{"id":175763,"updated":"2025-01-20T06:11:15.765305+00:00","links":{},"created":"2025-01-19T00:45:29.996185+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175763","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175763","title":["マルウェア感染によるダークネットパケットへの影響について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"93404607-9a93-48ae-8338-29d9b4a7171d"},"_deposit":{"id":"175763","pid":{"type":"depid","value":"175763","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"マルウェア感染によるダークネットパケットへの影響について","author_link":["367645","367647","367657","367651","367650","367656","367658","367654","367653","367655","367649","367646","367652","367648"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マルウェア感染によるダークネットパケットへの影響について"},{"subitem_title":"The Effect of the Malware Infection on the Darknet Packets","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MWS,ダークネット,マルウェア,相関解析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"キヤノンITソリューションズ株式会社"},{"subitem_text_value":"キヤノンITソリューションズ株式会社"},{"subitem_text_value":"キヤノンITソリューションズ株式会社"},{"subitem_text_value":"情報通信研究機構"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Canon IT Solutions Inc.","subitem_text_language":"en"},{"subitem_text_value":"Canon IT Solutions Inc.","subitem_text_language":"en"},{"subitem_text_value":"Canon IT Solutions Inc.","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Infomation and Communication Technology","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175763/files/IPSJCSS2016063.pdf","label":"IPSJCSS2016063.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016063.pdf","filesize":[{"value":"922.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"024d8b82-fa74-43e6-b6e8-eed8851b8fed","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"樫木, 惟人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"古本, 啓祐"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"池上, 雅人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"長谷川, 智久"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"石川, 堤一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中尾, 康二"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Korehito, Kashiki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Keisuke, Furumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Ikegami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomohisa, Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Teiichi, Ishikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koji, Nakao","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"先に,我々は複数の国家におけるダークネットに到達するパケットの解析を行った.それぞれのパケットについて時系列分析を行い,攻撃側 IP の分類とその攻撃ツールの推定を行った.その結果,Morto 等のマルウェアによる攻撃およびスキャンが多数見られ,マルウェア感染による攻撃の拡大,自動化が対策への課題となることが示された.本稿では,まずマルウェアの発生状況の時系列分布を与える.さらに,複数国家でのダークネットパケットの到達状況および,それら複数国家からのアウトバウンドパケットの状況を与える.最後に,それらの国におけるマルウェアと,そのマルウェアが影響しているであろうダークネットパケットとの関係を与える.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Previously, we analyzed the packet to reach the darknet in multiple national.By carrying out the ime-series analysis to darknet packet, we went the classification of the attacking IP and an estimate of the attack tools.As a result, attacks and scan by malware such as Morto were observed in a large number, expansion and automation of attack by malware infection was shown to be a challenge to measure.In this paper, first, we show the time series distribution of malware of occurrence.This data is utilizing the result of the malware detection sensor in each country of the security endor.Secondly, we give the status of the outbound packets from the data of the darknet packet with multiple ational.Finally, we provide the relationship between malware in their countrythe and darknet packet in the malware has affected.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"419","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"416","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}