C Han, A Tanaka, T Takahashi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Most packets arriving in the darknet (or network telescope), which is unused IP address space on the Internet, are related to indiscriminate scanning and attack activities. In recent …
A Tanaka, C Han, T Takahashi - IEEE Access, 2023 - ieeexplore.ieee.org
Adversaries perform port scanning to discover accessible and vulnerable hosts as a prelude to cyber havoc. A darknet is a cyberattack observation network to capture these scanning …
K Oshio, S Takada, T He, C Han… - 2023 IEEE 47th …, 2023 - ieeexplore.ieee.org
The number of IoT malware variants infecting vulnerable IoT devices is growing. Many of these are created by modifying parts of publicly available source codes and adding …
C Han, A Tanaka, Jun'ichi Takeuchi, T Takahashi… - ICISSP, 2023 - scitepress.org
The darknet is an unused IP address space that can be an effective resource for observing and analyzing global indiscriminate scanning attacks. Scanning traffic on the darknet has …
K Oshio, S Takada, C Han, A Tanaka… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Most IoT malware is variants generated by editing and reusing parts of the functions based on publicly available source codes. In our previous study, we proposed a method to estimate …
Network Intrusion Detection Systems (NIDSes) play an important role in security operations to detect and defend against cyberattacks. As artificial intelligence (AI)-powered NIDSes are …