Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2022-55 |
(To be available after the conference date) [more] |
ICSS2022-55 pp.43-48 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26 |
(To be available after the conference date) [more] |
ICSS2020-26 pp.1-6 |
ICSS |
2018-11-22 14:20 |
Kagoshima |
|
Part II: Calculating Similarity between IoT Malware over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66 |
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more] |
ICSS2018-66 pp.73-78 |
ICSS, IA |
2018-06-25 13:25 |
Ehime |
Ehime University |
Calculating Similarity between IoT Malware Samples over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2 |
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more] |
IA2018-2 ICSS2018-2 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
ICSS |
2012-11-22 13:15 |
Hiroshima |
Miyajima Mori-no-Yado |
Packer Identification Based on Binary Code of Malware Using Machine Learning Ryoichi Isawa, Tao Ban, Daisuke Inoue (NICT) ICSS2012-48 |
PEiD is a well-known packer identication tool. However, it often fails to identify a packer name of the target le beca... [more] |
ICSS2012-48 pp.19-24 |
NC |
2011-07-26 14:40 |
Hyogo |
Graduate School of Engineering, Kobe University |
P2P Network Traffic Analysis Using Data Mining Engines Tao Ban (NICT), Shanqing Guo (Shandong Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) NC2011-41 |
Characterization of P2P trac is an essential step before
developing workload models towards network capacity planning ... [more] |
NC2011-41 pp.115-118 |