Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2021-03-05 13:40 |
Online |
Online |
Computational Complexity Reduction by Dynamic Clustering in Network Scan Scheduling Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-157 |
In recent years, some users have required network scans for security or business.
On the other hand, since the number o... [more] |
NS2020-157 pp.203-207 |
NS, ICM, CQ, NV (Joint) |
2020-11-26 12:10 |
Online |
Online |
A study on Estimation of Retransmission Rate of Background Traffic with Scan Response Delay of Network Scan Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-79 |
Recently, in order to find vulnerable IoT devices for cyber-attacks, network scans have been required. In existing netwo... [more] |
NS2020-79 pp.20-25 |
ICSS, IPSJ-SPT |
2020-03-02 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80 |
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] |
ICSS2019-80 pp.73-78 |
IN, IA (Joint) |
2019-12-19 15:15 |
Hiroshima |
Satellite Campus Hiroshima |
Design of Honeynet to avoid IPv6 alias detection Hyuga Kobayashi, Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2019-50 |
In IPv6, full scan is infeasible due to its enourmous address space, thought it is easy in IPv4.
Hitlist, which is the ... [more] |
IA2019-50 pp.13-18 |
NS, ICM, CQ, NV (Joint) |
2019-11-22 09:25 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
A survey of response characteristics by wide area network scanning in Japan Yutaka Ishioka, Hiroaki Waki, Kazuhito Matsushita, Mitsuhiro Ohsaki (NTT-AT) NS2019-128 |
(To be available after the conference date) [more] |
NS2019-128 pp.45-49 |
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Estimating of congestion level in wireless network using the result of network scan Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) |
As a part of countermeasure against cyber attacks targeting vulnerabilities of IoT devices without enough security level... [more] |
|
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-10 13:25 |
Osaka |
I-Site Nanba(Osaka) |
Quantification of the impact of wide network scanning on IoT data communication in WLAN Hiroaki Hashida, Yuichi Kawamoto, Nei Kato (Tohoku Univ.) NS2019-44 |
In recent years, security issues of IoT devices have attracted the interest in the use of the wide network scanning as a... [more] |
NS2019-44 pp.7-12 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-12 11:25 |
Osaka |
I-Site Nanba(Osaka) |
Research and Development on Wide Area Network Scan Techniques for IoT Wireless Equipment Kazuto Yano, Naoto Egashira, Takuya Kurihara, Satoru Shimizu, Yoshinori Suzuki (ATR) RCC2019-49 NS2019-85 RCS2019-142 SR2019-61 SeMI2019-58 |
This paper introduces three elemental technologies to realize confident and efficient network scanning for a large amoun... [more] |
RCC2019-49 NS2019-85 RCS2019-142 SR2019-61 SeMI2019-58 pp.177-182(RCC), pp.203-208(NS), pp.199-204(RCS), pp.209-214(SR), pp.191-196(SeMI) |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-12 11:50 |
Osaka |
I-Site Nanba(Osaka) |
Study on Scheduling of Network Scan Timing using Integer Programming Takuya Kurihara, Kenta suzuki, Kazuto Yano, Yoshinori Suzuki (ATR) RCC2019-50 NS2019-86 RCS2019-143 SR2019-62 SeMI2019-59 |
In recent years, cyberattacks on vulnerable Internet of Things (IoT) devices are increasing, and it is necessary to clos... [more] |
RCC2019-50 NS2019-86 RCS2019-143 SR2019-62 SeMI2019-59 pp.183-188(RCC), pp.209-214(NS), pp.205-210(RCS), pp.215-220(SR), pp.197-202(SeMI) |
IA |
2018-09-03 14:10 |
Hokkaido |
Hokkaido Univ. Conference Hall |
Collecting a large number of active IPv6 addresses Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2018-16 |
Due to wide deployment of IPv6, security issues in IPv6 network is becoming more and more important. Scanning all IP add... [more] |
IA2018-16 pp.1-8 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
IN, IA (Joint) |
2011-12-16 13:15 |
Hiroshima |
Hiroshima City University |
A Network Scan Detection Algorithm
-- Using Dynamic Threshold -- Fumiya Miura, Hiroshi Inai (Okayama Pref Univ.) IA2011-52 |
As the Internet grows, network attacks by malicious clients and botnets are increasing. So, we should protect our own ne... [more] |
IA2011-52 pp.43-47 |
ICSS |
2009-11-13 16:45 |
Miyazaki |
University of Miyazaki |
A classification method for packet generation logic of darknet traffic based on characteristics of packet header Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61 |
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] |
ICSS2009-61 pp.43-48 |
ICSS |
2009-05-15 14:45 |
Hyogo |
Kobe University |
Network Observation and Analysis Report on nicter Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4 |
(To be available after the conference date) [more] |
ICSS2009-4 pp.15-20 |