IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NLP, MSS 2023-03-16
16:45
Nagasaki
(Primary: On-site, Secondary: Online)
On Search for Malicious Botnet by White-Hat Worms in Botnet Defense System
Ryo Yamashita, Shingo Yamaguchi (Yamaguchi Univ.) MSS2022-93 NLP2022-138
This paper discusses the search for malicious botnets by white-hat worms in the Botnet Defense System (BDS). Since the I... [more] MSS2022-93 NLP2022-138
pp.144-149
MSS, SS 2023-01-11
15:25
Osaka
(Primary: On-site, Secondary: Online)
On Botnet Disinfection by Rebooting by Area
Yuji Katsura, Shingo Yamaguchi (Yamaguchi Univ.) MSS2022-60 SS2022-45
This paper proposes a method of rebooting on a per-area basis rather than on a per-device basis to get rid of IoT botnet... [more] MSS2022-60 SS2022-45
pp.90-95
CAS, MSS, IPSJ-AL [detail] 2022-11-17
15:50
Kochi
(Primary: On-site, Secondary: Online)
White Hat Bots Preventing the Spread of Malicious Botnets
Ryutarou Matsumoto, Shingo Yamaguchi (Yamaguchi Univ.) CAS2022-44 MSS2022-27
This paper formulates a problem of building a firewall to stop spreading a malicious botnet using a given number
of whi... [more]
CAS2022-44 MSS2022-27
pp.38-41
ICSS 2022-11-07
15:00
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots
Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44
(To be available after the conference date) [more] ICSS2022-44
pp.37-42
IA, ICSS 2022-06-24
11:25
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more]
IA2022-13 ICSS2022-13
pp.71-75
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
IA 2021-09-08
15:15
Online Online Detection and blocking system for suspicious DNS outbound query using RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] IA2021-24
pp.59-64
CS, IN, NS, NV
(Joint)
2020-09-10
14:50
Online Online [Invited Talk] Recent Research Trends in Detection and Blocking System of Botnet Communications by DNS Traffic Analysis
Katsuyoshi Iida (Hokkaido Univ.), Hikaru Ichise, Yong Jin (Tokyo Tech.) NS2020-41
Botnet, a logical network used by bot-type malware, is becoming a social issue. In this paper, we give an outline of the... [more] NS2020-41
pp.3-6
NS, IN
(Joint)
2020-03-06
10:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
[Technology Exhibit] Machine learning pipeline for analyzing Large-scale traffic
Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] NS2019-212 IN2019-103
p.191(NS), p.151(IN)
IA, SITE, IPSJ-IOT [detail] 2020-03-02
14:05
Online Online Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses
Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] SITE2019-89 IA2019-67
pp.7-12
SS, MSS 2020-01-15
10:55
Hiroshima   A Proposal of Botnet Defense System and Its Basic Strategy
Shingo Yamaguchi (Yamaguchi Univ.) MSS2019-52 SS2019-36
(To be available after the conference date) [more] MSS2019-52 SS2019-36
pp.67-72
MoNA 2018-12-25
17:20
Tokyo   A network collaboration experiment system of various kinds of robots at the exhibition hall
Satoshi Okano, Tomoyuki Nakai, Nobuto Matsuhira (SIT), Ryo Yamaguchi, Eri Shimokawara (TMU), Masahiko Narita (AIIT) MoNA2018-56
By networking a large variety of many robots, it becomes a robot network system that can respond to various needs. In th... [more] MoNA2018-56
pp.101-105
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
pp.297-304
NS, IN
(Joint)
2017-03-02
09:30
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Detection of Bot-infected PCs based on C&C Session Classification
Hinako Moroi, Masatoshi Kawarasaki (Tsukuba Univ) IN2016-99
In malware detection by traffic characterization analysis, general-purpose detection and methods specialized to specific... [more] IN2016-99
pp.13-18
RCS, RCC, ASN, NS, SR
(Joint)
2016-07-21
13:20
Aichi   [Encouragement Talk] The Effect of Network Topology on the Spread of Self-Evolving Botnets
Takanori Kudo (Setsunan Univ.), Tomotaka Kimura (Tokyo Univ. of Science), Yoshiaki Inoue (Osaka Univ.), Hirohisa Aman (Ehime Univ.), Kouji Hirata (Kansai Univ.) NS2016-63
As the previous work, we have proposed an epidemic model of new botnets
named self-evolving botnets that autonomously ... [more]
NS2016-63
pp.69-74
IA, IPSJ-IOT, SITE [detail] 2015-03-06
10:50
Fukushima   Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method
Hikaru Ichise, Yong Jin, Katsuyoshi Iida (Tokyo Inst. of Tech) SITE2014-74 IA2014-106
Direct outbound DNS queries from inside PCs to outside computers without any authority information are not considered as... [more] SITE2014-74 IA2014-106
pp.173-178
ICSS 2015-03-03
14:15
Okinawa Meio Univiersity Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] ICSS2014-66
pp.19-24
ICSS 2014-11-28
11:35
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] ICSS2014-62
pp.67-72
IA 2014-09-12
11:00
Tokyo Tokyo Tech Front Use case analysis of TXT records in DNS
Hikaru Ichise, Jin Yong, Katsuyoshi Iida (Tokyo Inst. of Tech.) IA2014-16
Recent reports indicated that the DNS TXT record based bot communications can be used in the botnet attacks. Thus, it is... [more] IA2014-16
pp.13-18
ICSS, IPSJ-SPT 2014-03-28
11:40
Okinawa Meio Univiersity DNS Traffic Analysis Platform with Hadoop Framework
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] ICSS2013-80
pp.131-135
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan