IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2016)

Search Results: Keywords 'from:2017-03-13 to:2017-03-13'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2017-03-13
13:00
Nagasaki University of Nagasaki Clustering of Bot Port Scan and Brute-force Activities
Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-46
Cyber-attacks targeting IoT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages ... [more] ICSS2016-46
pp.1-6
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
ICSS, IPSJ-SPT 2017-03-13
13:50
Nagasaki University of Nagasaki Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] ICSS2016-48
pp.13-18
ICSS, IPSJ-SPT 2017-03-13
14:25
Nagasaki University of Nagasaki Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] ICSS2016-49
pp.31-36
ICSS, IPSJ-SPT 2017-03-13
14:50
Nagasaki University of Nagasaki A Brief Review on Anomaly Detection and its Applications to Cybersecurity
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) ICSS2016-50
 [more] ICSS2016-50
pp.37-42
ICSS, IPSJ-SPT 2017-03-13
15:15
Nagasaki University of Nagasaki Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] ICSS2016-51
pp.43-48
ICSS, IPSJ-SPT 2017-03-13
15:40
Nagasaki University of Nagasaki Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] ICSS2016-52
pp.49-54
ICSS, IPSJ-SPT 2017-03-13
16:15
Nagasaki University of Nagasaki Evaluation of memory image acquisition/analysis function in forensics tools
Ikuo Tanaka, Masaki Hashimoto (IISEC) ICSS2016-53
Currently, the information system is established as a social infrastructure, and accompanying it, the types and occurren... [more] ICSS2016-53
pp.79-84
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] ICSS2016-54
pp.85-90
ICSS, IPSJ-SPT 2017-03-13
17:05
Nagasaki University of Nagasaki Effective Analysis of Macro Malware Based on Clustering
Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) ICSS2016-55
 [more] ICSS2016-55
pp.91-96
ICSS, IPSJ-SPT 2017-03-13
16:15
Nagasaki University of Nagasaki A Study on Parameter Adjustment of Whitelist Detection Rule
Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) ICSS2016-56
Recently, the whitelist detection rule has been used as security measures for various system such control systems.
Only... [more]
ICSS2016-56
pp.97-102
ICSS, IPSJ-SPT 2017-03-13
16:40
Nagasaki University of Nagasaki Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] ICSS2016-57
pp.103-108
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] ICSS2016-58
pp.111-116
ICSS, IPSJ-SPT 2017-03-14
09:55
Nagasaki University of Nagasaki Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] ICSS2016-59
pp.117-122
ICSS, IPSJ-SPT 2017-03-14
10:20
Nagasaki University of Nagasaki Attack Pattern Extraction by Clustering Parameters
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-60
Web Application Firewall (WAF) is widely used to detect attacks against Web applications. New sorts of attacks occurs da... [more] ICSS2016-60
pp.123-128
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki ICSS2016-61 (To be available after the conference date) [more] ICSS2016-61
pp.129-134
ICSS, IPSJ-SPT 2017-03-14
09:55
Nagasaki University of Nagasaki ICSS2016-62  [more] ICSS2016-62
pp.135-140
ICSS, IPSJ-SPT 2017-03-14
10:20
Nagasaki University of Nagasaki Assignment and Solution regarding Access Control of a Camera on a Computer
Yuri Yoshino, Masaki Inamura (TDU) ICSS2016-63
Since macOS does not display a confirmation dialog to the user when applications access a webcam, an attacker can watch ... [more] ICSS2016-63
pp.141-146
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki Low rate attack detection method based on duration of burst state by using quick packet matching function
Yuhei Hayashi, Jia Yong Zhen, Satoshi Nishiyama, Akira Misawa (NTT) ICSS2016-66
 [more] ICSS2016-66
pp.159-164
ICSS, IPSJ-SPT 2017-03-14
11:20
Nagasaki University of Nagasaki Graph based Detection of Advanced Persistent Threat on LAN
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more]
ICSS2016-65
pp.153-158
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan