{"updated":"2025-01-20T13:15:42.025902+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00157725","sets":["1164:4088:8487:8488"]},"path":["8488"],"owner":"11","recid":"157725","title":["IP Traceback手法の提案とOpenFlowを用いた実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-02-25"},"_buckets":{"deposit":"ae166a39-17d9-41e2-9efe-df058362385c"},"_deposit":{"id":"157725","pid":{"type":"depid","value":"157725","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"IP Traceback手法の提案とOpenFlowを用いた実装","author_link":["299038","299040","299039","299037"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"IP Traceback手法の提案とOpenFlowを用いた実装"},{"subitem_title":"Proposal and implementation of IP Traceback method by OpenFlow","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ・障害・キャンパスネットワーク","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2016-02-25","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"埼玉大学工学部情報システム工学科"},{"subitem_text_value":"埼玉大学工学部情報システム工学科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Departement of Information and Computer Sciences, Saitama University","subitem_text_language":"en"},{"subitem_text_value":"Departement of Information and Computer Sciences, Saitama University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/157725/files/IPSJ-IOT16032040.pdf","label":"IPSJ-IOT16032040.pdf"},"date":[{"dateType":"Available","dateValue":"2018-02-25"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT16032040.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"baff5a12-b0d8-45e2-a707-3c14acda95bb","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"矢野, 隼太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉浦, 紀晃"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hayata, Yano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Noriaki, Yoshiura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"IP Tracerouteは,目的地へ送信したパケットの経路を把握することが目的である一方で,IP Tracebackは,到達したパケットの経路を把握することを目的としている.DDoS攻撃やなりすまし攻撃に利用されるパケットでは,その送信元アドレスを詐称している場合があり,パケットの送信元アドレスから実際の送信元が把握できるとは限らない.よって,攻撃のパケットが到達した場合,そのパケットの経路を把握することで,攻撃のパケットの送信元を把握することが可能となる.そこで,本稿では,IP Tracebackの実現方法を提案し,その実装をOpenflowを用いて行う.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"IP traceroute is used to see the route of departing packets, while IP traceback is used to see the route of packets of arriving packets. IP traceback is useful to detect the route of packets of DDoS attack and spoofing attack because the packets fabricate source IP addresses and sources of the packets is not known by the source IP addresses of the packets. Prevention of these kinds of attacks requires the detection of the routes and sources of the attacking packets. This paper proposes the method of IP traceback and implements the method at Openflow controllers.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-02-25","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"40","bibliographicVolumeNumber":"2016-IOT-32"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:31:36.056937+00:00","id":157725,"links":{}}