{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106568","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106568","title":["ネットワークノードの連携による緊急時のDDoSパケットの削除"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"aeb8b1c9-e944-4ddc-ad3f-7106b63064cc"},"_deposit":{"id":"106568","pid":{"type":"depid","value":"106568","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"ネットワークノードの連携による緊急時のDDoSパケットの削除","author_link":["12690","12689","12688","12691"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ネットワークノードの連携による緊急時のDDoSパケットの削除"},{"subitem_title":"Emergency DDoS Packet Deletion by Means of Cooperation with Network Nodes","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"OpenFlow,SDN,DDoS,アクセス制御,パケットフィルタリング","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神奈川大学大学院工学研究科"},{"subitem_text_value":"神奈川大学大学院工学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Kanagawa University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kanagawa University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106568/files/IPSJCSS2014045.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014045.pdf","filesize":[{"value":"462.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"51123204-cc16-44f7-9f7f-aba60c7a97f2","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鈴木, 涼太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森田, 光"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ryota, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hikaru, Morita","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"DDoS 攻撃に対してはアクセス数の流量制限の対策が一般的である。しかし、通常のアクセス と攻撃とを識別せずに一様の制限を行うので本来機能が著しく損なわれる。本稿では、攻撃によるトラフィックの増大に際して、不明、休眠または低頻度アクセスのクライアントのパケットを抑止するアプローチを取る。つまり、除外するクライアントのパケットを識別して削除する。具体例として、SDN(Software Defined Network) における方法を示す。","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Conventional measures for DDoS attacks have been generally using controls on flow data packets. However, since they don't classify the data packets as normal or attack, they impair transmission efficiency of networks. This paper takes an approach to suppress packets of strangers, and dormant or low-frequent clients. Thus, network switches delete attackers' packets. Furthermore, the authors show practical examples by using architecture of SDN -- Software Defined Network.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"345","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"338","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-21T09:22:17.630439+00:00","created":"2025-01-18T23:49:57.010303+00:00","links":{},"id":106568}