Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:00 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89 |
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more] |
SITE2023-83 IA2023-89 pp.92-97 |
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
IN, NS (Joint) |
2023-03-03 09:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99 |
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more] |
IN2022-99 pp.199-204 |
IN, NS (Joint) |
2023-03-03 13:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
DNS Query Log Aggregation Method Based on Co-occuerence Masaki Kobayashi, Akito Suzuki, Masahiro Kobayashi (NTT), Tatsuaki Kimura (Osaka Univ.) IN2022-118 |
The complexity of traffic demand fluctuation factors caused by the diversification of user terminals and services has ma... [more] |
IN2022-118 pp.311-316 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
IA |
2021-09-08 15:15 |
Online |
Online |
Detection and blocking system for suspicious DNS outbound query using RPZ Hikaru Ichise, Yong Jin (Tokyo Tech), Katsuyoshi Iida (Hokkaido Univ) IA2021-24 |
Bot programs that send DNS query without using the DNS full resolvers in an organization network (direct outbound DNS qu... [more] |
IA2021-24 pp.59-64 |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-15 10:30 |
Online |
Online |
Extraction of User Communication Behavior from DNS Query Logs by Non-Negative Tensor Factorization Approach Kotaro Hatanaka, Tatsuaki Kimura, Tetsuya Takine (Osaka Univ.) NS2021-43 |
Understanding user communication behavior by analyzing network logs has been playing an important role in security monit... [more] |
NS2021-43 pp.57-62 |
KBSE |
2021-01-23 15:00 |
Online |
Online |
Consideration of evaluation datasets for DNS tunnel detection research Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32 |
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more] |
KBSE2020-32 pp.19-24 |
ISEC, IT, WBS |
2020-03-10 13:25 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Research on DNS tunnel detection by machine learning using appearance characters
-- Consideration of implementation of evaluation program -- Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52 |
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more] |
IT2019-103 ISEC2019-99 WBS2019-52 pp.87-94 |
ISEC, SITE, LOIS |
2019-11-02 15:25 |
Osaka |
Osaka Univ. |
Research on DNS tunnel detection by machine learning using appearance characters Tetsuya Asakura, Takeo Tatsumi (OUJ) ISEC2019-84 SITE2019-78 LOIS2019-43 |
In this study, as a detection technique of DNS tunnel, it was tried to detect abnormal DNS query string by machine learn... [more] |
ISEC2019-84 SITE2019-78 LOIS2019-43 pp.141-148 |
IN, NS (Joint) |
2019-03-05 11:50 |
Okinawa |
Okinawa Convention Center |
Proposal of malicious device detection method by DNS query/response log analysis using machine learning Issei Nakasone, Kitaguchi Yoshiaki, Yamaoka Katsunori (Tokyo Tech) IN2018-129 |
One common way for detecting malware devices in a network is to use a blacklist based on signature detection.However, in... [more] |
IN2018-129 pp.271-276 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2018-12-06 11:20 |
Hiroshima |
Satellite Campus Hiroshima |
An FPGA-NIC Based 40-Gbit/s Automated Response Circuit for Invalid DNS Packets to Suppress CPU Utilization of DNS Content Server Shoko Ohteru, Saki Hatta, Tomoaki Kawamura (NTT), Koji Yamazaki (NTT-AT), Takahiro Hatano, Akihiko Miyazaki, Koyo Nitta (NTT) VLD2018-55 DC2018-41 |
(To be available after the conference date) [more] |
VLD2018-55 DC2018-41 pp.113-118 |
NS, IN (Joint) |
2018-03-01 09:00 |
Miyazaki |
Phoenix Seagaia Resort |
Classifying OSes on User Devices Using the Similarity of DNS Query Sets Yuka Komai, Masahiro Kobayashi, Shigeaki Harada, Keisuke Ishibashi, Ryoichi Kawahara (NTT), Tatsuya Mori, Shigeki Goto (Waseda Univ.) IN2017-89 |
Due to the emergence of various user devices, it becomes important to manage traffic based on OSes (Operating Systems) o... [more] |
IN2017-89 pp.1-4 |
IA |
2017-11-15 14:15 |
Overseas |
KMITL, Bangkok, Thailand |
Design and implementation of NS record history database for detecting DNS-based botnet communication Hikaru Ichise (Tokyo Tech./Hokkaido Univ.), Yong Jin (Tokyo Tech.), Katsuyoshi Iida (Tokyo Tech./Hokkaido Univ.) IA2017-31 |
DNS (Domain Name System) based domain name resolution service is one of the most fundamental
Internet services for the... [more] |
IA2017-31 pp.7-11 |
ICSS, IA |
2016-06-06 13:30 |
Saga |
Saga University |
Analysis of recursive queries from the Internet to the authoritative name servers in Oita University Masashi Nakamura, Minoru Ikebe, Kazuyuki Yoshida (Oita Univ.) IA2016-2 ICSS2016-2 |
The authoritative name server will receive name resolution queries from the Internet. In this paper, we analyzed queries... [more] |
IA2016-2 ICSS2016-2 pp.7-12 |
IN, RCS (Joint) |
2016-05-20 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2016-16 |
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] |
IN2016-16 pp.85-88 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 13:00 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90 |
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] |
SITE2015-58 IA2015-90 pp.55-60 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 10:50 |
Fukushima |
|
Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method Hikaru Ichise, Yong Jin, Katsuyoshi Iida (Tokyo Inst. of Tech) SITE2014-74 IA2014-106 |
Direct outbound DNS queries from inside PCs to outside computers without any authority information are not considered as... [more] |
SITE2014-74 IA2014-106 pp.173-178 |
ICSS, IPSJ-SPT |
2014-03-28 11:40 |
Okinawa |
Meio Univiersity |
DNS Traffic Analysis Platform with Hadoop Framework Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80 |
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] |
ICSS2013-80 pp.131-135 |