IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:00
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more]
SITE2023-83 IA2023-89
pp.92-97
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
IN, NS
(Joint)
2023-03-03
09:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more]
IN2022-99
pp.199-204
IN, NS
(Joint)
2023-03-03
13:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
DNS Query Log Aggregation Method Based on Co-occuerence
Masaki Kobayashi, Akito Suzuki, Masahiro Kobayashi (NTT), Tatsuaki Kimura (Osaka Univ.) IN2022-118
The complexity of traffic demand fluctuation factors caused by the diversification of user terminals and services has ma... [more] IN2022-118
pp.311-316
RISING
(3rd)
2022-10-31
14:00
Kyoto Kyoto Terrsa (Day 1), and Online (Day 2, 3) [Poster Presentation] Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech)
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more]

IA, ICSS 2022-06-24
11:50
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] IA2022-14 ICSS2022-14
pp.76-80
IA 2021-09-08
15:15
Online Online Detection and blocking system for suspicious DNS outbound query using RPZ
Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] IA2021-24
pp.59-64
RCS, SR, NS, SeMI, RCC
(Joint)
2021-07-15
10:30
Online Online Extraction of User Communication Behavior from DNS Query Logs by Non-Negative Tensor Factorization Approach
Kotaro Hatanaka, Tatsuaki Kimura, Tetsuya Takine (Osaka Univ.) NS2021-43
Understanding user communication behavior by analyzing network logs has been playing an important role in security monit... [more] NS2021-43
pp.57-62
KBSE 2021-01-23
15:00
Online Online Consideration of evaluation datasets for DNS tunnel detection research
Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more]
KBSE2020-32
pp.19-24
ISEC, IT, WBS 2020-03-10
13:25
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Research on DNS tunnel detection by machine learning using appearance characters -- Consideration of implementation of evaluation program --
Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more]
IT2019-103 ISEC2019-99 WBS2019-52
pp.87-94
ISEC, SITE, LOIS 2019-11-02
15:25
Osaka Osaka Univ. Research on DNS tunnel detection by machine learning using appearance characters
Tetsuya Asakura, Takeo Tatsumi (OUJ) ISEC2019-84 SITE2019-78 LOIS2019-43
In this study, as a detection technique of DNS tunnel, it was tried to detect abnormal DNS query string by machine learn... [more] ISEC2019-84 SITE2019-78 LOIS2019-43
pp.141-148
IN, NS
(Joint)
2019-03-05
11:50
Okinawa Okinawa Convention Center Proposal of malicious device detection method by DNS query/response log analysis using machine learning
Issei Nakasone, Kitaguchi Yoshiaki, Yamaoka Katsunori (Tokyo Tech) IN2018-129
One common way for detecting malware devices in a network is to use a blacklist based on signature detection.However, in... [more] IN2018-129
pp.271-276
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
11:20
Hiroshima Satellite Campus Hiroshima An FPGA-NIC Based 40-Gbit/s Automated Response Circuit for Invalid DNS Packets to Suppress CPU Utilization of DNS Content Server
Shoko Ohteru, Saki Hatta, Tomoaki Kawamura (NTT), Koji Yamazaki (NTT-AT), Takahiro Hatano, Akihiko Miyazaki, Koyo Nitta (NTT) VLD2018-55 DC2018-41
(To be available after the conference date) [more] VLD2018-55 DC2018-41
pp.113-118
NS, IN
(Joint)
2018-03-01
09:00
Miyazaki Phoenix Seagaia Resort Classifying OSes on User Devices Using the Similarity of DNS Query Sets
Yuka Komai, Masahiro Kobayashi, Shigeaki Harada, Keisuke Ishibashi, Ryoichi Kawahara (NTT), Tatsuya Mori, Shigeki Goto (Waseda Univ.) IN2017-89
Due to the emergence of various user devices, it becomes important to manage traffic based on OSes (Operating Systems) o... [more] IN2017-89
pp.1-4
IA 2017-11-15
14:15
Overseas KMITL, Bangkok, Thailand Design and implementation of NS record history database for detecting DNS-based botnet communication
Hikaru Ichise (Tokyo Tech./Hokkaido Univ.), Yong Jin (Tokyo Tech.), Katsuyoshi Iida (Tokyo Tech./Hokkaido Univ.) IA2017-31
DNS (Domain Name System) based domain name resolution service is one of the most fundamental
Internet services for the... [more]
IA2017-31
pp.7-11
ICSS, IA 2016-06-06
13:30
Saga Saga University Analysis of recursive queries from the Internet to the authoritative name servers in Oita University
Masashi Nakamura, Minoru Ikebe, Kazuyuki Yoshida (Oita Univ.) IA2016-2 ICSS2016-2
The authoritative name server will receive name resolution queries from the Internet. In this paper, we analyzed queries... [more] IA2016-2 ICSS2016-2
pp.7-12
IN, RCS
(Joint)
2016-05-20
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks
Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2016-16
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] IN2016-16
pp.85-88
IA, SITE, IPSJ-IOT [detail] 2016-03-03
13:00
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services
Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] SITE2015-58 IA2015-90
pp.55-60
IA, IPSJ-IOT, SITE [detail] 2015-03-06
10:50
Fukushima   Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method
Hikaru Ichise, Yong Jin, Katsuyoshi Iida (Tokyo Inst. of Tech) SITE2014-74 IA2014-106
Direct outbound DNS queries from inside PCs to outside computers without any authority information are not considered as... [more] SITE2014-74 IA2014-106
pp.173-178
ICSS, IPSJ-SPT 2014-03-28
11:40
Okinawa Meio Univiersity DNS Traffic Analysis Platform with Hadoop Framework
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] ICSS2013-80
pp.131-135
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan