{"updated":"2025-01-20T00:02:56.745684+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00192673","sets":["6164:6165:6244:9615"]},"path":["9615"],"owner":"44499","recid":"192673","title":["ネットワークセキュリティ機器の評価環境構築"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-11-29"},"_buckets":{"deposit":"8f6c7c00-bff1-4d52-9156-898b9330dd3d"},"_deposit":{"id":"192673","pid":{"type":"depid","value":"192673","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ネットワークセキュリティ機器の評価環境構築","author_link":["450271","450272","450278","450275","450274","450273","450276","450277"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ネットワークセキュリティ機器の評価環境構築"},{"subitem_title":"Construction of evaluation environment for network security products","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティトラフィック","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2018-11-29","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州工業大学情報科学センター情報基盤運用室"},{"subitem_text_value":"九州工業大学情報科学センター情報基盤運用室"},{"subitem_text_value":"九州工業大学情報科学センター情報基盤運用室"},{"subitem_text_value":"九州工業大学飯塚キャンパス技術部情報基盤運用室"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyushu Institute of Technology, Information Science Center Information Infrastructure Office","subitem_text_language":"en"},{"subitem_text_value":"Kyushu Institute of Technology, Information Science Center Information Infrastructure Office","subitem_text_language":"en"},{"subitem_text_value":"Kyushu Institute of Technology, Information Science Center Information Infrastructure Office","subitem_text_language":"en"},{"subitem_text_value":"Kyushu Institute of Technology, Iizuka Campus Technical Support Office Information Infrastructure Office","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/192673/files/IPSJ-IOTS2018017.pdf","label":"IPSJ-IOTS2018017.pdf"},"date":[{"dateType":"Available","dateValue":"2020-11-29"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOTS2018017.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"82ff01c0-c3bb-47ac-a06e-46b16f578ee9","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中村, 豊"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐藤, 彰洋"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"福田, 豊"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"和田, 数字郎"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yutaka, Nakamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akihiro, Satoh","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yutaka, Fukuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sujiro, Wada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"これまでのネットワークセキュリティ機器の評価は,実際の環境からミラートラヒックを取得して機能を評価する,もしくはエミュレータを用いて評価するのどちらかであった.実際の環境での評価の場合は,同時期に複数の機器を評価することが難しいため,公平な視点での評価が難しい,という問題点がある.また,エミュレータを用いた評価では公平な基準で評価することはできるが,実際の環境と異なるため,運用に入った際に挙動が異なるという問題点が考えられる.この様な問題点を解決するために本論文では,過去に蓄積したパケットキャプチャを再現することで,同一の条件で複数のネットワークセキュリティ機器を評価できる環境を構築した.さらに複数のメーカのセキュリティ機器をパケット再現装置に適用しメーカ毎の違いを確認した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"To evaluate the network security products so far, we perform either evaluation of the function by obtaining mirror traffic from the actual environment, or evaluation using the emulator. In the case of evaluation in an actual environment, it is difficult to evaluate multiple devices at the same time, and therefore it is difficult to evaluate fair them. In the evaluation using the emulator, there is a problem it is different from the actual environment. In order to solve such a problem, in this paper we propose to replay the packet capture stored in the past, thereby constructing an environment that can evaluate multiple network security products under the same conditions. Furthermore, we applied security products of multiple manufacturers to packet replay device and confirmed the difference between manufacturers.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"76","bibliographic_titles":[{"bibliographic_title":"インターネットと運用技術シンポジウム論文集"}],"bibliographicPageStart":"70","bibliographicIssueDates":{"bibliographicIssueDate":"2018-11-29","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2018"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T00:58:22.184619+00:00","id":192673,"links":{}}