{"updated":"2025-01-23T02:35:37.867575+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00010839","sets":["581:638:643"]},"path":["643"],"owner":"1","recid":"10839","title":["高対話型おとりシステムの運用経験に関する考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2004-08-15"},"_buckets":{"deposit":"9d02b1cd-cf64-4b32-9eed-75950d0e14e6"},"_deposit":{"id":"10839","pid":{"type":"depid","value":"10839","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"高対話型おとりシステムの運用経験に関する考察","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"高対話型おとりシステムの運用経験に関する考察"},{"subitem_title":"A Study for Some Experiences of the Operation of Highly Interactive Decoy System","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集「プライバシを保護するコンピュータセキュリティ技術」","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2004-08-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"慶應義塾大学大学院政策・メディア研究科/現在,海上自衛隊"},{"subitem_text_value":"電気通信大学大学院情報システム学研究科"},{"subitem_text_value":"ソニーコンピュータサイエンス研究所"},{"subitem_text_value":"慶應義塾大学環境情報学部"},{"subitem_text_value":"東京大学"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Media and Governance, Keio University/Presently with Japan Maritime Self Defense Force","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Systems, University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"SONY CSL","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Environmental Information, Keio University","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/10839/files/IPSJ-JNL4508013.pdf"},"date":[{"dateType":"Available","dateValue":"2006-08-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4508013.pdf","filesize":[{"value":"309.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"0fb47309-131d-4c6e-83de-e6c6a369c872","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2004 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"澁谷, 芳洋"},{"creatorName":"小池, 英樹"},{"creatorName":"高田, 哲司"},{"creatorName":"安村, 通晃"},{"creatorName":"石井, 威望"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihiro, Shibuya","creatorNameLang":"en"},{"creatorName":"Hideki, Koike","creatorNameLang":"en"},{"creatorName":"Tetsuji, Takada","creatorNameLang":"en"},{"creatorName":"Michiaki, Yasumura","creatorNameLang":"en"},{"creatorName":"Takemochi, Ishii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"インターネット利用人口は拡大しており,今日では個人,組織の双方においてネットワークの使用は欠かせないものとなりつつある.インターネットは多種多様なサービスを提供し,なくてはならないものになっているが,その半面,不正アクセスの問題も急増している.しかし実際の侵入がどのようなものであるかを認知する機会が少なく,見えない世界でのセキュリティに対する認識が難しい.そこで本論文では不正侵入対策の手段の1つとなっているおとりシステムに着目し,Honeynet Projectが提唱している高対話型として構築した.高対話型おとりシステムの特徴として,OSレベルでおとりを実現し,不正アクセス者に制限なく自由に行動させ,不正アクセス者に気づかれないように行動記録を取得,分析することにより,既知の攻撃方法のみならず,未知の脆弱性や行動を記録することが期待されている.しかし高対話型おとりシステムは概念が新しく,主としてその概念ばかり公開されており,具体的なシステム構築例および,運用結果,問題点についての公開情報が少ない.したがって本論文では高対話型おとりシステムを公開されている情報を参考に実際に構築,運用し,不足する機能を追加したうえでさらに運用を行った.その結果得られたデータおよび知見をもとにおとりシステムの持つ問題点および運用方法の提案を含め今後の課題について述べる.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"With the rapid increase of the number of Internet users, now network use is indispensable to individuals and to organization. Although Internet provides us various services and our lives depend on it heavily, we have many problems of suspicious accesses. However, there are few opportunities to recognize what an actual exploit is, and it is difficult to recognize of the security, that is not visible. In this paper, we deployed a decoy system based on the highly interactive level Honeynet Project has defined. This system enables to be decoy on the OS level, making intruders act freely without restriction. It records not only the known activities, but unknown vulnerabilities and activities without being notified by the intruders. Currently, the concept of highly interactive level decoy system is new, the information in these system is not fully available. From these references, we have conducted an operation of the system, while adding some new features that were necessary. By analyzing all the logs from the system, we describe problems and propose the suitable operation methods.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1930","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1921","bibliographicIssueDates":{"bibliographicIssueDate":"2004-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicVolumeNumber":"45"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワークセキュリティ"}]},"weko_creator_id":"1"},"created":"2025-01-18T22:45:38.217787+00:00","id":10839,"links":{}}