Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2023-03-03 10:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A Defense Method with Drop-Request Protocol against DRDoS Attack Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-102 pp.217-222 |
IN, IA (Joint) |
2022-12-13 16:15 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Investigation of a drop request protocol for defense against DRDoS attacks Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-51 pp.40-45 |
SRW, SeMI, CNR (Joint) |
2020-11-26 17:20 |
Online |
Online |
[Poster Presentation]
Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32 |
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] |
SeMI2020-32 pp.67-72 |
PN |
2020-03-03 09:50 |
Kagoshima |
(Cancelled but technical report was issued) |
DDoS defense method by logically isolating attackers Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63 |
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] |
PN2019-63 pp.65-71 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
IA |
2018-09-04 15:15 |
Hokkaido |
Hokkaido Univ. Conference Hall |
A Fine-grained Access Control List towards DDoS Filtering of All IPv4 address space Yohei Kuga, Takeshi Matsuya (Keio Univ.), Ryo Nakamura (Univ. of Tokyo) IA2018-28 |
In this paper, we discussed a hardware-based DDoS mitigation architecture capable of filtering ACL rules of all IPv4 add... [more] |
IA2018-28 pp.77-81 |
NS, IN (Joint) |
2018-03-01 10:00 |
Miyazaki |
Phoenix Seagaia Resort |
A Study of Large-Scale DDoS Mitigation Mechanism Considering Communication Delay for Global-Scale Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) IN2017-92 |
Now, some Tier 1 ISPs provide distributed denial-of-service (DDoS) mitigation services in which they distribute scrubbin... [more] |
IN2017-92 pp.15-20 |
NS |
2017-10-27 11:35 |
Osaka |
I-site nanba |
A Study of Cooperative DDoS Mitigation Mechanism Considering Intra- and Inter-AS Network Architecture Hiroaki Maeda, Hisashi Kojima, Yoshiko Sueda (NTT) NS2017-110 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
NS2017-110 pp.95-100 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 11:40 |
Okinawa |
Kumejima Island |
Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96 |
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] |
CPSY2016-150 DC2016-96 pp.327-332 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 10:20 |
Osaka |
Osaka Uinv. |
A Study of Large-Scale DDoS Mitigation Mechanism in Coordination with Plural Autonomous Systems Hiroaki Maeda, Hisashi Kojima, Masao Aihara (NTT) IN2016-58 |
As distributed denial-of-service (DDoS) attacks become more severe and sophisticated, it has become more difficult for a... [more] |
IN2016-58 pp.55-60 |
IN |
2007-06-22 15:25 |
Hokkaido |
Future University-Hakodate |
Adaptive Timer-Based Defense Mechanisms against TCP SYN Flood Attack Hirofumi Akaike, Masaki Aida (Tokyo Metropolitan Univ.), Masayuki Murata, Makoto Imase (Osaka Univ.) IN2007-26 |
Through the rapid development of the Internet in recent years, the security in networks becomes urgent
issues. Distribu... [more] |
IN2007-26 pp.91-96 |
NS |
2007-06-15 12:00 |
Akita |
|
A DDoS Flooding Attack Detection Mechanism Analyses based on the Relationship between Input and Output Traffic Volumes Zhang Fengxiang (Univ. for Advanced Studies), Shunji Abe (NII) NS2007-38 |
Nowadays various kinds of anomalies are prohibiting the widely used Internet from offering normal services. Within them ... [more] |
NS2007-38 pp.49-54 |
NS, IN (Joint) |
2007-03-08 10:30 |
Okinawa |
Okinawa Convention Center |
Network Defence Method Based on Aggregation of Users Security Policy Katsuhiro Sebayashi, Osamu Akashi, Mitsuru Maruyama (NTT) IN2006-199 |
A network defense scheme for an Internet Service Provider (ISP) network is presented. In this scheme, the ISP cooperates... [more] |
IN2006-199 pp.113-118 |
NS, IN (Joint) |
2007-03-08 10:50 |
Okinawa |
Okinawa Convention Center |
A Load Balancing Method between Distributed DDoS-Attack Mitigation Systems by dividing anomaly traffic Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-200 |
This paper proposes a large-volume DDoS-attack defense method which scrubs anomaly traffic with a DDoS-attack mitigatio... [more] |
IN2006-200 pp.119-124 |
IN |
2006-12-15 14:25 |
Osaka |
|
An Introduction of Pushback Mechanism into Path Identification Methods for DDoS Defence Yoichi Kaneko, Shigetomo Kimura, Yoshihiko Ebihara (Univ. of Tsukuba) IN2006-132 |
Pi (Path Identification) method is proposed as a mechanism for defending DDoS (Distributed Denial of Service) attack. In... [more] |
IN2006-132 pp.109-114 |
IN, NS, CS (Joint) |
2006-09-14 13:30 |
Miyagi |
|
[Invited Talk]
On Tracing and Mitigating Distributed Denial of Service Attacks Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22 |
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major conc... [more] |
NS2006-76 IN2006-56 CS2006-22 pp.33-43(NS), pp.43-53(IN), pp.1-11(CS) |
CS, CQ (Joint) |
2006-04-17 14:45 |
Akita |
Akita Univ. |
The Evaluation of Flow-based Traffic Control Techniques against DDoS Attacks Kazuhiro Okura, Yasuhiro Satake (NTT) CS2006-6 CQ2006-10 |
Distributed Denial of Service (DDoS) attack is getting its importance as one of the studies on cyber incident defenses i... [more] |
CS2006-6 CQ2006-10 pp.29-34(CS), pp.47-52(CQ) |
CS, IN, NS (Joint) |
2005-09-16 09:50 |
Miyagi |
Tohoku Univ. |
A proposal of a Traceback method between ASes against DRDoS attacks Teruaki Takahashi (Kogakuin Univ.), Toshihumi Kai (MEW, Ltd.), Katsuyuki Shinohara (Kogakuin Univ.) |
In recent years, the damage by illegal access is seen as a problem with the development of the information infrastructur... [more] |
IN2005-71 pp.61-66 |
IN |
2004-12-16 13:50 |
Hiroshima |
Hiroshima City Univ. |
Deployable Overlay Network for Defense against Distributed SYN Flood Attacks Yuichi Ohsita (Osaka Univ.), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.) |
Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, s... [more] |
IN2004-125 pp.13-18 |