{"id":182551,"updated":"2025-01-20T04:02:03.322808+00:00","links":{},"created":"2025-01-19T00:50:08.913351+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00182551","sets":["1164:3925:9071:9205"]},"path":["9205"],"owner":"11","recid":"182551","title":["長期間に渡るインターネットノイズの観測に基づいたサイバー攻撃の初期活動と推定される通信の発信源を分類する手法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-07-07"},"_buckets":{"deposit":"384abead-1363-4ed7-b5fd-310c653aacb8"},"_deposit":{"id":"182551","pid":{"type":"depid","value":"182551","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"長期間に渡るインターネットノイズの観測に基づいたサイバー攻撃の初期活動と推定される通信の発信源を分類する手法の提案","author_link":["397898","397899","397894","397897","397892","397895","397893","397896"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"長期間に渡るインターネットノイズの観測に基づいたサイバー攻撃の初期活動と推定される通信の発信源を分類する手法の提案"},{"subitem_title":"Proposal of a Communication Source Classification Method of the Cyber Attack in the Initial Stage based on a Long Term Internet Noises Observation","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2017-07-07","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NECナショナルセキュリティソリューション事業部サイバーセキュリティ・ファクトリー"},{"subitem_text_value":"NECナショナルセキュリティソリューション事業部サイバーセキュリティ・ファクトリー"},{"subitem_text_value":"NECナショナルセキュリティソリューション事業部サイバーセキュリティ・ファクトリー"},{"subitem_text_value":"NECナショナルセキュリティソリューション事業部サイバーセキュリティ・ファクトリー"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/182551/files/IPSJ-CSEC17078006.pdf","label":"IPSJ-CSEC17078006.pdf"},"date":[{"dateType":"Available","dateValue":"2019-07-07"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC17078006.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f69051b3-2dc6-43b8-b99e-673ea85eb669","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"芦野, 佑樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山根, 匡人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"矢野, 由紀子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"島, 成佳"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuki, Ashino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Yamane","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yukiko, Yano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shigeyoshi, Shima","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"インターネット上には一見すると影響がなく意図の不明なインターネットノイズと呼ばれる通信が存在する.かつて筆者らは,インターネットノイズの分類に基づいた内容を応答することで,高度な技術を有する組織的な活動が存在する可能性を示した.このようなインターネット上での活動がサイバー攻撃の初期段階と仮定すれば,インターネットノイズの分析は攻撃者の活動の推測を可能とし,過去の事例に基づく分析が中心であったサイバーセキュリティにおけるリスク分析の精度向上に期待できる.本論文では,180 日間に渡って観測されたインターネットノイズの調査を通じて,サイバー攻撃の初期段階を捉えることを目的としたインターネットノイズ発信源の分類方法を提案する.併せてインターネットノイズの分析をサイバーセキュリティ対策の検討に活用できる可能性について考察する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"On the Internet, there are packets of unclear intentions which are called the Internet Noises. Authors presented a possibility of an organization activities on the Internet, based on classification communication source and observation of the Internet Noises with reactive sensors. If these activities are the first stage of cyber attack phases, accuracy of cyber risk estimate will be improved by analysis of the Internet Noises. In this paper, in order to analyze the Internet Noises we propose a method for communication source classification of the Internet Noises using observation the Internet Noises data set for 180 days. Also we consider about measures of cyber security using estimation of enemies.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-07-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2017-CSEC-78"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}