{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00177775","sets":["1164:2836:9030:9070"]},"path":["9070"],"owner":"11","recid":"177775","title":["管理端末に感染したマルウェアによる制御プログラムの改ざん検知について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-02-23"},"_buckets":{"deposit":"881ddc6b-f8e0-474a-aaed-cfc387ba72f1"},"_deposit":{"id":"177775","pid":{"type":"depid","value":"177775","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"管理端末に感染したマルウェアによる制御プログラムの改ざん検知について","author_link":["378367","378364","378368","378366","378363","378365"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"管理端末に感染したマルウェアによる制御プログラムの改ざん検知について"},{"subitem_title":"Detection of control program tampering by a malware infected on a management terminal","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2017-02-23","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"三菱電機株式会社"},{"subitem_text_value":"三菱電機株式会社"},{"subitem_text_value":"三菱電機株式会社"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Mitsubishi Electric","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/177775/files/IPSJ-DPS17170035.pdf","label":"IPSJ-DPS17170035.pdf"},"date":[{"dateType":"Available","dateValue":"2019-02-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPS17170035.pdf","filesize":[{"value":"866.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"9419500c-42cd-4fb7-b90c-8ec3caa78535","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岩崎, 亜衣子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"榊原, 裕之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"河内, 清人"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Aiko, Iwasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroyuki, Sakakibara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kiyoto, Kawauchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10116224","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8906","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,制御システムへのサイバー攻撃が増加し問題となっている.イラン核開発設備に対して行われたサイバー攻撃であるスタックスネットでは,制御プログラムを改ざんすることで制御システムをダウンさせ,稼動停止に陥らせたと言われている.本稿では,マルウェアによる不正な改ざんで,制御プログラムが不正な挙動をするように機能を追加される,または必要な機能が削除されるといった変更が行われると仮定し,管理端末に感染したマルウェアによる更新プログラムの改ざんを,更新プログラムの変更内容の異常度合いに基づき検知する方法について検討を行った.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, cyber attacks on control systems have increased and become a problem. In the Stuxnet which is a cyber attack against the Iran nuclear development facility, it is said that the control system was downed by tampering with the control program and caused the operation to stop. In this paper, we assume that the on a control program mal-functions are added or some functions are deleted or modified to make illegal behaviors by malware, we propose a method of detecting tampering with a control program update based on the degree of abnormality of an update contents.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"5","bibliographic_titles":[{"bibliographic_title":"研究報告マルチメディア通信と分散処理(DPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-02-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"35","bibliographicVolumeNumber":"2017-DPS-170"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-20T05:24:02.356836+00:00","created":"2025-01-19T00:47:12.298671+00:00","links":{},"id":177775}