{"updated":"2025-01-20T06:09:06.187205+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175818","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175818","title":["畳み込みニューラルネットワークを用いたURL系列に基づくドライブバイダウンロード攻撃検知"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"7bacf2d7-81f6-4e13-be83-382c7e78c170"},"_deposit":{"id":"175818","pid":{"type":"depid","value":"175818","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"畳み込みニューラルネットワークを用いたURL系列に基づくドライブバイダウンロード攻撃検知","author_link":["368012","368016","368011","368010","368009","368015","368014","368013"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"畳み込みニューラルネットワークを用いたURL系列に基づくドライブバイダウンロード攻撃検知"},{"subitem_title":"Drive-by Download Attacks Detection Based on URL Sequence Using Convolutional Neural Networks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ドライブバイダウンロード,系列データ分類,畳み込みニューラルネットワーク","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175818/files/IPSJCSS2016118.pdf","label":"IPSJCSS2016118.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016118.pdf","filesize":[{"value":"784.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"9c558394-bf8d-4284-8283-19efe6ef94df","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"山西, 宏平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"芝原, 俊樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高田, 雄太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"千葉, 大紀"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"秋山, 満昭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"八木, 毅"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大下, 裕一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"村田, 正幸"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本稿では,プロキシログに含まれる宛先 URL の系列から,ドライブバイダウンロード攻撃に関する悪性 URL 系列を検知する手法を,系列データの解析に優れる CNN を拡張することで提案する.プロキシログを解析する際,ログには必ず良性サイトの URL が混在するため,文章などの系列データと同様に CNN を適用すると,良性 URL も含んだ系列の特徴を学習する可能性が高い.そこで,提案する Event De-noising CNN (EDCNN) では,一定範囲内に出現する 2 つの URL を畳み込むことで悪性な URL 同士を確実に畳み込む.インターネット上のサイトへアクセスした結果を用いて,提案手法の有効性を評価している.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"818","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"811","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:45:33.000511+00:00","id":175818,"links":{}}