IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 522

Information and Communication System Security

Workshop Date : 2017-03-13 - 2017-03-14 / Issue Date : 2017-03-06

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2016-46
Clustering of Bot Port Scan and Brute-force Activities
Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII)
pp. 1 - 6

ICSS2016-47
Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
pp. 7 - 12

ICSS2016-48
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 13 - 18

ICSS2016-49
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA)
pp. 31 - 36

ICSS2016-50
A Brief Review on Anomaly Detection and its Applications to Cybersecurity
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai)
pp. 37 - 42

ICSS2016-51
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT)
pp. 43 - 48

ICSS2016-52
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo)
pp. 49 - 54

ICSS2016-53
Evaluation of memory image acquisition/analysis function in forensics tools
Ikuo Tanaka, Masaki Hashimoto (IISEC)
pp. 79 - 84

ICSS2016-54
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.)
pp. 85 - 90

ICSS2016-55
Effective Analysis of Macro Malware Based on Clustering
Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT)
pp. 91 - 96

ICSS2016-56
A Study on Parameter Adjustment of Whitelist Detection Rule
Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ)
pp. 97 - 102

ICSS2016-57
Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 103 - 108

ICSS2016-58
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ)
pp. 111 - 116

ICSS2016-59
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT)
pp. 117 - 122

ICSS2016-60
Attack Pattern Extraction by Clustering Parameters
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT)
pp. 123 - 128

ICSS2016-61
(See Japanese page.)
pp. 129 - 134

ICSS2016-62
(See Japanese page.)
pp. 135 - 140

ICSS2016-63
Assignment and Solution regarding Access Control of a Camera on a Computer
Yuri Yoshino, Masaki Inamura (TDU)
pp. 141 - 146

ICSS2016-64
Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
pp. 147 - 152

ICSS2016-65
Graph based Detection of Advanced Persistent Threat on LAN
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT)
pp. 153 - 158

ICSS2016-66
Low rate attack detection method based on duration of burst state by using quick packet matching function
Yuhei Hayashi, Jia Yong Zhen, Satoshi Nishiyama, Akira Misawa (NTT)
pp. 159 - 164

ICSS2016-67
Ransomware Detection Focused on Encryption Processing
Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions)
pp. 165 - 169

ICSS2016-68
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU)
pp. 171 - 176

ICSS2016-69
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.)
pp. 177 - 182

ICSS2016-70
A Study of Security Evaluation for Composite Systems
Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Takeshi Ueda (Mitsubishi Electric Corp.), Masakatsu Nishigaki (Shizuoka Univ.)
pp. 183 - 187

ICSS2016-71
Vibration-based Key Exchange among Multiple Smart Devices on the Desk
Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.)
pp. 189 - 194

ICSS2016-72
A system architecture that prevents fraud issue using third parties to issue authentication information
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT)
pp. 195 - 200

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan