Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2024-03-14 13:40 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Primary: On-site, Secondary: Online) |
LOIS2023-64 |
Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] |
LOIS2023-64 pp.96-101 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:25 |
Online |
Online |
A virtual-network replacing scheme for achieving a metabolic network Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24 |
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] |
IN2020-24 pp.13-18 |
NS, IN (Joint) |
2020-03-05 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93 |
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] |
IN2019-93 pp.103-108 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
NS, IN, CS, NV (Joint) |
2019-09-06 11:15 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study on Features Derived from Cache Property for DNS Tunneling Detection Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93 |
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] |
NS2019-93 pp.25-30 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Classification for Important Decoy Documents Based on Supervised Learning Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72 |
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] |
ICSS2017-72 pp.127-132 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
IA |
2017-11-16 11:05 |
Overseas |
KMITL, Bangkok, Thailand |
A Proposal of Dynamic Access Control with SDN for Practical Network Separation Satoki Nakamura (NIT), Hirokazu Hasegawa (Nagoya Univ.), Yuichiro Tateiwa (NIT), Hiroki Takakura (NII), Yonghwan KIM, Yoshiaki Katayama (NIT) IA2017-45 |
As one of effective countermeasures against recent sophisticated cyber attacks, many researches have paid attention to n... [more] |
IA2017-45 pp.65-69 |
RCS, IN, NV (Joint) |
2017-05-12 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5 |
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] |
IN2017-5 pp.21-24 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 15:40 |
Okinawa |
Culture Resort Festone (Okinawa) |
Struggling against New-Born Malwares Attached to Mails Motoyuki Ohmori, Naoki Miyata, Kiyoyuki Nakashima, Kenichi Takahashi (Tottori Univ.) SITE2016-70 IA2016-100 |
We, Tottori University, have been experiencing targeted attacks using malicious mails especially since fiscal year 2016.... [more] |
SITE2016-70 IA2016-100 pp.51-56 |
IA, IN (Joint) |
2016-12-16 13:20 |
Hiroshima |
Hiroshima city university |
A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82 |
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] |
IN2016-82 pp.91-96 |
ICSS, IPSJ-SPT |
2016-03-03 13:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as... [more] |
|
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Suspicious Processes Detection Scheme using Process Frequency and Network State Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-60 pp.77-82 |
ICSS, IPSJ-SPT |
2016-03-04 11:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61 |
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] |
ICSS2015-61 pp.83-88 |
NS, IN (Joint) |
2016-03-04 13:10 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Data Leak Prevention Mechanism by Network Monitoring using SDN Kosa Sato, Yuji Sekiya (The Univ. of Tokyo) IN2015-139 |
Data leakage due to cyber attacks called targeted attacks and e-mail wrong transmission has become a major problem in re... [more] |
IN2015-139 pp.183-188 |