{"updated":"2025-01-23T02:54:18.983473+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00010321","sets":["581:612:621"]},"path":["621"],"owner":"1","recid":"10321","title":["IP Matrix:広域ネットワーク監視のための視覚化手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-04-15"},"_buckets":{"deposit":"fe46f138-e03d-4571-9854-6343865c73db"},"_deposit":{"id":"10321","pid":{"type":"depid","value":"10321","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"IP Matrix:広域ネットワーク監視のための視覚化手法","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"IP Matrix:広域ネットワーク監視のための視覚化手法"},{"subitem_title":"IP Matrix: A Visualization Framework for Wide Area Network Observation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:再考分散システム/インターネットの運用・管理","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2006-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学大学院情報システム学研究科"},{"subitem_text_value":"電気通信大学大学院情報システム学研究科"},{"subitem_text_value":"慶應義塾大学大学院政策・メディア研究科"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Systems University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Systems University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Media and Governance Keio University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/10321/files/IPSJ-JNL4704010.pdf"},"date":[{"dateType":"Available","dateValue":"2008-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4704010.pdf","filesize":[{"value":"918.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6ac09c59-ab8f-4320-b67e-9476bd86225c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2006 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"大野, 一広"},{"creatorName":"小池, 英樹"},{"creatorName":"小泉, 芳"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuhiro, Ono","creatorNameLang":"en"},{"creatorName":"Hideki, Koike","creatorNameLang":"en"},{"creatorName":"Kanba, Koizumi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"インターネット定点観測システムは,インターネット上に設置された監視センサで攻撃の検知を行う.監視センサから得られた情報は統計解析され,その結果を視覚化する.しかし既存のシステムは解析結果の国別表示や時間ごとの変化量として提示するにすぎない.これらのシステムの利用者は攻撃者の場所や攻撃者との距離,そして攻撃者と攻撃先との関連を把握することは困難である.本論文では,IP アドレスの2 次元マトリクス表示を用いた広域ネットワーク監視のための視覚化手法の提案と実装について述べる.本視覚化システムの利点は,1) IP アドレスの近接関係が自然に表現可能である点,2) IP アドレス空間の経済的な視覚化が可能である点である.本提案手法を用いることにより,コンピュータワームの拡散を視覚化可能とした.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"An Internet cyber threat monitoring system detects cyber threats using network sensors deployed at particular points on the Internet, statistically analyses the time of attack, source of attack, and type of attack, and then visualizes the result of this analysis. Existing systems, however, simply visualize country-by-country statistics of attacks or hourly changes of attacks. Using these systems, it is difficult to understand the source of attack, the diffusion of the attack, or the relation between the target and the source of the attack. This paper described a method for visualizing cyber threats by using 2-dimensional matrix representation of IP addresses. The advantages of this method are that: (1) the logical distance of IP addresses is represented intuitively, (2) Internet address space is visualized economically. By using this visualization framework, propagation of the computer worms are visualized.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1086","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1077","bibliographicIssueDates":{"bibliographicIssueDate":"2006-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"47"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワークセキュリティ"}]},"weko_creator_id":"1"},"created":"2025-01-18T22:45:15.825312+00:00","id":10321,"links":{}}