Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:30 |
Hokkaido |
Sapporo Convention Center |
DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) |
[more] |
|
ICSS |
2023-11-16 13:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Device identification and attribute values consideration with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-53 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprinting is us... [more] |
ICSS2023-53 pp.15-21 |
ICSS |
2023-11-17 13:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Simulation of DNS cache poisoning attack detection method using DNS logs Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64 |
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] |
ICSS2023-64 pp.93-100 |
ICSS |
2023-11-17 13:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Analysis of the influence of DDoS attacks on Snort and legitimate users Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65 |
(To be available after the conference date) [more] |
ICSS2023-65 pp.101-107 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of effective attribute values on risk-based authentication with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] |
ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 pp.30-36 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
NS |
2021-04-16 13:50 |
Online |
Online |
A Metamodel for Network Configuration Information Nagi Arai, Hikofumi Suzuki, Shinpei Ogata, Kozo Okano (Shinshu Univ) NS2021-14 |
In terms of communication protocols and network device configuration information used at the Layer 3 level and above, it... [more] |
NS2021-14 pp.77-82 |
KBSE, SC |
2020-11-13 15:18 |
Online |
Online + Kikai-Shinko-Kaikan Bldg. (Primary: Online, Secondary: On-site) |
[Poster Presentation]
A Study of Method to Model Network Configuration in Static Routing for Real Network Nagi Arai, Hikofumi Suzuki, Shinpei Ogata, Kozo Okano (Shinshu Univ) KBSE2020-20 SC2020-24 |
To operate the network, it is necessary to document and properly manage the configuration information of a real
network... [more] |
KBSE2020-20 SC2020-24 p.38 |
ICM |
2020-03-03 11:50 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
DDoS detection method based on appending graph centrality feature values to network flow monitoring data Yuhei Hayashi (NTT), Aoshi Fujioka, Hikofumi Suzuki (Shinshu Univ.) ICM2019-55 |
[more] |
ICM2019-55 pp.79-84 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
ISEC, SITE, LOIS |
2019-11-02 10:50 |
Osaka |
Osaka Univ. |
Detection System of DNS Cache Poisoning Using Blockchain Technology Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37 |
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more] |
ISEC2019-78 SITE2019-72 LOIS2019-37 pp.107-112 |
IA, ICSS |
2019-06-07 11:20 |
Miyagi |
Research Institute for Electrical Communication, Tohoku University |
Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
IA2019-8 ICSS2019-8 pp.37-41 |
ICM, IPSJ-CSEC, IPSJ-IOT |
2019-05-24 09:25 |
Osaka |
|
Feature Value for Low-Bandwidth L3, L4 DDoS Detection based on Number of 5-tuple Flows in 3-tuple Flow Yuhei Hayashi (NTT), Hikofumi Suzuki (Shindai), Takeaki Nishioka (NTT) ICM2019-5 |
Recently, new sophisticated attacks such as pulse-wave DDoS has been observed. The DDoS attack repeats short duration at... [more] |
ICM2019-5 pp.65-70 |
ICTSSL |
2016-06-15 14:55 |
Miyagi |
Tohoku University |
Development of The Rapid Deployment of The Sensor Network for Disaster Information Collection
-- Deployment Case of the Tonami City Toyama and Hatsukai City Hiroshima in Japan -- Hikofumi Suzuki (Shinshu Univ.), Masato Futagawa (Shizuoka Univ.), Mitsuru Komatsu (Okayama Univ.), David Asano, Yasushi Fuwa (Shinshu Univ.) ICTSSL2016-18 |
[more] |
ICTSSL2016-18 pp.103-108 |
SRW |
2016-06-13 15:25 |
Kanagawa |
NICT Wireless Network Research Institute (NICT) |
Protocol Interference Model within Proximal Transponders for Reducing Packet Loss Rate in Wireless Mesh Networks Eiki Motoyama (NJRC), Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ.) SRW2016-31 |
In the regional protection system currently operating in the city of Shiojiri, data packets from transmitters carried by... [more] |
SRW2016-31 pp.33-38 |
NS, RCS (Joint) |
2015-12-18 13:05 |
Ehime |
Matsuyama Community Center |
A transponder location advisory system for improving fault tolerance of wireless networks Yuya Kuriyama, David Asano, Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ) NS2015-143 |
Since 2008, we have been operating an ad-hoc sensor network system in Shiojiri City, Nagano, Japan. This system sends se... [more] |
NS2015-143 pp.95-100 |
NS, RCS (Joint) |
2015-12-18 13:30 |
Ehime |
Matsuyama Community Center |
A routing algorithm based on the traffic load in wireless networks Seiya Sakamoto, Asano David, Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ.) NS2015-144 |
We build and operate communication infrastructure from wireless transponders in excess of 600 , for sending data from th... [more] |
NS2015-144 pp.101-106 |
MICT, ASN, MoNA (Joint) |
2015-01-26 10:15 |
Wakayama |
Nanki Shirahama |
Realization of a Safe and Secure Society using ICT in Shiojiri-City, Nagano Prefecture
-- Towards the Creation of a Smart Citie -- Yasushi Fuwa, Hikofumi Suzuki, David K. Asano (Shinshu Univ.), Yuji Takeshita, Mitsuru Komatsu (Okayama Univ.), Masato Futagawa (Shizuoka Univ.), Eiki Motoyama (NJRC), So Seriu (ISID), Haruo Kaneko (Shiojiri-City) ASN2014-110 |
For some time, we have been working toward the “Realization of a Safe and Secure Society using ICT in Shiojiri-City, Nag... [more] |
ASN2014-110 pp.19-24 |