Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2021-12-17 17:40 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
[Short Paper]
On the Impact of Communication Link Heterogeneity on Content Delivery Delay in Information-Centric Delay/Disruption-Tolerant Networking Sagayama Hisashi, Ohnishi Michika, Matsuo Ryotaro, Ohsaki Hiroyuki (Kwansei Gakuin Univ.) IA2021-49 |
In recent years, it is expected that ICDTN (Information-Centric Delay/Disruption-Tolerant Networking) incorpo-
rating t... [more] |
IA2021-49 pp.93-96 |
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
A Study on the Average Content Delivery Delay in Information-Centric Delay-Tolerant Networking Chuta Minamiguchi, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin univ.) |
In recent years, the realization of an information-centric network
(ICN) in environments where communication links betw... [more] |
|
ISEC |
2014-12-19 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Space-Time Encoding Schemes with No False Positives Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71 |
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] |
ISEC2014-71 pp.11-15 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] |
ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 pp.315-319 |
ICSS |
2012-03-16 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Device for Transparent Probabilistic Packet Marking Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (Univ. of Tsukuba/JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2011-43 |
Probabilistic Packet Marking (PPM) is known as better defence solution for Denial of Service (DoS) attack. However, most... [more] |
ICSS2011-43 pp.25-30 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback Ryo Nojima (NICT), Youki Kadobayashi (NAIST) IT2010-99 ISEC2010-103 WBS2010-78 |
In this paper, we consider the oblivious symmetric key encryption protocol
and its application to the {\em privacy-pres... [more] |
IT2010-99 ISEC2010-103 WBS2010-78 pp.199-203 |
IA |
2008-09-26 10:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration for Effectiveness of Traceback Messages Forwarding in Mesh of Trees Topology Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2008-32 |
In this paper, we explain the effectiveness of traceback messages forwarding in mesh of trees network topology. Within o... [more] |
IA2008-32 pp.19-24 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Variable Probabilistic Packet Mareking with TTL for IP Traceback Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more] |
ISEC2008-31 SITE2008-25 pp.109-114 |
RCS |
2008-06-27 09:25 |
Mie |
Mie University |
HOTSPOT-BASED TRACEBACK SCHEME USING OVERHEARING IN MOBILE AD HOC NETWORK Naofumi Sugaya, Takeshi Yatagai, Iwao Sasase (Keio Univ.) RCS2008-17 |
In Mobile Ad Hoc Network, Hotspot-Based Traceback Scheme is effective for tracebacking to the attacking node. However, t... [more] |
RCS2008-17 pp.7-12 |
NS, IN (Joint) |
2008-03-07 13:10 |
Okinawa |
Bankoku Shinryokan |
Effect of Spoofed iTrace Packets and Its Countermeasure Tomonori Takada, Masaya Nakayama (The Univ. of Tokyo) NS2007-193 |
ICMP Traceback with Periodical Transmission (iTrace-PT) is an effective method to specify attackers of low rate DoS atta... [more] |
NS2007-193 pp.341-346 |
IA |
2007-10-25 16:45 |
Fukuoka |
Fukuoka SRP Center Building |
Application of the iTrace-PT Method to Reflector based DDoS Attack and Its Effect Tomonori Takada, Masaya Nakayama (Univ. of Tokyo) IA2007-35 |
Recently, reflector-based DDoS (DRDoS) attack has become a new threat.
It uses DNS, Web, and other servers as reflector... [more] |
IA2007-35 pp.27-31 |
CQ, LOIS, IE, IEE-CMN, ITE-ME |
2007-09-27 14:40 |
Tokushima |
The university of Tokushima |
Analysis of Secure Mutual Authentication Methods against the Stolen-Verfier Attack Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) CQ2007-47 OIS2007-37 IE2007-44 |
In 2006, Tsuji et al. proposed a password authentication method called the SAS-X(2), which is secure against the stolen-... [more] |
CQ2007-47 OIS2007-37 IE2007-44 pp.61-64 |
CQ, NS, ICM (Joint) |
2006-11-16 14:10 |
Tottori |
Tottori Univ. of Environmental Studies |
The proposal of Hybrid IP traceback system against DDoS attack Hironori Yanai, Hidenori Nakazato, Hideyoshi Tominaga (Waseda Univ) NS2006-126 CQ2006-67 TM2006-40 |
IP Traceback technique is an important countermeasure for DDoS attack. Many IP traceback techniques
have been proposed.... [more] |
NS2006-126 CQ2006-67 TM2006-40 pp.19-24(NS), pp.49-54(CQ), pp.19-24(TM) |
IN, NS, CS (Joint) |
2006-09-14 13:30 |
Miyagi |
|
[Invited Talk]
On Tracing and Mitigating Distributed Denial of Service Attacks Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22 |
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major conc... [more] |
NS2006-76 IN2006-56 CS2006-22 pp.33-43(NS), pp.43-53(IN), pp.1-11(CS) |
IN, NS, CS (Joint) |
2006-09-15 16:00 |
Miyagi |
|
Increasing Efficiency of DoS-Attack Traceback over Mobile Networks Taishi Tochiori, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-35 |
Denial of Service(DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rap... [more] |
CS2006-35 pp.79-84 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:00 |
Okayama |
Okayama Univ. |
A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
The interconnected IP traceback is a method for identifying theoriginator of an IP packet. A traceback server sends quer... [more] |
ISEC2006-31 SITE2006-28 pp.161-165 |
IN |
2006-02-17 09:30 |
Kochi |
Kochi Univ. of Technology |
Methods for Improving Performance on Packet Marking by Reducing Marking Duplicates Hiroomi Isozaki, Shingo Ata, Ikuo Oka (Osaka City Univ) |
Probabilistic Packet Marking (PPM) is one of the methods on IP traceback. In this method, intermediate router embeds (i.... [more] |
IN2005-151 pp.49-54 |
ICM, NS, CQ (Joint) |
2005-11-17 14:00 |
Shimane |
Kunibiki-messe (Matsue city) |
Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for Improving DDoS Traceback Accuracy Hironori Utsumi, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) |
For Traffic pattern based traceback techniques, non-DoS traffic included in DoS traffic becomes a source of noise which ... [more] |
NS2005-110 pp.1-4 |
PN, IN (Joint) |
2005-10-14 17:00 |
Kanagawa |
Keio Univ. (Yagami) |
Comparison of the Efficiency of IP Traceback Schemes Based on Probabilistic Packet Marking Keisei Oh, Shigeo Shioda (Chiba Univ.) |
Probabilistic packet marking (PPM) is an IP traceback technique that lets routers probabilistically mark packets with pa... [more] |
IN2005-99 pp.67-72 |
CS, IN, NS (Joint) |
2005-09-15 09:25 |
Miyagi |
Tohoku Univ. |
A Mathematical Framework for Evaluating the Efficiency of IP Traceback Schemes Using Packet Marking Keisei Oh, Shigeo Shioda (Chiba Univ.) |
Probabilistic packet marking (PPM) is an IP traceback technique that identifies network paths back to denial of service ... [more] |
IN2005-66 pp.31-36 |