{"id":192252,"updated":"2025-01-20T00:13:58.138293+00:00","links":{},"created":"2025-01-19T00:58:00.130270+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00192252","sets":["6164:6165:6462:9599"]},"path":["9599"],"owner":"44499","recid":"192252","title":["CANのイベントメッセージに対する侵入検知手法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-10-15"},"_buckets":{"deposit":"c9effe7a-e5ab-444f-9ae2-a1a3e0941e9d"},"_deposit":{"id":"192252","pid":{"type":"depid","value":"192252","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"CANのイベントメッセージに対する侵入検知手法の提案","author_link":["447471","447469","447472","447463","447467","447464","447460","447470","447475","447473","447466","447462","447474","447461","447468","447465"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"CANのイベントメッセージに対する侵入検知手法の提案"},{"subitem_title":"Intrusion Detection for Acyclic Messages in In-Vehicle Network: A Proposal","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"侵入検知,車載ネットワーク,イベントメッセージ,CAN,IDS","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2018-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"住友電気工業株式会社"},{"subitem_text_value":"住友電気工業株式会社"},{"subitem_text_value":"オートネットワーク技術研究所株式会社"},{"subitem_text_value":"オートネットワーク技術研究所株式会社"},{"subitem_text_value":"オートネットワーク技術研究所株式会社"},{"subitem_text_value":"オートネットワーク技術研究所株式会社"},{"subitem_text_value":"住友電気工業株式会社"},{"subitem_text_value":"住友電気工業株式会社"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"SUMITOMO ELECTRIC INDUSTRIES, LTD.","subitem_text_language":"en"},{"subitem_text_value":"SUMITOMO ELECTRIC INDUSTRIES, LTD.","subitem_text_language":"en"},{"subitem_text_value":"Autonetworks Technologies, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Autonetworks Technologies, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Autonetworks Technologies, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Autonetworks Technologies, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"SUMITOMO ELECTRIC INDUSTRIES, LTD.","subitem_text_language":"en"},{"subitem_text_value":"SUMITOMO ELECTRIC INDUSTRIES, LTD.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/192252/files/IPSJCSS2018157.pdf","label":"IPSJCSS2018157.pdf"},"date":[{"dateType":"Available","dateValue":"2020-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2018157.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"20b3877c-74ae-456c-adcc-1935d2962ca5","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"濱田, 芳博"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉田, 圭吾"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"足立, 直樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上口, 翔吾"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上田, 浩史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮下, 之宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"礒山, 芳一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"畑, 洋一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihiro, Hamada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Keigo, Yoshida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoki, Adachi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shyogo, Kamiguchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Ueda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yukihiro, Miyashita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshikazu, Isoyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoichi, Hata","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年の車両は車載制御ネットワークにより接続された 70~100 台の Electronic Control Unit (ECU) により制御されると共に,車両外の様々なサービスとネットワークを介して制御データを共有し利便性を向上させている.一方で車両外から車載ネットワークへ悪意のあるメッセージを注入することでこれらの利便性を阻害するサイバー攻撃が問題視されており,対策が急がれている.侵入検知は監視対象がサイバー攻撃を受けたことを検知する技術であり,本検知結果を基にサイバー攻撃への対策が開始される.監視対象が車載ネットワークの場合,侵入検知アルゴリズムとしては本ネットワークで周期的に送信されるメッセージの周期性の逸脱を検出する方法が知られている.しかし車載ネットワークでは周期的に送信されないイベントメッセージも存在し,車両へのサイバー攻撃の事例ではこの様なメッセージも攻撃対象となる.しかし周期的に送信されるメッセージを監視する侵入検知アルゴリズムでは,イベントメッセージに対して行われた攻撃の検知を行うことができない.そこで本論では,イベントメッセージに対する侵入検知アルゴリズムを提案する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The automotive industry intends to create new services that involve sharing control information of a vehicle via a wide area network. However, some incidents of cyber-attacks to a vehicle show that a connection to outer of a vehicle is abused for cyber-attacks. Therefore, improving security measures of a vehicle are urgent to realize new services. To realize security measures of a vehicle, it is important to detect cyber-attacks at first. And, the intrusion detection system (IDS) is known as a technique of detecting cyber-attacks. For the IDS algorithm of the in-vehicle network, the monitoring communication cycle period of cyclic messages is known as the popular method. On the other hand, there are also acyclic messages in the in-vehicle network, and these messages would be an important target to be success cyber-attacks. However, the IDS algorithm for cyclic messages is difficult to detect cyber-attacks to acyclic messages. Therefore, in this paper, we will propose the IDS algorithm for acyclic messages.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1119","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2018論文集"}],"bibliographicPageStart":"1112","bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2018"}]},"relation_version_is_last":true,"weko_creator_id":"44499"}}