IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 116  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
16:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices
Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] ICSS2023-78
pp.63-70
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:00
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more]
SITE2023-83 IA2023-89
pp.92-97
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:25
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
A Dynamic IP Address Translation for Hiding Source and Destination Information
Kazuya Okada, Hiroshi Abe (TMC) SITE2023-84 IA2023-90
(To be available after the conference date) [more] SITE2023-84 IA2023-90
pp.98-103
NS, IN
(Joint)
2024-03-01
14:50
Okinawa Okinawa Convention Center Impact of DNS-Based Authentication of Named Entities Deployment on Web Performance
Kota Yagi (Osaka Prefecture Univ.), Katsuki Isobe, Daishi Kondo, Hideki Tode (Osaka Metropolitan Univ.) NS2023-231
DNS-Based Authentication of Named Entities (DANE) is a mechanism for validating server certificates without rely- ing on... [more] NS2023-231
pp.348-354
ICSS 2023-11-17
13:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Simulation of DNS cache poisoning attack detection method using DNS logs
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] ICSS2023-64
pp.93-100
IA 2023-09-21
13:50
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
A consideration about a discovering method of privacy-enhanced authoritative DNS servers
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] IA2023-11
pp.1-5
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
IA, ICSS 2023-06-21
10:55
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT
Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] IA2023-10 ICSS2023-10
pp.56-61
IN, NS
(Joint)
2023-03-03
09:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more]
IN2022-99
pp.199-204
IN, NS
(Joint)
2023-03-03
10:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Defense Method with Drop-Request Protocol against DRDoS Attack
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-102
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-102
pp.217-222
IN, NS
(Joint)
2023-03-03
10:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Hiding Source and Destination Information on Connected Vehicle Communication
Kazuya Okada, Hiroshi Abe (TMC) NS2022-217
 [more] NS2022-217
pp.286-291
IN, NS
(Joint)
2023-03-03
11:40
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Development of a scanner for hidden open resolvers and the investigation -- Vulnerability that are not decreasing --
Tsunehiko Suzuki (Chukyo Univ.) NS2022-229
I have developed a scanner for hidden open resolvers and have tracked about 100,000 resolvers since spring 2011. 30% of ... [more] NS2022-229
pp.357-361
IN, NS
(Joint)
2023-03-03
13:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
DNS Query Log Aggregation Method Based on Co-occuerence
Masaki Kobayashi, Akito Suzuki, Masahiro Kobayashi (NTT), Tatsuaki Kimura (Osaka Univ.) IN2022-118
The complexity of traffic demand fluctuation factors caused by the diversification of user terminals and services has ma... [more] IN2022-118
pp.311-316
IN, IA
(Joint)
2022-12-13
16:15
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Investigation of a drop request protocol for defense against DRDoS attacks
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-51
pp.40-45
NS, ICM, CQ, NV
(Joint)
2022-11-24
18:05
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] NS2022-116
pp.91-96
RISING
(3rd)
2022-10-31
14:00
Kyoto Kyoto Terrsa (Day 1), and Online (Day 2, 3) [Poster Presentation] Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech)
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more]

IA, CQ, MIKA
(Joint)
2022-09-15
17:50
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
A consideration of DoH-exclusive DNS architecture
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] IA2022-23
pp.50-53
IA, ICSS 2022-06-24
11:25
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
An Experimental Study on Name Resolution History Basis Abnormal Detection and Blocking Using SDN and DNS RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2022-13 ICSS2022-13
Most of the network applications communicate to the servers with the destination IP addresses obtained by prior the
na... [more]
IA2022-13 ICSS2022-13
pp.71-75
 Results 1 - 20 of 116  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan