Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78 |
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] |
ICSS2023-78 pp.63-70 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:00 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89 |
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more] |
SITE2023-83 IA2023-89 pp.92-97 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:25 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
A Dynamic IP Address Translation for Hiding Source and Destination Information Kazuya Okada, Hiroshi Abe (TMC) SITE2023-84 IA2023-90 |
(To be available after the conference date) [more] |
SITE2023-84 IA2023-90 pp.98-103 |
NS, IN (Joint) |
2024-03-01 14:50 |
Okinawa |
Okinawa Convention Center |
Impact of DNS-Based Authentication of Named Entities Deployment on Web Performance Kota Yagi (Osaka Prefecture Univ.), Katsuki Isobe, Daishi Kondo, Hideki Tode (Osaka Metropolitan Univ.) NS2023-231 |
DNS-Based Authentication of Named Entities (DANE) is a mechanism for validating server certificates without rely- ing on... [more] |
NS2023-231 pp.348-354 |
ICSS |
2023-11-17 13:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Simulation of DNS cache poisoning attack detection method using DNS logs Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64 |
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] |
ICSS2023-64 pp.93-100 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |
IN, NS (Joint) |
2023-03-03 09:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99 |
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more] |
IN2022-99 pp.199-204 |
IN, NS (Joint) |
2023-03-03 10:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A Defense Method with Drop-Request Protocol against DRDoS Attack Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-102 pp.217-222 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Hiding Source and Destination Information on Connected Vehicle Communication Kazuya Okada, Hiroshi Abe (TMC) NS2022-217 |
[more] |
NS2022-217 pp.286-291 |
IN, NS (Joint) |
2023-03-03 11:40 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Development of a scanner for hidden open resolvers and the investigation
-- Vulnerability that are not decreasing -- Tsunehiko Suzuki (Chukyo Univ.) NS2022-229 |
I have developed a scanner for hidden open resolvers and have tracked about 100,000 resolvers since spring 2011. 30% of ... [more] |
NS2022-229 pp.357-361 |
IN, NS (Joint) |
2023-03-03 13:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
DNS Query Log Aggregation Method Based on Co-occuerence Masaki Kobayashi, Akito Suzuki, Masahiro Kobayashi (NTT), Tatsuaki Kimura (Osaka Univ.) IN2022-118 |
The complexity of traffic demand fluctuation factors caused by the diversification of user terminals and services has ma... [more] |
IN2022-118 pp.311-316 |
IN, IA (Joint) |
2022-12-13 16:15 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Investigation of a drop request protocol for defense against DRDoS attacks Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-51 pp.40-45 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
IA, CQ, MIKA (Joint) |
2022-09-15 17:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
A consideration of DoH-exclusive DNS architecture Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23 |
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] |
IA2022-23 pp.50-53 |
IA, ICSS |
2022-06-24 11:25 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13 |
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more] |
IA2022-13 ICSS2022-13 pp.71-75 |