Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2025-03-07 13:25 |
Okinawa |
Okinawa Industry Support Center (Okinawa) |
Preliminary evaluation of a congestion control method using reinforcement learning for adopting environment changes Kazuma Aoki, Rikima Mitsuhashi, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) |
(To be available after the conference date) [more] |
|
ICM, LOIS |
2025-01-16 11:00 |
Kumamoto |
Kumamoto City International Center (Kumamoto, Online) (Primary: On-site, Secondary: Online) |
A Consideration for Deployment of abnormality detection System by DNS traffic analysis using RPZ Hikaru Ichise (Oita Univ), Yong Jin (Science Tokyo), Katsuyoshi Iida (Hokkaido Univ) ICM2024-19 LOIS2024-52 |
In this paper, we focus on shortening the processing time of registration in the RPZ. We implement the method to analyze... [more] |
ICM2024-19 LOIS2024-52 pp.4-8 |
ICM, LOIS |
2025-01-17 11:00 |
Kumamoto |
Kumamoto City International Center (Kumamoto, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Introduction of Several Resource Records focused in the Researches Utilizing DNS Yong Jin (Science Tokyo), Hikaru Ichise (Oita Univ.), Satoru Sunahara (CIST), Katsuyoshi Iida (Hokkaido Univ.), Nariyoshi Yamai (TUAT) ICM2024-32 LOIS2024-65 |
Domain Name System (DNS) plays an important role in the Internet in terms of domain name resolution.
Almost of all Inte... [more] |
ICM2024-32 LOIS2024-65 pp.80-83 |
IN, IA (Joint) |
2023-12-21 12:45 |
Hiroshima |
Satellite Campus Hiroshima (Hiroshima) |
A proposal on performance improvement method of machine learning-based congestion control using L4S ultra-low latency services Kazuma Aoki, Rikima Mitsuhashi, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-44 |
In recent years, a wide variety of IoT devices have been deployed, but their low computing power makes it difficult to i... [more] |
IA2023-44 pp.5-11 |
RISING (3rd) |
2023-10-31 13:00 |
Hokkaido |
Kaderu 2・7 (Sapporo) (Hokkaido) |
[Poster Presentation]
A consideration of performance improvement of machine learning-based congestion control using L4S ultra-low latency services Kazuma Aoki, Rikima Mitsuhashi, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) |
[more] |
|
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Saga, Online) (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |
IA, CQ, MIKA (Joint) |
2022-09-15 15:35 |
Hokkaido |
Hokkaido Citizens Actives Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Literature survey about Knowledge Defined Networking Katsuyoshi Iida (Hokkaido Univ.) IA2022-18 |
There currently are many R&D efforts about AI/ML technologies within the computer networking field. In this paper, we in... [more] |
IA2022-18 pp.21-25 |
IA, CQ, MIKA (Joint) |
2022-09-15 17:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A consideration of DoH-exclusive DNS architecture Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23 |
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] |
IA2022-23 pp.50-53 |
IA, ICSS |
2022-06-24 11:25 |
Nagasaki |
Univ. of Nagasaki (Nagasaki, Online) (Primary: On-site, Secondary: Online) |
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13 |
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more] |
IA2022-13 ICSS2022-13 pp.71-75 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:20 |
Kyoto |
Kyoto University, Yoshida Campus (Kyoto, Online) (Primary: On-site, Secondary: Online) |
A proposal of detection system for malicious DoH communication generated by DGA-based malware Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72 |
(To be available after the conference date) [more] |
SITE2021-59 IA2021-72 pp.79-82 |
IN, IA (Joint) |
2021-12-17 14:55 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48 |
(To be available after the conference date) [more] |
IA2021-48 pp.85-92 |
IA |
2021-09-08 15:15 |
Online |
Online (Online) |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |
IA |
2020-11-09 14:57 |
Hokkaido |
(Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Development and evaluation of efficient vulnerability scanning system for IoT networks Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19 |
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] |
IA2020-19 pp.7-12 |
IA |
2020-11-09 15:19 |
Hokkaido |
(Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A case study on virtual exercise in undergraduate course using network exercise environment fully implemented within browser Katsuyoshi Iida, Hiroyuki Minami (Hokkaido Univ.) IA2020-20 |
(To be available after the conference date) [more] |
IA2020-20 pp.13-20 |
IA |
2020-10-01 11:40 |
Online |
Online (Online) |
Ethical Education on Information Security Mind for Practical Security Learning Yoshinari Kanaya (Tohoku Univ.), Daisuke Kotani (Kyoto Univ.), Katsuyoshi Iida (Hokkaido Univ.), Hideaki Sone (Tohoku Univ.) IA2020-2 |
Practical education on information security may cause trouble if any student in the course tries the new education again... [more] |
IA2020-2 pp.6-9 |
ET |
2020-09-10 10:50 |
Ishikawa |
Japan Advanced Institute of Science and Technology (Ishikawa) |
Realtime sharing of multiple study notes on a learning website
-- Implementation of a learning website: SHIKAKUNO IROHA -- Takanori Sano, Yoshiaki Takai, Katsuyoshi Iida (hokudai) ET2020-13 |
In this paper , to encourage and facilitate individual web learning activity by well sharing his/her own learning experi... [more] |
ET2020-13 pp.19-22 |
CS, IN, NS, NV (Joint) |
2020-09-10 14:50 |
Online |
Online (Online) |
[Invited Talk]
Recent Research Trends in Detection and Blocking System of Botnet Communications by DNS Traffic Analysis Katsuyoshi Iida (Hokkaido Univ.), Hikaru Ichise, Yong Jin (Tokyo Tech.) NS2020-41 |
Botnet, a logical network used by bot-type malware, is becoming a social issue. In this paper, we give an outline of the... [more] |
NS2020-41 pp.3-6 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-02 14:05 |
Online |
Online (Online) |
Implementation and Evaluation of Detection and Blocking System against DGA-based Bot by Focusing on NXDOMAIN Responses Yuki Iuchi (Hokkaido Univ.), Yong Jin, Hikaru Ichise (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2019-89 IA2019-67 |
Recently, security attacks caused by a bot have been widely spreading. In this research, we aim to detect and block Doma... [more] |
SITE2019-89 IA2019-67 pp.7-12 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-08 10:45 |
Tokushima |
Grand XIV Naruto (Tokushima) |
Development and evaluation of human friendly sandbox environment using virtual desktop to provide security and usability Kazuyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2018-81 IA2018-73 |
Sandboxed environment is widely used in computers to protect secret information from Marware. On the other hand, users m... [more] |
SITE2018-81 IA2018-73 pp.253-258 |