahama Inst. of Bio-Science and Tech. |
[Tutorial Lecture]
Current issues of resource management in the Internet Shigeki Goto (Waseda Univ.) NS2012-109 CQ2012-63 ICM2012-30 |
This paper describes the current issues concerning resource management in the Internet. We discuss several topics based... [more] |
NS2012-109 CQ2012-63 ICM2012-30 pp.33-34(NS), pp.33-34(CQ), pp.9-10(ICM) |
IA, SITE, IPSJ-IOT [detail] |
2012-03-15 14:45 |
Hokkaido |
Hokkaido Univ. |
Desired management method of the domain names from the viewpoint of the self governance in the Internet Yuna Fujita, Yukio Hiramatsu (OIT) SITE2011-37 IA2011-87 |
Internet systems haves been managed and operated based on self-governance in general. Domain name system is one of such ... [more] |
SITE2011-37 IA2011-87 pp.89-94 |
SS |
2012-03-14 11:40 |
Okinawa |
Tenbusu-Naha |
Design and Implementation of Domain-Specific Language for Mining Software Repositories Kazuhiro Yamashita, Daisuke Yamamoto, Yasutaka Kamei, Kenji Hisazumi, Naoyasu Ubayashi (Kyushu Univ.) SS2011-81 |
To improve the effectiveness of the process for collecting and pre-processing data from software repositories,
we desig... [more] |
SS2011-81 pp.145-150 |