Abstracts: Posters

Fukuoka University public NTP service and BCP38

Sho Fujimura, Fuminori Tanizaki and Masaru Okumura

Fukuoka University began providing Japan’s first GPS-based time synchronization service (public NTP service) to the entire world in October 1993. Thirty years later, Fukuoka University is still providing this service, contributing to the development of the Internet. However, over the past 30 years, the amount of traffic to the public NTP service has continued to increase, and the service has been suffering from an overload of accesses from clients around the world. As a result, network failures caused by this public NTP service traffic began to occur around 2013, and the campus network experienced several failures that prevented it from connecting to the Internet.

We were analyzing NTP packets to determine the cause of the failures and to establish countermeasure techniques, and in the process, we discovered some interesting NTP packets.

We also found that this traffic indicated the need for ingress filtering. Therefore, this paper provides an overview of the public NTP service, an analysis of its traffic and packets, and the need for and importance of ingress filtering settings in these results.

Adventures in Teams Calls: Developing training on a short timeline to support IU’s Teams Phone migration

Beth Nolen

In early 2023, IT Training was asked to develop training on Teams Phone to help support the Teams Calls migration at Indiana University. Specifically, the Telecom team was looking for a number of short videos demonstrating how to complete common tasks using Teams Phone, as well as a webinar that covered the basics of how to find and use phone features in Teams. While there had been talk of migrating from Skype for Business to Teams for IU’s office telephony for a few years, we found out in late December of 2022 that the migration was due to start during the spring semester of 2023 – and in mid-January of 2023, we learned that migrations were going to start in mid-February, which meant I had a month (give or take) to script and develop 11 training videos and outline a webinar. This presentation will walk you through my adventures in developing training content to support the Teams Calls migration, including what turned out to be 15 short videos and a webinar that served double-duty as an in-person training session.

Mandatory Operation and User Support on Multiple Types of Multi-Factor Authentication for Members

Takuro Ozaki, Kazuhiro Mishima and Takashi Sato

Osaka Kyoiku University replaced its Information Infrastructure System in February 2021 and strengthened authentications for all users. In addition to the services, it had been provided by the university up to now, authentication was strengthened for the services that were started at the time of the system replacement. In addition to the existing services, we also require users to have Multi-Factor Authentication for several cloud services such as Microsoft 365 and Google Workspace.

In this presentation, we report on the background of the implementation of mandatory Multi-Factor Authentication operation for all university members. In our system, it provides integrated authentication system and Multi-Factor Authentication logic for each our user service at Osaka Kyoiku University. We also report the detailed information of the implementation and support system and information related on the helpdesk matter. Afterward, we will report and discuss about the results and challenges of the implementation of these services for SIGUCCS and university community.

Based on the operational results and support responses from the helpdesk, we found that inquiries could be categorized into two groups: issues requiring immediate attention during service initiation, and ongoing support for continuous usage. Additionally, certain aspects that users needed to understand while using the services were identified, along with specific information that should be communicated to users when guiding them on service utilization. Therefore, appropriate guidance and support were recognized as necessary based on the context of usage.

Updating the University’s information system infrastructure in light of the target changes due to COVID-19

Hideo Masuda, Takayuki Nagai and Masayuki Mori

The University has continued to renew its information infrastructure system every four years, with the lease of the 10th generation system due to expire in February 2022. However, COVID-19 forced the University to make significant changes to its ICT environment, and the tight global demand for semiconductors made it impossible to maintain the same level of service without major changes to the size of the budget.

This paper looks back on procurement, which was swamped by the situation, and shares a record of how it responded to the fast-changing circumstances under such a pandemic.

An attempts to improve security on campus

Ayumu Haruta, Hiromi Yamaoka, Tsuyoshi Akiyama, Keisuke Tamai, Kazuki Yamamoto, Sunao Adachi, and Hideo Masuda

The methods of cyberattacks are diversifying year by year, making it difficult to detect attacks.

At our university, we use IDS/IPS to detect attacks from the outside and suspicious communications from the inside to the outside.

In addition, we used a spam detection and virus checks are performed on the mail server to prevent email attacks, and SMTP authentication is used to prevent unauthorized spam emails from being sent.

However, these measures are not sufficient, and there were multiple security incidents at last year, such as spam being sent due to unauthorized access to the mail server.

Based on the fact that there is an incident , we introduced MFA, monitored unauthorized nework traffic by NetFlow, and evaluated DNS-based security products in order to improve security on our campus.

In this report, we will mainly introduce examples of what kind of incident occurred and what kind of security improvement measures were considered, evaluated, and introduced.