<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-12T02:17:59Z</responseDate>
  <request identifier="oai:ipsj.ixsq.nii.ac.jp:00178451" metadataPrefix="jpcoar_1.0" verb="GetRecord">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00178451</identifier>
        <datestamp>2025-01-20T05:06:23Z</datestamp>
        <setSpec>1164:6389:9100:9101</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>ポットによるスキャン及びブルートフォース活動のクラスタリング手法</dc:title>
          <dc:title xml:lang="en">Clustering of Bot Port Scan and Brute-force Activities</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>荒木, 翔平</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>胡, 博</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>永渕, 幸雄</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>小山, 高明</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>三好, 潤</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>嶋田, 創</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>高倉, 弘喜</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Shohei, Araki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Bo, Hu</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yukio, Nagafuchi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Takaaki, Koyama</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Jun, Miyoshi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Hajime, Shimada</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Hiroki, Takakura</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">Network Security</jpcoar:subject>
          <datacite:description descriptionType="Other">IoT デバイスを狙った攻撃が急速に広まっており，2016 年 9 月には Mirai と呼ばれるマルウエアが猛威を振るった．このようなマルウェアの活動を抑止し，早期対策するためにはマルウェアの活動を把握することが重要である．そこで，本稿ではトラフィックデータに対して，前処理にて着目すべきポートを決定し，そのポートに関連したトラフイックデータのみに絞り込み，クラスタリングを行うことによって，ポットに感染してスキャンなどを行っているホスト群を抽出する手法を提案する．この提案手法によって，ポットごとの通信特徴を把握することが可能となり，優先的に対処すべきマルウェアの活動の判断を支援する．実験により，ホスト群の疑わしい活動を傭撒的に分析し，高精度にてポットの分類ができていることを示した．</datacite:description>
          <datacite:description descriptionType="Other">Cyber-attacks targeting loT devices are rapidly spreading. In September 2016, malware called Mirai caused great damages onto the Internet. It is important to clarify malware activities for early-stage measures. In this paper, we propose a clustering method of extracting host groups suspected of similar malware infection. The proposed method decide a high priority port number for narrowing down traffic data efficiently, and then perform clustering for extracting malicious host groups behaving in similar ways. Our proposal can facilitate decision-making of security operators for counter measures in an early stage. In experiment, we showed a holistic view of malicious activities from different host groups and high accuracy achieved by our classification.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2017-03-06</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_18gh">technical report</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/178451</jpcoar:identifier>
          <jpcoar:sourceIdentifier identifierType="ISSN">2188-8671</jpcoar:sourceIdentifier>
          <jpcoar:sourceIdentifier identifierType="NCID">AA12628305</jpcoar:sourceIdentifier>
          <jpcoar:sourceTitle>研究報告セキュリティ心理学とトラスト（SPT）</jpcoar:sourceTitle>
          <jpcoar:volume>2017-SPT-22</jpcoar:volume>
          <jpcoar:issue>1</jpcoar:issue>
          <jpcoar:pageStart>1</jpcoar:pageStart>
          <jpcoar:pageEnd>6</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-SPT17022001.pdf">https://ipsj.ixsq.nii.ac.jp/record/178451/files/IPSJ-SPT17022001.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>1.4 MB</jpcoar:extent>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
