{"created":"2025-01-18T23:50:00.124791+00:00","updated":"2025-01-21T09:24:25.533854+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106631","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106631","title":["機械学習によるマルウェア検出 リローデッド"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"98f0a568-7b6b-4224-a884-2b9768706192"},"_deposit":{"id":"106631","pid":{"type":"depid","value":"106631","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"機械学習によるマルウェア検出 リローデッド","author_link":["13157","13159","13158","13153","13155","13154","13156","13152"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"機械学習によるマルウェア検出 リローデッド"},{"subitem_title":"Detecting Malware with Machine Learning Reloaded","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア,静的解析,機械学習","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学基幹理工学部"},{"subitem_text_value":"株式会社FFRI"},{"subitem_text_value":"株式会社FFRI"},{"subitem_text_value":"早稲田大学基幹理工学部"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"FFRI Inc.","subitem_text_language":"en"},{"subitem_text_value":"FFRI Inc.","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106631/files/IPSJCSS2014108.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014108.pdf","filesize":[{"value":"205.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"b3547856-0f3e-4545-8233-6b03862be52e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"笹生, 憲"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"村上, 純一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松木, 隆宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森, 達哉"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akira, Saso","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junichi, Murakami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takahiro, Matsuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では,実行ファイルのPE ヘッダーから得られる静的な情報を利用してマルウェアと正常系ファイルを高精度に識別する方法を提案する.中心となるアイディアはPEヘッダの特徴抽出を工夫し,自動化することである.これにより,マルウェア解析者が経験的に発見した有用な特徴に加え,これまであまり活用されてこなかった有用な特徴を新たに発掘することができた.また,これらの特徴を機械学習に適用することで識別精度が従来手法と比較して大幅に向上することを確認した.さらに本研究ではマルウェア識別手法を評価するデータセットの選択が性能に与える影響をデータソースの偏りや時間軸の観点で検証した結果を報告する.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"834","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"827","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":106631,"links":{}}