{"created":"2025-01-19T00:45:32.946405+00:00","updated":"2025-01-20T06:09:03.805334+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175817","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175817","title":["Detecting Fraudulent Behavior Using Recurrent Neural Networks"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"daa0ae90-f0b6-478c-9f93-58e43fffaa5f"},"_deposit":{"id":"175817","pid":{"type":"depid","value":"175817","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Detecting Fraudulent Behavior Using Recurrent Neural Networks","author_link":["368008","368006","368004","368005","368007","368003"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Detecting Fraudulent Behavior Using Recurrent Neural Networks"},{"subitem_title":"Detecting Fraudulent Behavior Using Recurrent Neural Networks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Fraud Detection,Machine Learning,Recurrent Neural Network","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Institute of Information Security/Yahoo Japan Corporation"},{"subitem_text_value":"Yahoo Japan Corporation"},{"subitem_text_value":"Institute of Information Security"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Information Security / Yahoo Japan Corporation","subitem_text_language":"en"},{"subitem_text_value":"Yahoo Japan Corporation","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175817/files/IPSJCSS2016117.pdf","label":"IPSJCSS2016117.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016117.pdf","filesize":[{"value":"464.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"fc640dc1-5b71-4a63-8716-7b1ef1bfb36e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihiro, Ando"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehito, Gomi"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehiko, Tanaka"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihiro, Ando","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehito, Gomi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehiko, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Due to an increase in illegal accesses to Internet services, detecting and preventing them has become important. To prevent an illegal access, not only rule-based techniques but also machine learning techniques have been used. In the field of security, such as malware detection, machine learning techniques are used to learn behavioral patterns and detect those that are suspicious.However, there are few studies targeting the behavioral patterns of a malicious user engaged in fraudulent acts on Internet services. In this paper, we propose the approach which uses the patterns in web access logs to detect fraudulent behaviors. We apply and evaluate a recurrent neural network (RNN) to recognize these behaviors. Our result indicates that RNN is very effective for fraudulent behavior detection.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"810","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"805","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":175817,"links":{}}