{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175876","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175876","title":["リンク構造を用いた悪性Webサイトの検知法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"3f3c624a-5180-468c-810d-23d89a7f502e"},"_deposit":{"id":"175876","pid":{"type":"depid","value":"175876","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"リンク構造を用いた悪性Webサイトの検知法","author_link":["368426","368427","368437","368438","368434","368433","368429","368431","368439","368430","368428","368435","368440","368432","368425","368436"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"リンク構造を用いた悪性Webサイトの検知法"},{"subitem_title":"A Malicious Web Site Detection Technique Using Link Structure","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MWS","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"PwCサイバーサービス合同会社"},{"subitem_text_value":"岐阜大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"PwCサイバーサービス合同会社"},{"subitem_text_value":"神戸大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"PwC Cyber Services LLC","subitem_text_language":"en"},{"subitem_text_value":"Gifu University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"PwC Cyber Services LLC","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175876/files/IPSJCSS2016176.pdf","label":"IPSJCSS2016176.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016176.pdf","filesize":[{"value":"617.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"bcbc0185-a743-4c3c-ac73-091653ef02ab","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"伊藤, 大貴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"永井, 達也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高野, 泰洋"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"神薗, 雅紀"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"毛利, 公美"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"白石, 善明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"星澤, 裕二"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Daiki, Ito","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Nagai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasuhiro, Takano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaki, Kamizono","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masami, Mohri","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshiaki, Shiraishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuji, Hoshizawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Web サイトの閲覧によるマルウェア感染が多発しており,悪性 Web サイトの脅威が深刻化している.攻撃者は頻繁に Web サイトを更新し,未知の悪性 Web サイトを新たに生成しうる.従って,被害を未然に防ぐことは容易ではない.本研究では悪性 Web サイトのリンク構造には互いに類似性があると想定し,リンク構造を用いた悪性 Web サイト検知法について検討する.提案手法では,ニューラルネットワークを用いた教師付き学習によって悪性 Web サイトを検知する.Web クローラーを用いて収集した実際のリンク構造データにより,提案手法の有効性を確認した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Threat of malicious websites has become a serious security problem since browsing the malicious websites causes malware infection epidemically. Attackers frequently updates their website and can generate unknown malicious websites newly. It is, therefore, difficult to prevent from the infection. By assuming that there exists affinity between the link structures of malicious websites, this paper proposes a new technique to detect malicious websites using the link structure. The proposed method can detect unknown malicious websites by a supervised learning using the neural network. The experiment shown in this paper verifies the effectiveness of the proposed method for real link structure data obtained by our web crawling in July 2016.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1233","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"1229","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":175876,"updated":"2025-01-20T06:07:02.751290+00:00","links":{},"created":"2025-01-19T00:45:36.201256+00:00"}