Information and Systems-Software Science(Date:2016/03/03)

Presentation
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots

Naomi Kuze(Osaka Univ.),  Shu Ishikura(Osaka Univ.),  Takeshi Yagi(NTT),  Daiki Chiba(NTT),  Masayuki Murata(Osaka Univ.),  

[Date]2016-03-03
[Paper #]ICSS2015-55
Evaluation of the attack detection method based on duration of continuous packet arrival

Yuhei Hayashi(NTT),  Satoshi Nishiyama(NTT),  Akinori Suzuki(NTT),  Katsuhiko Sakai(NTT),  Ichiro Kudo(NTT),  Kazunori Kamiya(NTT),  

[Date]2016-03-03
[Paper #]ICSS2015-56
Investigation of cyber incident prediction method based on a technical analysis

Masaru Kawakita(NEC),  Shigeyoshi Shima(NEC),  

[Date]2016-03-03
[Paper #]ICSS2015-57
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling

Daichi Hasumi(NEC),  Shigeyoshi Shima(NEC),  Takahiro Kakumaru(NEC),  

[Date]2016-03-03
[Paper #]ICSS2015-53
Malicious-Spam-Mail Detection System with Autonomous Learning Ability

Shogo Osaka(Kobe Univ.),  Jun Kitazono(Kobe Univ.),  Seiichi Ozawa(Kobe Univ.),  Tao Ban(NICT),  Junji Nakazato(NICT),  Jumpei Shimamura(clwit),  

[Date]2016-03-03
[Paper #]ICSS2015-50
Observing Cyber Attacks on Building Control System by Honeypot

Ying Tie(YNU),  Koichi Shimizu(Mitsubishi Electric Corporation),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2016-03-03
[Paper #]ICSS2015-48
An Actual Survey on Web Scanning by URI Co-occurrence Detection

Yang Zhong(NTT),  Shingo Orihara(NTT),  Masaki Tanikawa(NTT),  Hajime Shimada(Nagoya Univ),  Tutomu Murase(Nagoya Univ),  Hiroki Takakura(NII),  Yoshihito Oshima(NTT),  

[Date]2016-03-03
[Paper #]ICSS2015-51
Storage-Efficient and Low-Power Packet Classification for Internet of Things

Yuta Kitamura(Nagoya Inst. of Tech.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2016-03-03
[Paper #]ICSS2015-49
Privacy-preserving Log Analysis with Deterministic Encryption

Yuji Furuta(Osaka Univ.),  Naoto Yanai(Osaka Univ.),  Masashi Karasaki(NTT-neomeit),  Katsuhiko Eguchi(NTT Neomeit),  Yasunori Ishihara(Osaka Univ.),  Toru Fujiwara(Osaka Univ.),  

[Date]2016-03-03
[Paper #]ICSS2015-54
Current Status and Issues of the Application of AI Technology for Digital Forensics

Shinichi Matsumoto(ISIT),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2016-03-03
[Paper #]
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents

Natsuko Kawakami(YNU),  Ryota kikkawa(YNU),  Ying Tie(YNU),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2016-03-03
[Paper #]
Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices

Shogo Suzuki(Yokohama National Univ.),  YinMin Papa(Yokohama National Univ.),  Yuta Ezawa(Yokohama National Univ.),  Ying Tie(Yokohama National Univ.),  Sou Nakayama(Yokohama National Univ.),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2016-03-03
[Paper #]ICSS2015-47
[Invited Talk] Looking Back on My Research

Yuko Murayama(Iwate Prefectural Univ.),  

[Date]2016-03-03
[Paper #]ICSS2015-52
Privacy-enhanced Similarity Search Scheme for Cloud Image Databases

Hao Liu(Tohoku Univ.),  Hideaki Goto(Tohoku Univ.),  

[Date]2016-03-04
[Paper #]ICSS2015-68
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs

Yusuke Ogata(NTT),  Yoshihiko Omori(NTT),  Takao Yamashita(NTT),  Tetsuya Iwata(NTT),  

[Date]2016-03-04
[Paper #]ICSS2015-62
Towards Non-Encryption-Based RFID Private Tag Authentication

Kazuya Sakai(TMU),  

[Date]2016-03-04
[Paper #]ICSS2015-64
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis

Jiawei Su(YNU),  Katsunari Yoshioka(YNU),  Junji Shikata(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2016-03-04
[Paper #]ICSS2015-58
Discrimination of communication traffic generated by malware-infected hosts

Sho Mizuno(Waseda University),  Mitsuhiro Hatada(Waseda University),  Tatsuya Mori(Waseda University),  Shigeki Goto(Waseda University),  

[Date]2016-03-04
[Paper #]ICSS2015-66
Static Detection of ROP Chain Based on Hidden Markov Model

Toshinori Usui(NTT),  Tomonori Ikuse(NTT),  Makoto Iwamura(NTT),  Takeshi Yada(NTT),  

[Date]2016-03-04
[Paper #]ICSS2015-59
An Autonomous DDoS Backscatter Detection System from Darknet Traffic

Yuki Ukawa(Kobe Univ.),  Jun Kitazono(Kobe Univ.),  Seiichi Ozawa(Kobe Univ.),  Tao Ban(NICT),  Junji Nakazato(NICT),  Jumpei Shimamura(clwit),  

[Date]2016-03-04
[Paper #]ICSS2015-67
12>> 1-20hit(29hit)