{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00145057","sets":["581:7706:7715"]},"path":["7715"],"owner":"11","recid":"145057","title":["Evaluating Header Information Features for Malware Infection Detection"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-09-15"},"_buckets":{"deposit":"4aea2013-c709-4fc4-9f82-7ffadcf47b2c"},"_deposit":{"id":"145057","pid":{"type":"depid","value":"145057","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Evaluating Header Information Features for Malware Infection Detection","author_link":["221884","221882","221887","221888","221883","221885","221886","221889","221890","221891"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Evaluating Header Information Features for Malware Infection Detection"},{"subitem_title":"Evaluating Header Information Features for Malware Infection Detection","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:社会に浸透していくコンピュータセキュリティ技術] malware, infection detection, traffic, header, vector quantization","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2015-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications"},{"subitem_text_value":"Waseda University"},{"subitem_text_value":"The University of Electro-Communications"},{"subitem_text_value":"NTT Communications Corporation"},{"subitem_text_value":"The University of Electro-Communications"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"NTT Communications Corporation","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":11,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/145057/files/IPSJ-JNL5609013.pdf","label":"IPSJ-JNL5609013.pdf"},"date":[{"dateType":"Available","dateValue":"2017-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5609013.pdf","filesize":[{"value":"1.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f45d66f8-fea1-468a-8d8a-deff2eeebbeb","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2015 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masatsugu, Ichino"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenji, Kawamoto"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toru, Iwano"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuhiro, Hatada"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Yoshiura"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masatsugu, Ichino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenji, Kawamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toru, Iwano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuhiro, Hatada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Yoshiura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"We analyzed traffic data after a malware infection and clarified which features would be the most effective in the detection of infection. The focus is on the use of traffic data to detect infections and on the use of features that do not change much over time from those of the training data. The characteristics of features that are effective for detecting malware infections are also described. Experimental results clarified the effects of the time difference, and the effective features that were little affected by the time difference were identified. There is thus a need to focus on the effect of the time difference when investigating malware infection detection.\n\\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.23(2015) No.5 (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.23.603\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We analyzed traffic data after a malware infection and clarified which features would be the most effective in the detection of infection. The focus is on the use of traffic data to detect infections and on the use of features that do not change much over time from those of the training data. The characteristics of features that are effective for detecting malware infections are also described. Experimental results clarified the effects of the time difference, and the effective features that were little affected by the time difference were identified. There is thus a need to focus on the effect of the time difference when investigating malware infection detection.\n\\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.23(2015) No.5 (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.23.603\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2015-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"56"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-20T06:43:07.455032+00:00","created":"2025-01-19T00:20:44.652843+00:00","id":145057}