Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-17 13:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Simulation of DNS cache poisoning attack detection method using DNS logs Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64 |
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] |
ICSS2023-64 pp.93-100 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |
IN, NS (Joint) |
2023-03-03 09:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99 |
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more] |
IN2022-99 pp.199-204 |
IN, NS (Joint) |
2023-03-03 10:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A Defense Method with Drop-Request Protocol against DRDoS Attack Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-102 pp.217-222 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Hiding Source and Destination Information on Connected Vehicle Communication Kazuya Okada, Hiroshi Abe (TMC) NS2022-217 |
[more] |
NS2022-217 pp.286-291 |
IN, NS (Joint) |
2023-03-03 11:40 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Development of a scanner for hidden open resolvers and the investigation
-- Vulnerability that are not decreasing -- Tsunehiko Suzuki (Chukyo Univ.) NS2022-229 |
I have developed a scanner for hidden open resolvers and have tracked about 100,000 resolvers since spring 2011. 30% of ... [more] |
NS2022-229 pp.357-361 |
IN, NS (Joint) |
2023-03-03 13:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
DNS Query Log Aggregation Method Based on Co-occuerence Masaki Kobayashi, Akito Suzuki, Masahiro Kobayashi (NTT), Tatsuaki Kimura (Osaka Univ.) IN2022-118 |
The complexity of traffic demand fluctuation factors caused by the diversification of user terminals and services has ma... [more] |
IN2022-118 pp.311-316 |
IN, IA (Joint) |
2022-12-13 16:15 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Investigation of a drop request protocol for defense against DRDoS attacks Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-51 pp.40-45 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
IA, CQ, MIKA (Joint) |
2022-09-15 17:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
A consideration of DoH-exclusive DNS architecture Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23 |
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] |
IA2022-23 pp.50-53 |
IA, ICSS |
2022-06-24 11:25 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13 |
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more] |
IA2022-13 ICSS2022-13 pp.71-75 |
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:20 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A proposal of detection system for malicious DoH communication generated by DGA-based malware Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) SITE2021-59 IA2021-72 |
(To be available after the conference date) [more] |
SITE2021-59 IA2021-72 pp.79-82 |
IN, IA (Joint) |
2021-12-17 14:55 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Recognition of Malicious DNS Tunnel Tools by DoH Traffic Analysis Using Multi-stage Machine Learning Technology Rikima Mitsuhashi (The Univ. of Tokyo), Yong Jin (Titech), Katsuyoshi Iida (Hokkaido Univ.), Takahiro Shinagawa (The Univ. of Tokyo), Yoshiaki Takai (Hokkaido Univ.) IA2021-48 |
(To be available after the conference date) [more] |
IA2021-48 pp.85-92 |
IA |
2021-09-08 15:15 |
Online |
Online |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |