IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
(Joint) [detail]
Fukuoka Kyushu Institute of Technology
(Cancelled but technical report was issued)
Analyzing Effectiveness of Blacklisting Policy Focusing on ON/OFF Pattern of Scan Activities
Takashi Fujita, Naoki Fukushi, Masato Uchida (Waseda Univ.) CQ2019-151
A blacklist registers IP addresses and domain names found to be involved in malicious activity. Blacklist providers set ... [more] CQ2019-151
ICSS, IPSJ-SPT 2020-03-02
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] ICSS2019-80
ICSS, IPSJ-SPT 2020-03-02
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
Hiroshima Satellite Campus Hiroshima Design of Honeynet to avoid IPv6 alias detection
Hyuga Kobayashi, Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2019-50
In IPv6, full scan is infeasible due to its enourmous address space, thought it is easy in IPv4.
Hitlist, which is the ... [more]
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
ISEC 2018-05-16
Tokyo Ookayama Campus, Tokyo Institute of Technology Analysis of the cryptocurrency network using darknet traffic
Mitsuyoshi Imamura (Univ-Tsukuba/NomuraAM), Kazumasa Omote (Univ-Tsukuba) ISEC2018-6
Cryptocurrency such as bitcoins ia a peer-to-peer(P2P) network systems based on distributed ledger technology called blo... [more] ISEC2018-6
IA 2017-11-10
Kumamoto Hotel Greenpia Minamiaso Investigation of A Method for Detecting New Scanning Activities by Correlating Low-Interaction Honeypots with Darknet
Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-25
In this paper, we discuss a method for detecting new scanning activities by using low-interaction honeypots and darknet.... [more] IA2017-25
ICSS 2015-11-26
Fukushima AIST, Fukushima Renewable Energy Institute tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header
Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] ICSS2015-38
IA, ICSS 2015-06-11
Fukuoka Kyushu Institute of Technology Univ. Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] IA2015-7 ICSS2015-7
IA, ICSS 2015-06-12
Fukuoka Kyushu Institute of Technology Univ. Can internet measurement be a noise for analysis of darknet?
Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.) IA2015-15 ICSS2015-15
Darknet is a passive sensor system dedicated to monitoring traffic
routed to unused IP address space.
Darknets have be... [more]
IA2015-15 ICSS2015-15
ICSS 2015-03-04
Okinawa Meio Univiersity Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] ICSS2014-82
ICSS, IPSJ-SPT 2014-03-28
Okinawa Meio Univiersity Spam Analysis based on Mail Relay Routing
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] ICSS2013-75
ICSS, IPSJ-SPT 2014-03-28
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
IA, ICSS 2013-06-21
Niigata Ao-re Nagaoka Network Observation and Analysis Report on nicter -- Close Encounters of Network Incident Sign --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] IA2013-14 ICSS2013-14
ICSS 2012-03-16
Tokyo Kikai-Shinko-Kaikan Bldg. A malicious packet visualization in darknet and its application to malware analysis
Naoto Sone (Naruto Univ.), Tatsuya Syoriki, Akihisa Torii, Taketo Murao, Masakatu Morii (Kobe Univ.) ICSS2011-46
We analyzed malicious IP packets in the darknet with visualization tool for IP packet which we developed. Furthermore ... [more] ICSS2011-46
Miyazaki Miyazaki Seagia Expanding Darknet Space with Virtual Sensors
Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] IN2011-189
ICSS 2011-03-25
Tokyo Suspended Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] ICSS2010-66
IA, ICSS 2010-06-17
Kyoto Academic Center for Computing and Media Studies, Kyoto University A data screening technique for network log data by frequent sequential pattern mining
Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) IA2010-2 ICSS2010-2
To early detect and defend the threats in the Internet caused by botnet,
darknet monitoring is very important to unders... [more]
IA2010-2 ICSS2010-2
ICSS 2009-11-13
Miyazaki University of Miyazaki A Consideration of Feature Extraction for Attacks on Darknet
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] ICSS2009-60
ICSS 2009-11-13
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan