Asia Pacific Advanced Network Meeting

Grand Millennium Hotel Auckland 5th - 9th August 2018

Register Now!

Session Details

Network Security WG Sessions

ObjectivesPresentation Session: To raise the security awareness and knowledge within APAN community - To exchange experience and knowledge in network security technologies and issues, and - To cooperate with other international security efforts to raise security awareness, capabilities and interoperation globally. WG Meeting: Discuss about activities and plan of Security WG, co-chair election, etc.
Target AudienceResearchers, Scientists, Network Engineers, Students
Session Co-ordinator(s)Yoshiaki Kasahara, Kyushu University, Japan
Expected No. of Participants50
Seating ArrangementClassroom
Video ConferencingAvailable

Session 1 : Presentations

Date:Tuesday 2018-08-07
Time:15:30 - 17:00
Location:Millennium 1
Session Chair(s):Yoshiaki Kasahara, Kyushu University, Japan
No. of Participants:20, out of which 3 have provided feeedback
1.  Generating actionable security threat intelligence from malicious domain names   Slides (PDF)
Daiki Chiba, NTT Secure Platform Laboratories, Japan
Domain names have been an integral part of today's Internet since the 1980s. While the Internet cannot virtually function without domain names, cyber attackers also use domain names and the domain name system (DNS) as a reliable, instantaneous, and distributed infrastructure for conducting attacks. We designed and implemented a unified analysis system combining current defense solutions to generate actionable security threat intelligence from malicious domain names. The basic concept underlying our system is malicious domain name chromatography. Our analysis system can distinguish among mixtures of malicious domain names for websites. On the basis of this concept, we design separation of malicious domain names and offer actionable threat intelligence or defense information by considering the characteristics of malicious domain names as well as the possible defense solutions and points of defense. In this talk, we will share the evaluation results of our analysis system and defense-information output using a large real dataset to show the effectiveness and validity of our system.
2.  Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management    Slides (PDF)
Rakesh Kumar Jha, Shri Mata Vaishno Devi University, India
The next generation of mobile communication have progressed towards the deployment of small cells to meet the growing demands of increased capacity and QoS. As compared to conventional method where all the computations were performed by the BS's only. To reduce burden at the BS side, small cells deployment have been stressed upon. Thus resulting in the formation of Ultra Dense Networks (UDN) having high concentration of small cells (eg. Picocell, femtocell, hotspots) and as a counter effect of which distance between two small cells is reduced to a greater extent. Such a close association of cells in UDN, the probability of frequent handovers also increases abruptly. As a result, the chances for attacker to spoof the bandwidth also increases many folds. In this paper, we have analyzed SNR, SINR and CQI channel parameters. Such that the position of moving users at which handover is initiated in Picocell deployment of UDN can be traced out successfully or region where the probability of attackers presence is high. Through this paper, we have tried to introduce the attacking scenario for the high mobility conditions in UDN.
3.  Global NREN Security Forum   Slides (PDF)
Tom Crumpton, REANNZ, New Zealand
The Global NREN Security Group is an international forum for senior NREN and science network security professionals, sponsored by the Global NREN CEO Forum. Established in 2017, it aims to coordinate security resources globally, including people and knowledge, and promote collaboration around addressing security requirements and challenges across our Research, Education and Science communities. Members of the group will work together to help NRENs manage security risk in several ways, including:
  • Promoting confidentiality, availability and integrity of information to meet operational, legal and evidentiary requirements;
  • Aiding in identifying and managing information needs, risks and responsibilities;
  • Assisting with reviews of IT security policies and procedures and making recommendations to strengthen information controls;
  • Coordinating the sharing of security resources and research between NRENs around the globe.
Tom will discuss our current activities, whilst encouraging others to join this group.

Session 2 : WG Meeting

Date:Tuesday 2018-08-07
Time:17:00 - 18:00
Location:Millennium 1
Session Chair(s):Yoshiaki Kasahara, Kyushu University, Japan
No. of Participants:15, out of which 3 have provided feeedback
AgendaDiscuss about activities and plan of Security WG, co-chair election, etc.