<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-12T23:09:57Z</responseDate>
  <request metadataPrefix="jpcoar_1.0" verb="GetRecord" identifier="oai:ipsj.ixsq.nii.ac.jp:00214341">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00214341</identifier>
        <datestamp>2025-01-19T16:34:00Z</datestamp>
        <setSpec>581:10433:10445</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>通信挙動に基づいたスキャン攻撃検知</dc:title>
          <dc:title xml:lang="en">Scan Attack Detection Based on Communication Behavior</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>山下, 智也</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>宮本, 大輔</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>関谷, 勇司</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>中村, 宏</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Tomoya, Yamashita</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Daisuke, Miyamoto</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yuji, Sekiya</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Hiroshi, Nakamura</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">[特集:デジタル社会の情報セキュリティとトラスト] セキュリティ，スキャン攻撃検知，通信挙動，スロースキャン，分散スキャン</jpcoar:subject>
          <datacite:description descriptionType="Other">ネットワーク上の攻撃者は，攻撃を行う準備としてまずスキャン攻撃を行い，ネットワーク上のホストが持つ脆弱性に関する情報の収集を試みる．したがってスキャン攻撃の検知は，さらなる本格的な攻撃を未然に防ぐための重要な課題といえる．スキャン攻撃を検知するシステムとして侵入検知システム（IDS）が提案，利用されている．しかし，通信の時間間隔を大きくしてスキャンを行うスロースキャン攻撃や，複数のホストを利用してスキャンを行う分散スキャン攻撃の検知は容易ではない．そこで本論文では，スキャン攻撃を行うホストと正常な通信を行うホストの通信挙動の違いをとらえることのできる特徴量を提案し，この特徴量を用いたスキャン攻撃の検知手法を提案する．実験により，提案手法がスロースキャン攻撃や分散スキャン攻撃の検知に有効であることを確認する．</datacite:description>
          <datacite:description descriptionType="Other">Cyberattacks often begin with a port scan attack, which is used to find exploitable vulnerabilities on targeted systems. Therefore, quick detection of scanning attacks is by far important to avoid further attacks. Intrusion detection systems (IDS) have been proposed to detect scanning attacks. However, it is difficult to detect slow scan attacks, in which the time interval between successive communications is increased, or distributed scan attacks, in which multiple hosts are used for scanning. Therefore, in this paper, we propose a method for detecting scan attacks that focuses on the difference in communication behavior between scanning hosts and hosts that perform normal communication. Through experiments, we confirm that the proposed method is effective in detecting slow scan attacks and distributed scan attacks.</datacite:description>
          <datacite:date dateType="Issued">2021-12-15</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_6501">journal article</dc:type>
          <jpcoar:identifier identifierType="DOI">https://doi.org/10.20729/00214233</jpcoar:identifier>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/214341</jpcoar:identifier>
          <jpcoar:identifierRegistration identifierType="JaLC">10.20729/00214233</jpcoar:identifierRegistration>
          <jpcoar:sourceIdentifier identifierType="ISSN">1882-7764</jpcoar:sourceIdentifier>
          <jpcoar:sourceIdentifier identifierType="NCID">AN00116647</jpcoar:sourceIdentifier>
          <jpcoar:sourceTitle>情報処理学会論文誌</jpcoar:sourceTitle>
          <jpcoar:volume>62</jpcoar:volume>
          <jpcoar:issue>12</jpcoar:issue>
          <jpcoar:pageStart>1904</jpcoar:pageStart>
          <jpcoar:pageEnd>1914</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-JNL6212008.pdf">https://ipsj.ixsq.nii.ac.jp/record/214341/files/IPSJ-JNL6212008.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>1.2 MB</jpcoar:extent>
            <datacite:date dateType="Available">2023-12-15</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
