IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS
(Joint)
2023-03-03
10:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Defense Method with Drop-Request Protocol against DRDoS Attack
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-102
pp.217-222
IN, IA
(Joint)
2022-12-13
16:15
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Investigation of a drop request protocol for defense against DRDoS attacks
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-51
pp.40-45
SRW, SeMI, CNR
(Joint)
2020-11-26
17:20
Online Online [Poster Presentation] Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge
Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] SeMI2020-32
pp.67-72
PN 2020-03-03
09:50
Kagoshima
(Cancelled but technical report was issued)
DDoS defense method by logically isolating attackers
Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] PN2019-63
pp.65-71
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:45
Hyogo Rokkodai 2nd Campus, Kobe Univ. Analysis of UTM traffic log using LLL algorithm
Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] NS2019-124
pp.27-30
IA 2018-09-04
15:15
Hokkaido Hokkaido Univ. Conference Hall A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space
Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] IA2018-28
pp.77-81
NS, IN
(Joint)
2018-03-01
10:00
Miyazaki Phoenix Seagaia Resort A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems
Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] IN2017-92
pp.15-20
NS 2017-10-27
11:35
Osaka I-site nanba A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture
Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] NS2017-110
pp.95-100
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-10
11:40
Okinawa Kumejima Island Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts
Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] CPSY2016-150 DC2016-96
pp.327-332
IN, ICTSSL, NWS
(Joint)
2016-10-21
10:20
Osaka Osaka Uinv. A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems
Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] IN2016-58
pp.55-60
IN 2007-06-22
15:25
Hokkaido Future University-Hakodate Adaptive Timer-Based Defense Mechanisms against TCP SYN Flood Attack
Hirofumi Akaike, Masaki Aida (Tokyo Metropolitan Univ.), Masayuki Murata, Makoto Imase (Osaka Univ.) IN2007-26
Through the rapid development of the Internet in recent years, the security in networks becomes urgent
issues. Distribu... [more]
IN2007-26
pp.91-96
NS 2007-06-15
12:00
Akita   A DDoS Flooding Attack Detection Mechanism Analyses based on the Relationship between Input and Output Traffic Volumes
Zhang Fengxiang (Univ. for Advanced Studies), Shunji Abe (NII) NS2007-38
Nowadays various kinds of anomalies are prohibiting the widely used Internet from offering normal services. Within them ... [more] NS2007-38
pp.49-54
NS, IN
(Joint)
2007-03-08
10:30
Okinawa Okinawa Convention Center Network Defence Method Based on Aggregation of Users Security Policy
Katsuhiro Sebayashi, Osamu Akashi, Mitsuru Maruyama (NTT) IN2006-199
A network defense scheme for an Internet Service Provider (ISP) network is presented. In this scheme, the ISP cooperates... [more] IN2006-199
pp.113-118
NS, IN
(Joint)
2007-03-08
10:50
Okinawa Okinawa Convention Center A Load Balancing Method between Distributed DDoS-Attack Mitigation Systems by dividing anomaly traffic
Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-200
This paper proposes a large-volume DDoS-attack defense method which scrubs anomaly traffic with a DDoS-attack mitigatio... [more] IN2006-200
pp.119-124
IN 2006-12-15
14:25
Osaka   An Introduction of Pushback Mechanism into Path Identification Methods for DDoS Defence
Yoichi Kaneko, Shigetomo Kimura, Yoshihiko Ebihara (Univ. of Tsukuba) IN2006-132
Pi (Path Identification) method is proposed as a mechanism for defending DDoS (Distributed Denial of Service) attack. In... [more] IN2006-132
pp.109-114
IN, NS, CS
(Joint)
2006-09-14
13:30
Miyagi   [Invited Talk] On Tracing and Mitigating Distributed Denial of Service Attacks
Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major conc... [more] NS2006-76 IN2006-56 CS2006-22
pp.33-43(NS), pp.43-53(IN), pp.1-11(CS)
CS, CQ
(Joint)
2006-04-17
14:45
Akita Akita Univ. The Evaluation of Flow-based Traffic Control Techniques against DDoS Attacks
Kazuhiro Okura, Yasuhiro Satake (NTT) CS2006-6 CQ2006-10
Distributed Denial of Service (DDoS) attack is getting its importance as one of the studies on cyber incident defenses i... [more] CS2006-6 CQ2006-10
pp.29-34(CS), pp.47-52(CQ)
CS, IN, NS
(Joint)
2005-09-16
09:50
Miyagi Tohoku Univ. A proposal of a Traceback method between ASes against DRDoS attacks
Teruaki Takahashi (Kogakuin Univ.), Toshihumi Kai (MEW, Ltd.), Katsuyuki Shinohara (Kogakuin Univ.)
In recent years, the damage by illegal access is seen as a problem with the development of the information infrastructur... [more] IN2005-71
pp.61-66
IN 2004-12-16
13:50
Hiroshima Hiroshima City Univ. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks
Yuichi Ohsita (Osaka Univ.), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.)
Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, s... [more] IN2004-125
pp.13-18
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan