
Network Security |
Chair |
Yoshiaki Kasahara [kasahara _at_ nc.kyushu-u.ac.jp]
Yasuichi Kitamura [kita _at_ jp.apan.net]
Rahmat Budiarto [rahmat _at_ cs.usm.my]
|
Objectives |
- To raise the security awareness and knowledge within APAN community
- To exchange experience and knowledge in network security technologies
and issues, and
- To cooperate with other international security efforts to raise security
awareness, capabilities and interoperation globally.
Security related topics includes protection of the physical,
intellectual, and electronic assets of the APAN and other network,
including its security policies, network access controls, virus
protection, network administration, auditing, and transaction
security.
|
Target Audience |
Researchers, Scientists, Network Engineers |
Expected # of Participants |
30-50 |
Agenda |
0. Opening
1. Botnets: What are they and how to detect 
Sureswaran Ramadass (Univ Sains Malaysia, Malaysia)
2. Precise Time-Stamping for Network Monitoring 
Akihiko Machizawa, Haruo Saito, Tsukasa Iwama (NICT, Japan)
3. Deploying anti-spam technologies (remote presentation 17:10 - 17:30) 
Kazuhiko Yamamoto (IIJ, Japan)
|
Remark |
VTC, CD Projector, wireless Internet access, enough power strips to accomodate the number of laptops expected |
Copy Right 2009 APAN |
|Last Updated 7 Mar 2009
Opening - Yoshiaki Kasahara
Botnets: What are they and how to detect--
Sureswaran Ramadass (Univ Sains Malaysia, Malaysia)
Abstract:
Botnets have become a major treat in the security of the Internet
today. Botnets can be classified uner 3 categories:
- The Spam Bots,
- the Attack Bots and
- the Military Bots
How do we discover Bots and Botnets. How do we track Bot Herders and how can we stop such attacks.
Precise Time-Stamping for Network Monitoring--Akihiko Machizawa, Haruo Saito, Tsukasa Iwama (NICT, Japan)
Abstract:
One-way delay of a packet shows its dynamics along the network path.
Precise time-stamping is required to analyze what occurs in the network.
Network usage can be estimated by using distribution of one-way delay.
Some strange phenomenons, delay oscillation in FTTH and clock hiccups
in ADSL, are introduced. The one-way delays also include the clock errors
of both end. Furthermore, progresses of network time synchronization
and time-stamping techniques are also summarized. Finally, problems
around the leap second are explained.
Deploying anti-spam technologies (remote presentation 17:10 - 17:30)--Kazuhiko Yamamoto (IIJ, Japan)
Abstract:
To decrease massive spam messages, a set of anti-spam technologies
including Submission port, SMTP auth, OP25B (Outbound Port 25
Blocking), domain authentication, are being deployed. This tutorial
first describes a roadmap to deploy such technologies then focuses on
SPF (Sender Policy Framework), one of domain authentication
mechanisms. The tutor want to share experience of anti-spam activities
in Japan with the audience. The audience should be familiar with
messages systems.