<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-22T12:17:04Z</responseDate>
  <request verb="GetRecord" metadataPrefix="jpcoar_1.0" identifier="oai:ipsj.ixsq.nii.ac.jp:00201481">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00201481</identifier>
        <datestamp>2025-01-19T21:00:49Z</datestamp>
        <setSpec>6164:6165:6462:10022</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>ブロックチェーンを用いた不正ログイン対策の検討</dc:title>
          <dc:title xml:lang="en">Investigation on Unauthorized Login Countermeasure Using Blockchain Technology</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>藤, 竜成</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>臼崎, 翔太郎</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>油田, 健太郎</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>朴, 美娘</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>白鳥, 則郎</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>岡崎, 直宣</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Ryusei, Fuji</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Shotaro, Usuzaki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kentaro, Aburada</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Mirang, Park</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Norio, Shiratori</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Naonobu, Okazaki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">ブロックチェーン，不正ログイン対策</jpcoar:subject>
          <datacite:description descriptionType="Other">リスト攻撃による不正ログインが国内外で頻繁に確認されている．リスト攻撃とは，不正に入手した，あるサービス利用者のログインIDとパスワードのリストをもとにログイン試行を行う攻撃である．リストは他の会員制サービスから漏洩したログインIDとパスワードをもとに作成されており，ログインIDとパスワードを使い回すユーザのアカウントに対しては，少ない試行回数での不正ログインが可能である．リスト攻撃に対して，IPアドレスのブラックリスト化やログイン試行回数による攻撃検知などが対策として取られているが，単一組織で行う対策には限界がある．そのため，複数組織間でリスト攻撃に関する情報（リスト攻撃情報）を迅速に共有し活用するためのシステムが必要である．本研究では，リスト攻撃情報を複数組織間で迅速に共有する，ブロックチェーン技術を応用した不正ログイン対策システムについて検討する．</datacite:description>
          <datacite:description descriptionType="Other">Unauthorized logins due to list-based attacks have been confirmed frequently. List-based attacks perform the login attempts based on an illegally obtained list containing sets of a login ID and password. The list is created based on the sets of the login ID and password leaked from other membership services, and the unauthorized login with a small number of attempts is possible for the account of the user who recycles their login ID and password. As a countermeasure, a blacklist of IP addresses and an attack detection based on the number of login attempts are usually adopted, however, there is a limit to the measures taken in a single organization. Therefore, we need a system for rapidly sharing and utilizing information on the list-based attacks (list attack information) among multiple organizations. In this study, we investigate an unauthorized login countermeasure system using the blockchain technology which shares list attack information quickly.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2019-10-14</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/201481</jpcoar:identifier>
          <jpcoar:relation>
            <jpcoar:relatedIdentifier identifierType="NCID">ISSN　1882-0840</jpcoar:relatedIdentifier>
          </jpcoar:relation>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2019論文集</jpcoar:sourceTitle>
          <jpcoar:volume>2019</jpcoar:volume>
          <jpcoar:pageStart>1336</jpcoar:pageStart>
          <jpcoar:pageEnd>1342</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJCSS2019188.pdf">https://ipsj.ixsq.nii.ac.jp/record/201481/files/IPSJCSS2019188.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>1.6 MB</jpcoar:extent>
            <datacite:date dateType="Available">2021-10-14</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
