{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00145400","sets":["5471:7854:8343"]},"path":["8343"],"owner":"11","recid":"145400","title":["HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-09-15"},"_buckets":{"deposit":"570f6860-6c16-4c33-96cc-4b1d8d7d5798"},"_deposit":{"id":"145400","pid":{"type":"depid","value":"145400","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources","author_link":["224004","224007","224002","224006","224005","224003"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources"},{"subitem_title":"HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[Special Issue of Computer Security Technologies to be Indispensable to the Society] network, DoS, virtual machine, HTTP-GET flood","subitem_subject_scheme":"Other"}]},"item_type_id":"5","publish_date":"2015-09-15","item_5_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Faculty of Engineering, Toyohashi University of Technology"},{"subitem_text_value":"Faculty of Engineering, Toyohashi University of Technology"},{"subitem_text_value":"Internet Initiative Japan Inc."}]},"item_5_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Engineering, Toyohashi University of Technology","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Engineering, Toyohashi University of Technology","subitem_text_language":"en"},{"subitem_text_value":"Internet Initiative Japan Inc.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/145400/files/IPSJ-JIP2305015.pdf","label":"IPSJ-JIP2305015.pdf"},"date":[{"dateType":"Available","dateValue":"2017-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JIP2305015.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6588c796-0b21-4959-b6c4-4334a85d898a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2015 by the Information Processing Society of Japan"}]},"item_5_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Mizuki, Watanabe"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryotaro, Kobayashi"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiko, Kato"}],"nameIdentifiers":[{}]}]},"item_5_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Mizuki, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryotaro, Kobayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiko, Kato","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_5_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00700121","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_5_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-6652","subitem_source_identifier_type":"ISSN"}]},"item_5_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Currently, Web services are widely utilized to disclose company information, and offer online services and e-commerce. As these services have become an essential part of our everyday lives, the public is greatly inconvenienced when they are disrupted. Denial of service (DoS) attacks exert adverse influences on Web services. We focus on HTTP-GET Flood attacks, which are manually operable DoS attacks. It is possible to simply block manually operable DoS attacks such as F5 attacks on the server side; however, such measures could be noticed by the attackers. Therefore, to prevent the attacker changing their method of attack, it is possible to overcome the attack by redirecting the attack to another system, for which a previous study has proposed a feasible technique located in the service provider. The previous study assumes a correlation between the CPU resource and the request error rate. However, the Web Server actually has multiple resources. Therefore, it is important to be able to control the server resources rather than the CPU and the memory. The operational implementation of the proposed method and the evaluation experiments confirm the effectiveness of the proposed method.","subitem_description_type":"Other"}]},"item_5_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Currently, Web services are widely utilized to disclose company information, and offer online services and e-commerce. As these services have become an essential part of our everyday lives, the public is greatly inconvenienced when they are disrupted. Denial of service (DoS) attacks exert adverse influences on Web services. We focus on HTTP-GET Flood attacks, which are manually operable DoS attacks. It is possible to simply block manually operable DoS attacks such as F5 attacks on the server side; however, such measures could be noticed by the attackers. Therefore, to prevent the attacker changing their method of attack, it is possible to overcome the attack by redirecting the attack to another system, for which a previous study has proposed a feasible technique located in the service provider. The previous study assumes a correlation between the CPU resource and the request error rate. However, the Web Server actually has multiple resources. Therefore, it is important to be able to control the server resources rather than the CPU and the memory. The operational implementation of the proposed method and the evaluation experiments confirm the effectiveness of the proposed method.","subitem_description_type":"Other"}]},"item_5_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"663","bibliographic_titles":[{"bibliographic_title":"Journal of information processing"}],"bibliographicPageStart":"655","bibliographicIssueDates":{"bibliographicIssueDate":"2015-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"23"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":145400,"updated":"2025-01-20T18:21:11.907949+00:00","links":{},"created":"2025-01-19T00:21:02.439305+00:00"}