{"id":110324,"updated":"2025-01-20T02:15:44.284138+00:00","links":{},"created":"2025-01-18T23:52:37.733351+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00110324","sets":["6504:6739:7822"]},"path":["7822"],"owner":"6748","recid":"110324","title":["シグネチャ型侵入検知システムにおける類似シグネチャの自動生成による未知攻撃検出手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-03-06"},"_buckets":{"deposit":"2ada3326-2a17-4061-81c0-ee4aa923cf2e"},"_deposit":{"id":"110324","pid":{"type":"depid","value":"110324","revision_id":0},"owners":[6748],"status":"published","created_by":6748},"item_title":"シグネチャ型侵入検知システムにおける類似シグネチャの自動生成による未知攻撃検出手法","author_link":["26517","26515","26518","26516"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"シグネチャ型侵入検知システムにおける類似シグネチャの自動生成による未知攻撃検出手法"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"22","publish_date":"2012-03-06","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_22_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京工科大"},{"subitem_text_value":"東京工科大"},{"subitem_text_value":"山野美容芸術短大"},{"subitem_text_value":"東京工科大"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":6748,"item_22_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"川崎孝弘"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"服部峻"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"久保村千明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"亀田弘之"}],"nameIdentifiers":[{}]}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_22_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00349328","subitem_source_identifier_type":"NCID"}]},"item_22_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":" サーバやネットワークが攻撃にさらされていないかを解析する侵入検知システム(IDS:Intrusion Detection System)は,実用的なものでは,シグネチャ型のシステムが広く利用されている.これらシステムは,不正アクセス等の攻撃データをパターン化したシグネチャを予め記録しておき,ネットワークやログ上から抽出したデータと比較し,攻撃を検知する.しかしながら,この手法だとシステムに記録されていない,未知の攻撃を検知できないという問題がある. 本稿では,予めシステムに記録されているシグネチャを基に新しいシグネチャを自動生成する手法について述べる.この手法により,既存のシグネチャが検出できる攻撃パターンと類似する攻撃パターンも検出することが可能となる.\n※この論文は筆頭著者の希望により閲覧できません。","subitem_description_type":"Other"}]},"item_22_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"592","bibliographic_titles":[{"bibliographic_title":"第74回全国大会講演論文集"}],"bibliographicPageStart":"591","bibliographicIssueDates":{"bibliographicIssueDate":"2012-03-06","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2012"}]},"relation_version_is_last":true,"weko_creator_id":"6748"}}