{"created":"2025-01-19T00:45:29.831679+00:00","updated":"2025-01-20T06:11:10.045137+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175760","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175760","title":["ダークネットトラフィックの可視化とオンライン更新によるモニタリング"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"6a03a558-8111-4e66-b5cb-23321b24d887"},"_deposit":{"id":"175760","pid":{"type":"depid","value":"175760","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"ダークネットトラフィックの可視化とオンライン更新によるモニタリング","author_link":["367627","367626","367617","367623","367622","367621","367618","367625","367628","367619","367624","367620"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ダークネットトラフィックの可視化とオンライン更新によるモニタリング"},{"subitem_title":"Visualization of Darknet Traffic and Its Online Update for Monitoring","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ダークネット,可視化,オンライン更新,t-SNE,次元圧縮","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学大学院工学研究科"},{"subitem_text_value":"神戸大学大学院工学研究科"},{"subitem_text_value":"神戸大学大学院工学研究科"},{"subitem_text_value":"国立研究開発法人 情報通信研究機構"},{"subitem_text_value":"国立研究開発法人 情報通信研究機構"},{"subitem_text_value":"株式会社クルウィット"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"clwit, Inc.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175760/files/IPSJCSS2016060.pdf","label":"IPSJCSS2016060.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016060.pdf","filesize":[{"value":"893.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1e673084-093d-495a-a72b-4d0039c60d66","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"畑中, 拓哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"北園, 淳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小澤, 誠一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"班, 涛"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中里, 純二"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"島村, 隼平"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takuya, Hatanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jun, Kitazono","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Seiichi, Ozawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tao, Ban","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junji, Nakazato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jumpei, Shimamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"未使用の IP アドレス空間であるダークネットには, DDoS 攻撃への返信やスキャンなど,不正な通信に伴うパケットが大量に届く.それらを観測 ・ 分析することで,インターネット上で発生している悪性な活動の動向を把握することが可能になると期待されている.本論文では,ダークネットの通信パターンの分布を可視化しモニタリングする手法を提案する.提案法では,通信パターンを特徴ベクトルとして表現し,次元圧縮することで二次元の散布図として可視化する.また,新たな観測データが得られる毎に散布図を逐次更新することで,リアルタイムに変化を捉える.これにより,攻撃の傾向の変化や新たな攻撃の発生の検知を行うことが期待される.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"402","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"397","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":175760,"links":{}}