Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-11-22 16:25 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
Improving the accuracy of flow prediction and anomaly detection in GAMPAL, a general-purpose anomaly detection mechanism for Internet traffic Taku Wakui (Keio Univ./Hitachi), Fumio Teraoka (Keio Univ.), Takao Kondo (Hokkaido Univ./Keio Univ.) IA2023-41 |
The authors propose a general-purpose anomaly detection mechanism using Prefix Aggregate without Labeled data (GAMPAL) f... [more] |
IA2023-41 pp.33-40 |
IA |
2023-09-22 10:40 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
OLIViS: An OSINT-Based Lightweight Method for Identifying Video Content Services for Capacity Planning in Backbone ISPs Yuki Tamura, Fumio Teraoka, Takao Kondo (Keio Univ.) IA2023-23 |
As of 2022, 66% of Internet traffic is generated by video content services, among which Netflix and YouTube are the domi... [more] |
IA2023-23 pp.75-82 |
AI |
2023-09-12 15:15 |
Hokkaido |
|
A Study on the Implementation of Cooperative CAVs by Sharing the Observation Information Using Simulations and Considerations Based on Qualitative Evaluation Ken Matsuda (Graduate School of FUN), Ei-Ichi Osawa (FUN) AI2023-4 |
This study focuses on cooperative connected autonomous vehicles (cooperative CAVs). This research aims to propose a simu... [more] |
AI2023-4 pp.19-24 |
NS |
2023-04-14 11:40 |
Fukushima |
Nihon University, Koriyama Campus + Online (Primary: On-site, Secondary: Online) |
Network Anomaly Detection through Variable Granularity Traffic Analysis Shohei Kamamura, Yuya Takeda (Seikei Univ.), Yuki Takei, Masato Nishiguchi, Yuhei Hayashi, Takayuki Fujiwara (NTT) NS2023-9 |
In the Society 5.0, it is important to accurately measure and analyze the communication traffic flow in wide-area IP net... [more] |
NS2023-9 pp.44-49 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 09:45 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A Method for Identifying Content Delivery Services Using Traffic Information and Public Information from ISP's Perspective Yuki Tamura, Takao Kondo, Ryo Yasumori, Fumio Teraoka (Keio Univ.) SITE2021-47 IA2021-60 |
In this paper, we propose a method for identifying the traffic of content delivery services based on flow information (e... [more] |
SITE2021-47 IA2021-60 pp.7-14 |
CS |
2021-10-15 10:15 |
Online |
Online |
A study on traffic monitoring method for control networks Ginga Katsurai, Hiroaki Mukai, Tetsuya Yokotani (KIT) CS2021-56 |
In recent years, cyber attacks targeting control systems such as buildings and factories have become apparent. There is ... [more] |
CS2021-56 pp.20-25 |
IN, NS, CS, NV (Joint) |
2021-09-09 13:30 |
Online |
Online |
{Architecture for Configurable Real-time Device Identification in Campus Core Networks Kohei Hayashi (Osaka City Univ.), Kota Tuchie, Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata (Osaka City Univ.) IN2021-14 |
In recent years, data traffic of IoT devices is increasing rapidly. In order to achieve a secure management of large-sca... [more] |
IN2021-14 pp.13-18 |
IA, IN (Joint) |
2020-12-15 11:40 |
Online |
Online |
Application Identification Method with Meta-Learning Shun Tobiyama, Bo Hu, Kazunori Kamiya (NTT), Kenji Takahashi (NTT Ltd.) IN2020-40 |
With the continuous evolution of the Internet, a variety of web applications, such as video streaming, social network se... [more] |
IN2020-40 pp.43-48 |
HWS, VLD [detail] |
2020-03-06 11:20 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Development of Traffic Monitoring System for Network Virtualization with Hardware Accelerator Namiko Ikeda, Yuta Ukon, Shouko Ohteru, Shuhei Yoshida, Koyo Nitta (NTT) VLD2019-127 HWS2019-100 |
With the development of virtualization technologies such as NFV / SDN, various services using virtual machines (VMs) and... [more] |
VLD2019-127 HWS2019-100 pp.191-196 |
MoNA |
2018-12-25 16:10 |
Tokyo |
|
Traffic load characteristics analysis of equality based flow admission control by using virtual machines Hayato Sato, Sumiko Miyata (SIT) MoNA2018-53 |
A new admission control scheme that maximizes the satisfaction level (minimizes the total call loss probability) which a... [more] |
MoNA2018-53 pp.85-90 |
MoNA, IN, CNR (Joint) [detail] |
2018-11-15 11:15 |
Saga |
Karatsu Civic Exchange Plaza |
Identification of Video Hosting Sites by Encrypted Traffic Analysis Considering Multi-Flow Transmission Tomoki Ito (Nagoya Univ.), Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC), Tutomu Murase (Nagoya Univ.) MoNA2018-24 CNR2018-21 |
In recent years, requirement of network application users have advanced from the improvement of QoS (Quality of Service)... [more] |
MoNA2018-24 CNR2018-21 pp.13-18(MoNA), pp.19-24(CNR) |
NS, OCS, PN (Joint) |
2018-06-15 13:20 |
Fukushima |
Koriyama-Shoko-Kaigisho |
[Encouragement Talk]
Real-time Estimating Application Flow from Encrypted Traffic Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2018-33 |
In recent years, mobile network operators have focused on QoE and QoC of users, which requires advanced network control ... [more] |
NS2018-33 pp.31-36 |
ICM |
2018-03-09 15:20 |
Okinawa |
|
Study of data infrastructure for expanding use of network traffic analysis data Fuminori Ueno, Yasuhiro Onoduka, Yoshitaka Syuntou, Tomoyuki Otani (DOCOMO Technology) ICM2017-79 |
While the amount of flowing traffic in the mobile network has been increasing year by year, analysis of those data is on... [more] |
ICM2017-79 pp.139-143 |
SSS |
2017-06-20 13:00 |
Tokyo |
|
Characterization of ship traffic flow by Principal Component Analysis and its application to ship traffic risk assessment Sonoko Kawashima (NMRI), Yasumi Kawamura (YNU), Hiroko Itoh, Junji Fukuto (NMRI) SSS2017-7 |
Analysis and assessment of ship traffic have been conducted for safe navigation environment, and AIS data is used for an... [more] |
SSS2017-7 pp.1-4 |
ICTSSL |
2017-03-02 13:55 |
Niigata |
Niigata University |
A consideration on traffic control by information floating Kazuyuki Miyakita, Keisuke Nakano (Niigata Univ.) ICTSSL2016-70 |
In information floating (IF), information exchange between mobile nodes is restricted to a designated area (transmittabl... [more] |
ICTSSL2016-70 pp.5-10 |
IA |
2016-11-04 10:55 |
Overseas |
Taipei (Taiwan) |
Real-time Abnormal Traffic Detection Circuit Based on Simple Frequent-Itemset-Mining Method Shuji Sannomiya, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2016-47 |
To resist the growth of abnormal traffic such as P2P flows, DDoS attacks and Internet worms, a circuit design to realize... [more] |
IA2016-47 pp.93-98 |
CS, CQ, NV (Joint) |
2016-04-22 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On a Hybrid Packets-and-Circuits Switching Logic Marat Zhanikeev (Tokyo Univ. of Science) CS2016-8 |
The packets versus circuits argument is several decades old. Back in the day, what we today refer to as all-IP networki... [more] |
CS2016-8 pp.43-46 |
SSS |
2015-08-28 13:00 |
Tokyo |
|
[Invited Talk]
Safety-II in Air Traffic Control Daisuke Karikawa (ENRI) SSS2015-7 |
Air traffic controllers ensure safe and efficient air traffic flow, responding constantly changing conditions including ... [more] |
SSS2015-7 pp.1-4 |
CQ, CS (Joint) |
2015-04-22 11:10 |
Fukuoka |
Fukuoka Institute of Technology |
Multi-flow-based Traffic Analysis for Behavior Identification Yusuke Iemura, Yuichi Kumano (Osaka City Univ), Nobuyuki Nakamura (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ) CQ2015-10 |
Recently, application identification methods are attracted as an important role for network management which enables app... [more] |
CQ2015-10 pp.51-56 |
CQ, IMQ, MVE, IE (Joint) [detail] |
2015-03-03 16:30 |
Tokyo |
Seikei Univ. |
Detection and analysis of unusual traffic flow using sensing data of Tokyo-Nagoya Expressway Tomoatsu Maeda, Toshihiko Yamasaki, Kiyoharu Aizawa (Univ. of Tokyo) IMQ2014-40 IE2014-101 MVE2014-88 |
In this paper, we analyze the traffic flow of Tokyo-Nagoya Expressway using five-year detailed sensing data provided by ... [more] |
IMQ2014-40 IE2014-101 MVE2014-88 pp.67-68 |