{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00157697","sets":["1164:4088:8487:8488"]},"path":["8488"],"owner":"11","recid":"157697","title":["Detection and Control of DNS based Botnet Communications by Using SDN-Ryu Solution"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-02-25"},"_buckets":{"deposit":"6bbf124b-6f1d-42d8-9407-0196fd76754a"},"_deposit":{"id":"157697","pid":{"type":"depid","value":"157697","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Detection and Control of DNS based Botnet Communications by Using SDN-Ryu Solution","author_link":["298841","298842","298839","298838","298837","298840"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Detection and Control of DNS based Botnet Communications by Using SDN-Ryu Solution"},{"subitem_title":"Detection and Control of DNS based Botnet Communications by Using SDN-Ryu Solution","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"SDN,OpenFlow","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2016-02-25","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Global Scientific Information and Computing Center, Tokyo Institute of Technology"},{"subitem_text_value":"Global Scientific Information and Computing Center, Tokyo Institute of Technology"},{"subitem_text_value":"Global Scientific Information and Computing Center, Tokyo Institute of Technology"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Global Scientific Information and Computing Center, Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Global Scientific Information and Computing Center, Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Global Scientific Information and Computing Center, Tokyo Institute of Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/157697/files/IPSJ-IOT16032012.pdf","label":"IPSJ-IOT16032012.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT16032012.pdf","filesize":[{"value":"433.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"13dd3646-f65b-4a0b-994c-801cbd04f262","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Sebastian, Li"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yong, Jin"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsuyoshi, Iida"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Sebastian, Li","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yong, Jin","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsuyoshi, Iida","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Domain Name System (DNS) is the most widely used protocol in the Internet for domain name Resolution. Since DNS provides many fundamental features Internet users would be strenuous without DNS. Recently, there are reports indicating malicious use of DNS to perform Botnet communications. However, since DNS traffic cannot be simply blocked due to its indispensability in the Internet. As such, we would like to propose a method on how to detect and control DNS based botnet communications by monitoring direct outbound DNS queries using OpenFlow Technology. We also constructed a local experimental network and evaluated the prototype system and confirmed that the proposed method worked as we expected. By using our proposed method, it is possible to detect and control some DNS based botnet based communications especially that uses direct outbound DNS traffic.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Domain Name System (DNS) is the most widely used protocol in the Internet for domain name Resolution. Since DNS provides many fundamental features Internet users would be strenuous without DNS. Recently, there are reports indicating malicious use of DNS to perform Botnet communications. However, since DNS traffic cannot be simply blocked due to its indispensability in the Internet. As such, we would like to propose a method on how to detect and control DNS based botnet communications by monitoring direct outbound DNS queries using OpenFlow Technology. We also constructed a local experimental network and evaluated the prototype system and confirmed that the proposed method worked as we expected. By using our proposed method, it is possible to detect and control some DNS based botnet based communications especially that uses direct outbound DNS traffic.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-02-25","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"2016-IOT-32"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":157697,"updated":"2025-01-20T13:14:54.253339+00:00","links":{},"created":"2025-01-19T00:31:34.446660+00:00"}