{"created":"2025-01-19T00:45:33.645525+00:00","updated":"2025-01-20T06:05:33.944810+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175830","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175830","title":["大規模ライブネット観測データを用いたマルウェアの時系列解析に関して"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"22b7ff3a-2657-49c1-ab9c-4348b0ddd8fc"},"_deposit":{"id":"175830","pid":{"type":"depid","value":"175830","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"大規模ライブネット観測データを用いたマルウェアの時系列解析に関して","author_link":["368113","368105","368106","368107","368109","368112","368111","368108","368110","368114"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"大規模ライブネット観測データを用いたマルウェアの時系列解析に関して"},{"subitem_title":"Time Series Analysis of Malware Using Large-Scale Live Network Data","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MWS,時系列解析,相関解析,マルウェア","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"キヤノンITソリューションズ株式会社"},{"subitem_text_value":"キヤノンITソリューションズ株式会社"},{"subitem_text_value":"キヤノンITソリューションズ株式会社"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Canon IT Solutions Inc.","subitem_text_language":"en"},{"subitem_text_value":"Canon IT Solutions Inc.","subitem_text_language":"en"},{"subitem_text_value":"Canon IT Solutions Inc.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175830/files/IPSJCSS2016130.pdf","label":"IPSJCSS2016130.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016130.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"963f23e5-3a33-4683-ae13-91bdfade0296","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"村井, 健祥"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"池上, 雅人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"長谷川, 智久"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"石川, 堤一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kensho, Murai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Ikegami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomohisa, Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Teiichi, Ishikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"銀行における不正送金や個人情報漏えい等,不正アクセスの被害にはマルウェアが大きく関与している.数年前に流行したマルウェアが再度利用されたりその亜種が流行することが多く,異種マルウェアにおいても,部分的に同じソースコードを利用することも多く,発生過程や発生状況も似通ることも少なくない.本稿ではマルウェアの時系列相関に関して考察を与え,亜種のマルウェアだけでなく異種のマルウェアでもその発生に関して相関があることを示す.実際に日本国内で発生した互いに相関のあるマルウェアを与え,また世界各国で発生するマルウェアに対して発生傾向の似通った国々のグループについて考察する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Malware is evolving day-to-day, but new malware can not be said to the center of the epidemic.Created a few years ago, prevalent malware is available again or its variants are often prevalent.Because it is also often utilize partially the same source code, generating process and generating situation may be similar.This paper provides a discussion about the time series correlation of malware is also shows that there is a correlation to occur in malware heterogeneous not only the malware of subspecies.These results are to provide a key indicator in performing the malware of occurrence prediction.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"900","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"896","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":175830,"links":{}}