Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CAS, MSS, IPSJ-AL [detail] |
2022-11-17 15:50 |
Kochi |
(Primary: On-site, Secondary: Online) |
White Hat Bots Preventing the Spread of Malicious Botnets Ryutarou Matsumoto, Shingo Yamaguchi (Yamaguchi Univ.) CAS2022-44 MSS2022-27 |
This paper formulates a problem of building a firewall to stop spreading a malicious botnet using a given number
of whi... [more] |
CAS2022-44 MSS2022-27 pp.38-41 |
IN, CCS (Joint) |
2022-08-05 09:20 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
PathRakeTCP: Available Bandwidth Estimation Using Many TCP Connections for Passing through Firewalls Naoyuki Ito (Nagoya Univ.), Takashi Oshiba, Kozo Satoda (NEC Corp.), Tutomu Murase (Nagoya Univ.) IN2022-19 |
We propose PathRakeTCP, can estimate the available bandwidth even if there is a firewall rejects UDP on the path. firewa... [more] |
IN2022-19 pp.21-26 |
NS |
2021-04-16 10:50 |
Online |
Online |
The service identifier based network access control method for supporting system of people with disabilities. Masaaki Noro, Yosuke Takano, Naoki Oguchi (FUJITSU LABORATORIES), Shunji Abe (NII) NS2021-10 |
Research and development of a support system using camera images for people with disabilities who bring their smartphone... [more] |
NS2021-10 pp.53-58 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
IN, IA (Joint) |
2019-12-19 11:35 |
Hiroshima |
Satellite Campus Hiroshima |
Implementation and Evaluation of Firewall Traversal Method by Inserting Pseudo TCP Header on End-nodes Keigo Taga, Kouichi Mouri, Junjun Zheng (Ritsumei Univ), Shoichi Saito (NIT), Eiji Takimoto (Ritsumei Univ) IN2019-47 |
A wide range of communication protocols has been developed recently to address service diversification. At the same time... [more] |
IN2019-47 pp.13-18 |
CAS, MSS, IPSJ-AL [detail] |
2019-11-29 09:45 |
Fukuoka |
|
Exact Algorithm for Sorting Rules in Firewall Ryosuke Fumiiwa, Toshinori Yamada (Saitama Univ.) CAS2019-55 MSS2019-34 |
Given a firewall policy(a sequence of packet rules), the sorting problem of rules in a firewall is to sort the rules in ... [more] |
CAS2019-55 MSS2019-34 pp.73-78 |
MoNA, IN, CNR (Joint) [detail] |
2018-11-16 10:45 |
Saga |
Karatsu Civic Exchange Plaza |
Firewall traversal method by inserting pseudo TCP header into QUIC Keigo Taga, Junjun Zheng, Koichi Mouri (Ritsumei Univ), Shoichi Saito (NIT), Eiji Takimoto (Ritsumei Univ) MoNA2018-37 CNR2018-34 |
With the diversification of services, various communication protocols have been developed.
Meanwhile, firewalls are ins... [more] |
MoNA2018-37 CNR2018-34 pp.87-92(MoNA), pp.93-98(CNR) |
IA |
2018-09-04 15:15 |
Hokkaido |
Hokkaido Univ. Conference Hall |
A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28 |
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] |
IA2018-28 pp.77-81 |
NS, IN (Joint) |
2018-03-01 09:40 |
Miyazaki |
Phoenix Seagaia Resort |
A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91 |
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more] |
IN2017-91 pp.11-14 |
IA, IN (Joint) |
2017-12-14 11:15 |
Hiroshima |
Hiroshima City Univ. |
Joint Deployment of Virtual Routing Function and Virtual Firewall function in NEV-based Network with minimum total network Cost Kenichiro Hida, Shin-ichi Kuribayashi (Seikei Univ.) IN2017-48 |
The algorithm to determine the place where network functions are located and how much capacities of network functions fl... [more] |
IN2017-48 pp.13-18 |
RCS, IN, NV (Joint) |
2017-05-12 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Lecture]
Implementing a distributive virtual firewall using OpenFlow Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-11 RCS2017-49 |
Recently, DNS amplification attacks to a targeted server is occurring frequently. Those attacks also cause congestion of... [more] |
IN2017-11 RCS2017-49 pp.55-58(IN), pp.109-112(RCS) |
NS, IN (Joint) |
2017-03-03 14:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251 |
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] |
NS2016-251 pp.541-546 |
IA |
2016-11-04 10:00 |
Overseas |
Taipei (Taiwan) |
SDN-based Distributed firewall Yuwei Chang, Tsungnan Lin (NTU) IA2016-45 |
Separating the control and data plane, Software-defined network may increase the scalability and programmability of the ... [more] |
IA2016-45 pp.81-86 |
IN, RCS (Joint) |
2016-05-20 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2016-16 |
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] |
IN2016-16 pp.85-88 |
NS, IN (Joint) |
2016-03-04 11:40 |
Miyazaki |
Phoenix Seagaia Resort |
Latent Workload Estimation of Virtul Firewall Dai Suzuki, Satoshi Imai, Katagiri Toru (Fujitsu Lab) NS2015-227 |
NFV(Network Functions Virtualization)has been attracting attention as a technology realizing software-based functions on... [more] |
NS2015-227 pp.341-346 |
NS, IN (Joint) |
2016-03-04 13:30 |
Miyazaki |
Phoenix Seagaia Resort |
Evaluation on Virtual Firewall Schemes against DNS Amplification Attacks Eitetsu Gen, Shota Endo (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2015-140 |
Recently, DDoS attacks that disturb service offering in the Internet have occurred frequently. In order to mitigate such... [more] |
IN2015-140 pp.189-192 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
MoNA, IN (Joint) |
2013-11-21 15:50 |
Kumamoto |
Kumamoto University |
A Report on effects of multiple active virtual routers and L3FWs Takaaki Koyama, Toshiharu Kishi, Tomoko Inoue, Yukio Nagafuchi, Hideo Kitazume (NTT) IN2013-89 |
The development of the network virtualization technology and the virtual network appliance enables us to set the several... [more] |
IN2013-89 pp.13-18 |
IN |
2011-10-21 11:25 |
Osaka |
Osaka University |
On the automatic adjustment of the firewall's rules Yuu Nishida, Takashi Kobayashi (Kansai Univ.) IN2011-88 |
Although the administrator checked the log of IDS and has added a new rule to the firewall in the conventional system,th... [more] |
IN2011-88 pp.53-56 |
CPSY |
2009-11-20 13:40 |
Kyoto |
Campus Plaza Kyoto |
A Study on Deployment of Network Appliances Functionalities in Datacenter Network Hiroshi Ueno, Masaharu Morimoto, Takafumi Aida, Takahide Sugita (NEC Corp.) CPSY2009-36 |
In this report, we propose a dynamic reconfigurable frontend system enabled by frontend virtualization and OpenFlow in d... [more] |
CPSY2009-36 pp.7-12 |