{"id":2003100,"created":"2025-07-07T02:01:25.752727+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02003100","sets":["934:10195:11872:1749773596908"]},"path":["1749773596908"],"owner":"80578","recid":"2003100","title":["静的解析によるネットワーク構成モデルの自動検証手法の提案"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-07-15"},"_buckets":{"deposit":"9bdc0137-5c05-419b-97f7-322ae49792de"},"_deposit":{"id":"2003100","pid":{"type":"depid","value":"2003100","revision_id":0},"owners":[80578],"status":"published","created_by":80578},"item_title":"静的解析によるネットワーク構成モデルの自動検証手法の提案","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"静的解析によるネットワーク構成モデルの自動検証手法の提案","subitem_title_language":"ja"},{"subitem_title":"Proposal of an Automatic Verification Method for Network Configuration Model by Static Analysis","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集号投稿論文] ネットワーク構成モデル, 静的解析, 自動検証","subitem_subject_scheme":"Other"}]},"item_type_id":"3","publish_date":"2025-07-15","item_3_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"信州大学"},{"subitem_text_value":"国立情報学研究所"},{"subitem_text_value":"信州大学"},{"subitem_text_value":"日本工業大学"},{"subitem_text_value":"ものつくり大学"},{"subitem_text_value":"信州大学"}]},"item_3_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Shinshu University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Informatics","subitem_text_language":"en"},{"subitem_text_value":"Shinshu University","subitem_text_language":"en"},{"subitem_text_value":"Nippon Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Institute of Technologists","subitem_text_language":"en"},{"subitem_text_value":"Shinshu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2003100/files/IPSJ-TDP0603005.pdf","label":"IPSJ-TDP0603005.pdf"},"date":[{"dateType":"Available","dateValue":"2027-07-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-TDP0603005.pdf","filesize":[{"value":"3.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"d3777099-214d-48be-a523-1de074d2bdfd","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Information Processing Society of Japan"}]},"item_3_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"藤田,智哉"}]},{"creatorNames":[{"creatorName":"鈴木,彦文"}]},{"creatorNames":[{"creatorName":"小形,真平"}]},{"creatorNames":[{"creatorName":"橋浦,弘明"}]},{"creatorNames":[{"creatorName":"永井,孝"}]},{"creatorNames":[{"creatorName":"岡野,浩三"}]}]},"item_3_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomoya Fujita","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Hikofumi Suzuki","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Shinpei Ogata","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Hiroaki Hashiura","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Takashi Nagai","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Kozo Okano","creatorNameLang":"en"}]}]},"item_3_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12894091","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_3_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2435-6484","subitem_source_identifier_type":"ISSN"}]},"item_3_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ネットワークの設計段階において,設計者は通常,ネットワークの妥当性を机上で判断する.しかし,ネットワークプロトコルに基づく機器間の相互作用は複雑であり,判断が困難なことがある.一方,実機による試験を行う場合でも機器の調達や準備に費用や手間がかかる.しかし従来手法では,ポリシ違反の原因となる設定値の指摘や,構文的不完全な機器設定ファイルに対する検証ができない問題がある.そこで本稿では,ネットワーク構成を表すモデル(ネットワーク構成モデル)に対し,その一貫性を静的解析により自動検証する手法を提案する.提案手法では,ポリシ違反の検出のためにネットワーク構成モデルに基づいた検証を行い,ポリシ違反の原因となる設定値を指摘する.さらに設計者が各ネットワーク機器の設定内容を確認しやすいように,設計者がみなれているであろう実機の出力を模倣した形式にモデルを変換する.評価実験として,広域型キャンパスである信州大学のネットワーク構成を適用事例とし,設定誤りを加え,提案手法を適用した.さらに,実機と等価な機器の状態を出力できるかどうかを評価した.","subitem_description_type":"Other"}]},"item_3_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In the network design phase, designers typically assess the validity of the network configuration on paper. However, the interactions between devices based on network protocols can be complex, making this assessment challenging. Meanwhile, testing with actual devices incurs significant costs and effort for procurement and preparation. Traditional methods, however, have limitations in identifying configuration values that cause policy violations and verifying syntactically incomplete device configuration files. In this paper, we propose a method to automatically verify the consistency of a model representing the network configuration (Network Configuration Model) by static analysis. The proposed method performs verification based on the network configuration model to detect policy violations and points out configuration values that cause these violations. Additionally, to facilitate the designers' review of each network device's configuration, the model is converted into a format that mimics the output of real devices, which designers are likely familiar with. As a case study, we applied the proposed method to the network configuration of Shinshu University, a large-scale campus network, by intentionally introducing configuration errors and applying the method. We further evaluated whether it could output device states equivalent to those of actual devices.","subitem_description_type":"Other"}]},"item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"55","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌デジタルプラクティス(TDP)"}],"bibliographicPageStart":"42","bibliographicIssueDates":{"bibliographicIssueDate":"2025-07-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"6"}]},"relation_version_is_last":true,"weko_creator_id":"80578"},"updated":"2025-10-07T01:03:37.261069+00:00","links":{}}