{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00194928","sets":["1164:6389:9696:9719"]},"path":["9719"],"owner":"44499","recid":"194928","title":["産業用ネットワークの可視化を目的とした通信周期分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-02-28"},"_buckets":{"deposit":"a3608ec8-1d7e-4d7b-9a6e-9a6656c0ca13"},"_deposit":{"id":"194928","pid":{"type":"depid","value":"194928","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"産業用ネットワークの可視化を目的とした通信周期分析","author_link":["462734","462731","462727","462732","462736","462728","462733","462730","462729","462735"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"産業用ネットワークの可視化を目的とした通信周期分析"},{"subitem_title":"Period Analysis for Visualization of Industrial Network","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"},{"subitem_text_value":"NTTセキュアプラットフォーム研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Secure Platform Laboratories","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/194928/files/IPSJ-SPT19032002.pdf","label":"IPSJ-SPT19032002.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT19032002.pdf","filesize":[{"value":"519.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"566a5d3a-3f8d-4b22-b864-8e870f811d64","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"長山, 弘樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"胡, 博"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"神谷, 和憲"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"加島, 伸悟"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"谷川, 真樹"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Nagayama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Bo, Hu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazunori, Kamiya","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shingo, Kashima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaki, Tanikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"産業用ネットワークの通信には強い周期性が存在することから,通信周期を可視化し,正常な周期から逸脱した振る舞いを検知することは機器設定変更やマルウェア通信の特定に有効である.しかし,フーリエ変換や自己相関関数を利用した既存の産業用ネットワークの周期分析手法では,様々な用途のセンサに起因する複数通信周期の混在,集約されたセンサ情報を送信する際に生じるパケットジッタの影響により周期推定精度が低下しうる.そこで本研究では,レーダーパルス測定分野で用いられているパルス列周期の推定手法を改良し,ノイズやジッタの影響を抑制しつつ,複数の周期が混在する場合にも通信周期を抽出可能な手法を提案する.評価実験では,既存のパルス列周期推定手法との比較評価を行うことで,より高い精度かつ短時間で産業用ネットワークの通信周期を抽出できることを示した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Since communications of the industrial network have strong periodicity, profiling the period of communications between different devices and detecting period shifts is effective for specifying device reconfigurations or malware communication. However, the Fourier transform and the autocorrelation function which have been widely used in the period analysis of the network have difficulty in extracting the period from the time series data represented by pulse signals, such as existence of communication at each time. Moreover, due to diversified sensors designed for different purposes and the best-effort nature of IP networks, mixed periods and packet jitters become a challenge in periodicity analysis. In this research, we propose a method to auto matically extract communication period of industrial networks by leveraging a period estimation method used for radar pulse measurement. We also propose a method to suppress the effects of noise and jitters. Through experimental results, we demonstrated that the proposal can extract the communication period with higher accuracy and with shorter processing time than the conventional method.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2019-SPT-32"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":194928,"updated":"2025-01-19T23:17:05.087819+00:00","links":{},"created":"2025-01-19T00:59:57.054843+00:00"}