NETSAP 2023: The 13th IEEE International Workshop on Network Technologies for Security, Administration & Protection
*= in-person presentation in Torino
Let’s Block Encrypted Malicious Sites*
Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering*
Kei Oshio, Satoshi Takada, Tianxiang He, Chansu Han, Akira Tanaka, Takeshi Takahashi and Jun’Ichi Takeuchi
Disinformation that Evokes Strong Anger is Shared without Authenticity Judgments
Haruka Nakajima Suzuki and Midori Inaba
RUSTY: Effective C to Rust Conversion via Unstructured Control Specialization
Xiangjun Han, Baojian Hua and Yang Wang
Analyais of Interest Flooding DDOS Attacks on Named Data Networking (NDN)
Mayuri Balakrishnan Ravichandran, Gayatri Uttwani and Eslam G. Abdallah
This workshop aims to discuss and advance research and development of practical systems to fight against cyber attacks. The workshop focuses on development of practical systems and methodologies including measurement and analysis of real traffic and also privacy issues about network monitoring. The workshop addresses researchers from different disciplines in academia and industry, as well as practitioners, who share interests in countermeasures against cyber attacks.
Because of recent expansion of cyber attacks, many organizations and persons have been affected their activities on Internet. DDoS attacks to governmental sites, online trading/shopping sites are typical examples that many people cannot access to their desired information. Furthermore, there are many online services which offer DDoS attacks, so that attackers easily intimidate organizations to perform DDoS attacks.
Increase of targeted attacks and variant explosion of malwares make security systems difficult to detect such malicious activities. As the results, incidents of information leakages have silently and frequently occurred in many organizations.
In order to take countermeasures against the attacks, various types of systems have been proposed in literature. Although benchmark results and simulation experiments could show their good performance, most of the method could not be practically applicable to the real environment. Basically, this gap between in theory and practice is caused by too much benchmark-optimization on algorithms or by unrealistic assumptions on simulation settings.
In this workshop, we focus on practical systems to fight against cyber attacks. Mechanisms, algorithms and strategies that are used in the real field will be discussed. Measurement and analysis of real traffic is also welcomed for aiming at new direction of the future research. In addition to the practical systems, we would like to discuss on privacy issues about network monitoring and usability of security systems.
Any submission whose content is relevant to the area of network technologies for security, administration and protection will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome:
- Intrusion Detection and Protection
- DoS Attack Detection and Protection
- Malware Analysis
- IP Traceback
- Digital Forensics
- Countermeasures against Advanced Persistent Threats
- Network Analytics for Security
- Privacy in Network Monitoring
- Trusted Computing
- Security Automation
- Security Visualization
- Cloud Security
- IoT Security
- Mobile Security
- Usable Security
IEEE Paper templates are available in MS Word 2003 and LaTex. All submissions must use US 8.5×11 letter page format.
Main conference/symposium papers due:
15 January 2023Extended to 15 February 2023
Notification: 7 April 2023
Camera-ready and registration due:
7 May 2023 Updated: 18 May 2023
Journal then Conference Submissions
Due date: April 7, 2023
Notifications: April 30, 2023
Workshops, Fast Abstract, SRS Programs
EXTENDED: Workshop papers due: 21 April 2023
UPDATED: Notifications: 7 May 2023
UPDATED: Camera-ready and registration due: Updated: 18 May 2023
Please submit your paper on EasyChair
IEEE Conference Publishing Policies
All submissions must adhere to IEEE Conference Publishing Policies.
IEEE Cross Check
All submission will be screened for plagiarized material through the IEEE Cross Check portal.
Institute of Information Security, Japan
NTT Communications, Japan
Akira Kanaoka, Toho University, Japan
Jassim Happa, Royal Holloway, University of London, UK
Mamoru Mimura, National Defense Academy of Japan, Japan
Masatsugu Ichino, The University of Electro-Communications, Japan
Rui Tanabe, Yokohama National University, Japan
Takuya Watanabe, NTT Social Informatics Laboratories, Japan
Yang Guo, National Institute of Standards and Technology, USA
Yuhei Otsubo, National Police Agency, Japan