{"id":187229,"updated":"2025-01-20T02:23:10.298429+00:00","links":{},"created":"2025-01-19T00:53:55.039138+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00187229","sets":["6164:6165:6462:9463"]},"path":["9463"],"owner":"11","recid":"187229","title":["ソースコードの類似度に基づく悪性JavaScriptの分類に関する一検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-16"},"_buckets":{"deposit":"8cab76e6-9886-4799-93b4-0c7180f74b5b"},"_deposit":{"id":"187229","pid":{"type":"depid","value":"187229","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"ソースコードの類似度に基づく悪性JavaScriptの分類に関する一検討","author_link":["422747","422750","422752","422748","422749","422751","422746","422745"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ソースコードの類似度に基づく悪性JavaScriptの分類に関する一検討"},{"subitem_title":"A Study on Classification of Malicious JavaScript Based on Source Code Similarity","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MWS,悪性JavaScript,ドライブ・バイ・ダウンロード攻撃,ニューラルネットワーク,Paragraph Vector","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2017-10-16","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"株式会社セキュアブレイン"},{"subitem_text_value":"株式会社セキュアブレイン"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/187229/files/IPSJCSS2017054.pdf","label":"IPSJCSS2017054.pdf"},"date":[{"dateType":"Available","dateValue":"2019-10-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2017054.pdf","filesize":[{"value":"1.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5f5aa9c5-ad8d-441e-bd6d-5edb061a0dad","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"三須, 剛史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"巻島, 和雄"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岡田, 晃市郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岩本, 一樹"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takeshi, Misu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuo, Makishima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kouichirou, Okada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ドライブ・バイ・ダウンロード(DbD)攻撃による被害が今もなお報告されている.DbD攻撃は,悪性JavaScriptを介して行われるものが数多くあり,これを1つ1つ分析するのは困難である.そこで本研究では,Paragraph Vectorを悪性JavaScriptに適用し,類似度に基づきクラスタリングを行い,結果を可視化する手法について検討した.類似度の高い悪性JavaScriptは同じクラスターに分類されるため,分析を行う上での足がかりとなることが期待される.実験の結果,同じクラスターの中では,その属性に一定の傾向があることを明らかにした.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The damage of Drive-by Download(DbD) Attacks is still reported. DbD Attacks is often done via malicious JavaScript.And because being large amount of malicious JavaScript, it is difficult to analyse them by hand. In this research, we propose new method which adapt Paragraph Vector to malicious JavaScript, gain feature vector and make clustering based on vector similarity. For similar source code is classified in same cluster,effective analyze expected. The experimental result revealed that clustering based on vector similarity reflect some feature in JavaScript source code.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2017論文集"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2017-10-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2017"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}