Information and Systems-Information and Communication System Security(Date:2015/02/24)

Presentation
表紙

,  

[Date]2015/2/24
[Paper #]
目次

,  

[Date]2015/2/24
[Paper #]
A detection system which uses DNS traffic features to detect domains which are related to botnets

Wataru TSUDA,  Youki KADOBAYASHI,  Takeshi OKUDA,  Hiroaki HAZEYAMA,  

[Date]2015/2/24
[Paper #]ICSS2014-63
Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation

Kohei IMAI,  Shigeki AOKI,  Takao MIYAMOTO,  

[Date]2015/2/24
[Paper #]ICSS2014-64
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router : A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow

Ken EGUCHI,  Shota NAGATOMO,  Yuji YOKOYAMA,  Kaoru SANO,  Hirofumi YAMAKI,  Yoichiro UENO,  Hiroshi KOBAYASHI,  

[Date]2015/2/24
[Paper #]ICSS2014-65
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA

Teppei FUKUDA,  Tomohiro ISHIHARA,  Akira KATO,  

[Date]2015/2/24
[Paper #]ICSS2014-66
A trial of network security tests over federated testbeds

Masatoshi ENOMOTO,  HIROAKI Hazeyama,  Kazumasa KOBAYASHI,  Suguru YAMAGUCHI,  

[Date]2015/2/24
[Paper #]ICSS2014-67
A Pluggable and Programmable Platform for Analyzing Security Logs

Yu TSUDA,  Takashi TOMINE,  Masaki KAMIZONO,  Masashi ETO,  Daisuke INOUE,  

[Date]2015/2/24
[Paper #]ICSS2014-68
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique

Taichi HATA,  Manabu INUMA,  Junji SHIKATA,  Shin TAKEUCHI,  Koji NAKAO,  

[Date]2015/2/24
[Paper #]ICSS2014-69
Link Structural Analysis of Drive-by-Download Attacks

Yuji DAIRIKI,  Masaki KAMIZONO,  Masami MOHRI,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2015/2/24
[Paper #]ICSS2014-70
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation

Hirotaka FUJIWARA,  Gregory BLANC,  Hiroaki HAZEYAMA,  Takuji IIMURA,  Youki KADOBAYASHI,  

[Date]2015/2/24
[Paper #]ICSS2014-71
A Study on CAPTCHA System Using Differential Awkwardness-Obi ects

Michitomo YAMAGUCHI,  Takeshi OKAMOTO,  Hiroaki KIKUCHI,  

[Date]2015/2/24
[Paper #]ICSS2014-72
Novel USE Hub against the Malicious USE Devices

Tatsuya TAKEHISA,  Makoto IWAMURA,  Hayato USHIMARU,  Daisuke INOUE,  

[Date]2015/2/24
[Paper #]ICSS2014-73
Yet Another Electrical Forgery Attack on CAN using Strong Recessive

Takeshi SUGAWARA,  Minoru SAEKI,  Manabu MISAWA,  

[Date]2015/2/24
[Paper #]ICSS2014-74
A study on the safety of the pseudo-random number generator in RFID

Hiroyuki SATO,  Atsuko MIYAJI,  Chunhua SU,  

[Date]2015/2/24
[Paper #]ICSS2014-75
A New Explicit Relation Between Trace, Definition Field, and Embedding Degree

Atsuko MIYAJI,  Satoru TANAKA,  

[Date]2015/2/24
[Paper #]ICSS2014-76
Scalar Multiplication Algorithm with Resistance for Side-channel Attacks

Keisuke KITO,  Atsuko MIYAJI,  Ryota TAKAHASHI,  

[Date]2015/2/24
[Paper #]ICSS2014-77
An Estimation of Signature Schemes for Multiple Signers

Kenta MURANAKA,  Naoto YANAI,  shingo OKAMURA,  Toru FUJIWARA,  

[Date]2015/2/24
[Paper #]ICSS2014-78
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation

Yasuhiro YAMAMOTO,  Daisuke MIYAMOTO,  Masaya NAKAYAMA,  

[Date]2015/2/24
[Paper #]ICSS2014-79
Prediction of Malware Activities based on Loopback Address from DNS

Masaki KAMIZONO,  Takashi TOMINE,  Yu TSUDA,  Masashi ETO,  Yuji HOSHIZAWA,  Daisuke INOUE,  Katsunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2015/2/24
[Paper #]ICSS2014-80
123>> 1-20hit(43hit)