{"id":186554,"updated":"2025-01-20T02:33:39.490285+00:00","links":{},"created":"2025-01-19T00:53:30.040496+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00186554","sets":["1164:6389:9385:9386"]},"path":["9386"],"owner":"11","recid":"186554","title":["ハニーポットにより観測されるDRDoS攻撃の被害組織に関する分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-02-28"},"_buckets":{"deposit":"98cb5c68-7c71-424f-ad54-49429a0407be"},"_deposit":{"id":"186554","pid":{"type":"depid","value":"186554","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"ハニーポットにより観測されるDRDoS攻撃の被害組織に関する分析","author_link":["418830","418838","418835","418837","418839","418836","418840","418829","418831","418833","418834","418832"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ハニーポットにより観測されるDRDoS攻撃の被害組織に関する分析"},{"subitem_title":"Analyzing Victims of DRDoS Attacks Observed by Honeypots","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Network Security","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"NTTコミユニケーシヨンズ"},{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/先端科学高等研究院"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/先端科学高等研究院"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"NTT Communications","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Envirorunent and Information Sciences, Yokohama National University / Institute of Advanced Sciences,","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Envirorunent and Information Sciences, Yokohama National University / Institute of Advanced Sciences,","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/186554/files/IPSJ-SPT18027036.pdf","label":"IPSJ-SPT18027036.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT18027036.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"06675915-9cbd-49ca-8585-23b04671ff4b","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"渡部, 和也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西添, 友美"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"牧田, 大佑"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森, 博志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松本, 勉"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuya, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomomi, Nishizoe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Makita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsutomu, Matsumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,分散反射型サービス妨害攻撃 (Distributed Reflection Denial-of-Service Attack ; DRDoS 攻撃) と呼ばれる攻撃が増加している.我々は DRDoS ハニーポットと呼ばれる囮 (おとり) のシステムを用いて,DRDoS 攻撃の観測を行っている.しかし,DRDoS ハニーポットから得られる情報だけではどのような組織が標的となっているか明らかにすることは困難である.そこで本稿では,まず DNS の正引き情報データベースを利用して,DRDoS ハニーポットで観測された日本宛の攻撃を分析した.その結果,攻撃発生時にドメイン名が紐付いていた被害者の IP アドレスの割合は,攻撃対象となった全 IP アドレスの約 26% であることを確認した.また,判明したドメイン名を元に被害組織をカテゴリ分けしその傾向を分析した結果を具体例とともに報告する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years. Distributed Reflection Denial-of-Service (DRDoS) attacks are increasing. We have observed DRDoS attacks using a decoy system called DRDoS honeypot. However, it is difficult to identify what kind of organizations are targeted with the information obtained from DRDoS honeypot. Therefore, in this paper, we first analyze the victim IP addresses of attacks against Japan observed by DRDoS honeypots using a passive DNS database. As a result, we confirm that 26 % of all victim IP addresses are associated with domain names. We also categorize target organizations based on the domain names and analyze the trends and report the results along with concrete examples. ","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"36","bibliographicVolumeNumber":"2018-SPT-27"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}