Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-81 |
Detection of malicious communications from communication logs may pose a risk of privacy infringement as it requires mon... [more] |
ICSS2023-81 pp.87-92 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
ICSS, IPSJ-SPT |
2023-03-14 10:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2022-74 |
The detection of malicious communications from traffic logs has an aspect of invading the privacy because of monitoring ... [more] |
ICSS2022-74 pp.157-162 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
IA, ICSS |
2022-06-23 14:30 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation. Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4 |
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] |
IA2022-4 ICSS2022-4 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
ICSS |
2019-11-13 15:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65 |
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] |
ICSS2019-65 pp.31-36 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Primary Discussion about a Honeypot System for IoT Aimed Protocols Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2016-57 |
In these days, clients and systems which are appealing IoT is rapidly spreading. So, we have to concern about cyber atta... [more] |
ICSS2016-57 pp.103-108 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:10 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) SITE2015-73 IA2015-105 |
In recent years, it has been a social issue that cyber-attacks are increasing for the purpose of money or secret informa... [more] |
SITE2015-73 IA2015-105 pp.221-226 |
IN, IA (Joint) |
2015-12-17 17:10 |
Hiroshima |
Hiroshima City University |
Dynamic construction of to-many communication topology by using OpenFlow Shun Yanase, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) IA2015-76 |
To-many communication such as streaming and multi-point video conferencing basically uses tree structure of content dist... [more] |
IA2015-76 pp.43-48 |
ICSS |
2015-11-26 14:10 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36 |
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] |
ICSS2015-36 pp.7-12 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |
IA |
2014-11-06 15:30 |
Overseas |
Thailand |
Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52 |
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] |
IA2014-52 pp.91-96 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] |
ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 pp.75-80 |
ICSS, IA |
2014-06-06 13:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Implementation of the Administration Policy Description Method on Automatic Network Organization System Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10 |
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] |
IA2014-10 ICSS2014-10 pp.49-54 |
ICSS, IPSJ-SPT |
2014-03-28 13:55 |
Okinawa |
Meio Univiersity |
Proposal of malware classification method based on pattern similarity of traffic Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2013-83 |
[more] |
ICSS2013-83 pp.149-154 |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |