<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-14T15:16:30Z</responseDate>
  <request identifier="oai:ipsj.ixsq.nii.ac.jp:00225368" metadataPrefix="oai_dc" verb="GetRecord">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00225368</identifier>
        <datestamp>2025-01-19T12:49:59Z</datestamp>
        <setSpec>581:11107:11112</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users</dc:title>
          <dc:title>Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users</dc:title>
          <dc:creator>Xuping, Huang</dc:creator>
          <dc:creator>Shunsuke, Mochizuki</dc:creator>
          <dc:creator>Akira, Fujita</dc:creator>
          <dc:creator>Katsunari, Yoshioka</dc:creator>
          <dc:creator>Xuping, Huang</dc:creator>
          <dc:creator>Shunsuke, Mochizuki</dc:creator>
          <dc:creator>Akira, Fujita</dc:creator>
          <dc:creator>Katsunari, Yoshioka</dc:creator>
          <dc:subject>[特集:本格的なDXを支えるためのインターネットと運用技術] security notification, IoT malware infection, simulation, ISP</dc:subject>
          <dc:description>In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.31(2023) (online)
DOI　http://dx.doi.org/10.2197/ipsjjip.31.165
------------------------------</dc:description>
          <dc:description>In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.31(2023) (online)
DOI　http://dx.doi.org/10.2197/ipsjjip.31.165
------------------------------</dc:description>
          <dc:description>journal article</dc:description>
          <dc:publisher>情報処理学会</dc:publisher>
          <dc:date>2023-03-15</dc:date>
          <dc:format>application/pdf</dc:format>
          <dc:identifier>情報処理学会論文誌</dc:identifier>
          <dc:identifier>3</dc:identifier>
          <dc:identifier>64</dc:identifier>
          <dc:identifier>1882-7764</dc:identifier>
          <dc:identifier>AN00116647</dc:identifier>
          <dc:identifier>https://ipsj.ixsq.nii.ac.jp/record/225368/files/IPSJ-JNL6403006.pdf</dc:identifier>
          <dc:language>eng</dc:language>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
