<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-05-13T19:26:50Z</responseDate>
  <request metadataPrefix="jpcoar_1.0" verb="GetRecord" identifier="oai:ipsj.ixsq.nii.ac.jp:00182561">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00182561</identifier>
        <datestamp>2025-01-20T04:02:15Z</datestamp>
        <setSpec>1164:3925:9071:9205</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>ドライブ・パイ・ダウンロード攻撃によるインシデントを再現するフォレンジック支援システム</dc:title>
          <dc:title xml:lang="en">A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>奥田, 裕樹</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>福田, 洋治</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>白石, 善明</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>井口, 信和</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yuki, Okuda</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Youji, Fukuta</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yoshiaki, Shiraishi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Nobukazu, Iguchi</jpcoar:creatorName>
          </jpcoar:creator>
          <datacite:description descriptionType="Other">本研究では，端末にマルウェアを送る主要な手段の 1 つであるドライブ ･ パイ ・ ダウンロード攻撃 (DBD 攻撃） を含むインシデントを想定し，マルウェアの感染と活動の調査を支援するシステムを開発する．本システムは，インシデント発生時の通信パケットの記録から DBD 攻撃に関連する悪性 Web サイトへのリクエストとそのレスポンス，Web クライアントの動作を再現する．悪性 Web サイトは作られてから姿を消すまでの期間が短く，端末に設置されたマルウェアが活動後に消失，または攻撃者が痕跡を消去 ・ 攪乱すると，事後の調査が困難になる．インシデント対応の初動や調査の場面で本システムを用いることで DBD 攻撃によるマルウェア感染の過程が再現できる．これをインシデントが観測 ・ 記録できる環境で実施することでマルウェア感染の過程と活動の痕跡の収集と記録を支援する．</datacite:description>
          <datacite:description descriptionType="Other">In this research, we have developed a system that supports investigation of malware infections and activities in Drive-by Download attack which is one of the dominant tool of sending malware to terminals. This system reproduces HTTP requests, responses and behavior of malicious website related to the Drive-by Download attack from the raw packets of the communication at the time of the incident occurs. As a malicious website is disappeared in a short period, when malware installed in the terminal disappears after the activity or an attacker erases / disturbs the evidence, it becomes difficult to investigation. By using this system at the initial stage and investigation of incident handling, the process of malware infection caused by Drive-by Download attack can be reproduced. Using of this system in an environment where the incident can observe and record, it supports to collect the malware infection process and its activity.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2017-07-07</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_18gh">technical report</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/182561</jpcoar:identifier>
          <jpcoar:sourceIdentifier identifierType="ISSN">2188-8655</jpcoar:sourceIdentifier>
          <jpcoar:sourceIdentifier identifierType="NCID">AA11235941</jpcoar:sourceIdentifier>
          <jpcoar:sourceTitle>研究報告コンピュータセキュリティ（CSEC）</jpcoar:sourceTitle>
          <jpcoar:volume>2017-CSEC-78</jpcoar:volume>
          <jpcoar:issue>16</jpcoar:issue>
          <jpcoar:pageStart>1</jpcoar:pageStart>
          <jpcoar:pageEnd>6</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-CSEC17078016.pdf">https://ipsj.ixsq.nii.ac.jp/record/182561/files/IPSJ-CSEC17078016.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>1.7 MB</jpcoar:extent>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
