Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221 |
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] |
NS2023-221 pp.288-293 |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
DDoS Attack Evaluation Against Tele-Operated Driving System in 5G MEC Scenarios Masato Osumi, Daishi Kondo, Hideki Tode (OMU) NS2023-228 |
MEC technology, which combines 5G communication with edge computing that places computing resources in edge network, has... [more] |
NS2023-228 pp.329-335 |
IN, IA (Joint) |
2023-12-22 15:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55 |
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more] |
IA2023-55 pp.59-66 |
ICSS |
2023-11-17 13:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Analysis of the influence of DDoS attacks on Snort and legitimate users Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65 |
(To be available after the conference date) [more] |
ICSS2023-65 pp.101-107 |
IA |
2023-09-22 09:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Implementation of DDoS Detection and Automatic Mitigation System Using eBPF and XDP Atsuya Osaki, Seiki Makino (Keio), Ryusei Shiiba (Sokendai), Kensuke Fukuda (NII/Sokendai), Tadashi Okoshi, Jin Nakazawa (Keio) IA2023-21 |
(To be available after the conference date) [more] |
IA2023-21 pp.60-66 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of Snort's impact due to DDoS attacks Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 |
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] |
ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 pp.127-132 |
IN, NS (Joint) |
2023-03-03 10:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A Defense Method with Drop-Request Protocol against DRDoS Attack Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-102 pp.217-222 |
PN |
2023-03-02 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Distributed DDoS Protection Method in the Core Network with Reconfigurable Device Edge Coordination Tomoki Naoi, Masaki Murakami, Yoshihiko Uematsu, Satoru Okamoto, Naoaki Yamanaka (Keidai) PN2022-58 |
Distributed Denial-of-Service (DDoS) attacks are a growing problem today, and it is difficult for individual users to mi... [more] |
PN2022-58 pp.83-89 |
IN, IA (Joint) |
2022-12-13 16:15 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Investigation of a drop request protocol for defense against DRDoS attacks Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-51 pp.40-45 |
CCS, NLP |
2022-06-09 13:00 |
Osaka |
(Primary: On-site, Secondary: Online) |
Conditional entropy based DDoS Attack detection in Software Defined Network Tian QiWen, miyata sumiko (SIT) NLP2022-1 CCS2022-1 |
In order to detect each network attack in an SDN environment, an attack detection method has been proposed based on the ... [more] |
NLP2022-1 CCS2022-1 pp.1-6 |
NS |
2022-05-13 10:15 |
Kyoto |
Rakuyu Kaikan, Kyoto Univ. + Online (Primary: On-site, Secondary: Online) |
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16 |
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] |
NS2022-16 pp.40-46 |
NS, NWS (Joint) |
2021-01-22 13:30 |
Online |
Online |
[Encouragement Talk]
A Study on Detection and Prevention of Stealthy DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116 |
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] |
NS2020-116 pp.31-36 |
CQ, CBE (Joint) |
2021-01-22 10:10 |
Online |
Online |
Improvement Using White List and QoS Control for SYN Cookie Method Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93 |
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] |
CQ2020-93 pp.116-121 |
SRW, SeMI, CNR (Joint) |
2020-11-26 17:20 |
Online |
Online |
[Poster Presentation]
Queue Allocation Methods on Light-Weight DDoS Mitigation at Network Edge Ryo Yaegashi (Tokyo Univ. of Agriculture and Tech.), Daisuke Hisano (Osaka Univ.), Yu Nakayama (Tokyo Univ. of Agriculture and Tech.) SeMI2020-32 |
The recent evolution of communication technologies including 5G has lead to the rapid development of Internet of Thing (... [more] |
SeMI2020-32 pp.67-72 |
PN |
2020-03-03 09:50 |
Kagoshima |
(Cancelled but technical report was issued) |
DDoS defense method by logically isolating attackers Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63 |
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] |
PN2019-63 pp.65-71 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
PN |
2019-11-14 17:20 |
Kanagawa |
|
Network-based DDoS prevention with newly developed Reconfigurable Communication Processors Naoto Sumita, Masaki Murakami, Yu Nishio, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-26 |
In order to cope with traffic growth and service diversity the Photonic Network Processor (PNP) has been proposed. As a ... [more] |
PN2019-26 pp.15-22 |
NS, IN, CS, NV (Joint) |
2019-09-05 11:15 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
[Invited Lecture]
Traffic Control Techniques in Layer-2 Network for Multi-service Accommodation toward 5G/IoT era Naotaka Shibata, Kazuaki Honda, Shin Kaneko, Jun Terada (NTT) CS2019-48 |
A layer-2-based time-sensitive converged network that can accommodate mobile fronthaul (MFH) and internet-of-things (IoT... [more] |
CS2019-48 pp.5-10 |
IA, ICSS |
2019-06-07 11:20 |
Miyagi |
Research Institute for Electrical Communication, Tohoku University |
Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
IA2019-8 ICSS2019-8 pp.37-41 |