{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201493","sets":["6164:6165:6462:10022"]},"path":["10022"],"owner":"44499","recid":"201493","title":["ダークネットトラフィックの分析に基づく継続的な広域ネットワークスキャンの調査"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-10-14"},"_buckets":{"deposit":"4986c6ef-72e7-474a-b65f-c9298930f568"},"_deposit":{"id":"201493","pid":{"type":"depid","value":"201493","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ダークネットトラフィックの分析に基づく継続的な広域ネットワークスキャンの調査","author_link":["493010","493012","493005","493013","493016","493008","493015","493014","493006","493009","493007","493004","493011","493003"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ダークネットトラフィックの分析に基づく継続的な広域ネットワークスキャンの調査"},{"subitem_title":"An Investigation of Constant Internet-Wide Scanning through Analysis of Darknet Traffic","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ダークネット,トラフィック分析,ポートスキャン,広域ネットワークスキャン","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2019-10-14","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報通信研究機構 サイバーセキュリティ研究所/横浜国立大学大学院 環境情報学府"},{"subitem_text_value":"情報通信研究機構 サイバーセキュリティ研究所"},{"subitem_text_value":"株式会社クルウィット"},{"subitem_text_value":"情報通信研究機構 サイバーセキュリティ研究所"},{"subitem_text_value":"横浜国立大学 先端科学高等研究院"},{"subitem_text_value":"情報通信研究機構 サイバーセキュリティ研究所/横浜国立大学 先端科学高等研究院/横浜国立大学大学院 環境情報研究院"},{"subitem_text_value":"情報通信研究機構 サイバーセキュリティ研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology / Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"clwit Inc.","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology / Institute of Advanced Sciences, Yokohama National University / Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201493/files/IPSJCSS2019200.pdf","label":"IPSJCSS2019200.pdf"},"date":[{"dateType":"Available","dateValue":"2021-10-14"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2019200.pdf","filesize":[{"value":"497.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"19a8bd15-4de9-494f-b384-73fc96cfbd9c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中川, 雄太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"韓, 燦洙"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"島村, 隼平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋, 健志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"藤田, 彬"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"井上, 大介"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuta, Nakagawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Chansu, Han","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jumpei, Shimamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Fujita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Inoue","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"インターネット空間を継続的にスキャンする事で,インターネットに接続されている様々な機器の情報を定常的に収集するサービスもしくは組織の存在が知られている(以降,“スキャンシステム”と呼ぶ).いくつかのスキャンシステムはスキャンホストのWebサービスでスキャンの目的や利用しているIPアドレスなどを公開しているが,その詳細はまだわからない部分が多い.さらに,これらの情報を公開しないまま活動するスキャンシステムが存在すると推測され,その実態の解明が急務である.しかしながら,このような非公開のスキャンシステムの実態を把握するのは容易ではない.そこで我々は,ダークネットで観測される通信について送信元IPアドレス帯ごとに分析を行い,非公開のスキャンシステムを含む複数のIPアドレス帯から,様々なポートに対して継続的な広域ネットワークスキャンが行われていることを明らかにした.さらに,これらホスト群のスキャン対象ポートとその時系列変化を分析することによって,送信元IPアドレス帯によってその傾向が異なることを明らかにした.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It is known that some services or organizations have carried on constant Internet-wide scanning to collect information about various devices connected to the Internet. Some of them publicize their activities and objectives of the scan at web services on the scan hosts. However, their details are undisclosed. In this study, we found that multiple hosts actually perform constant Internet-wide scanning through analyzing the darknet traffic from a statistical point of view. Furthermore, we also revealed their scanning patterns are different for each, based on an analysis of scan target ports and transitions of the port.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1428","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2019論文集"}],"bibliographicPageStart":"1422","bibliographicIssueDates":{"bibliographicIssueDate":"2019-10-14","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2019"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":201493,"updated":"2025-01-19T21:00:29.372655+00:00","links":{},"created":"2025-01-19T01:04:45.384236+00:00"}