{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00204262","sets":["581:10023:10026"]},"path":["10026"],"owner":"44499","recid":"204262","title":["実攻撃の観測と疑似攻撃の試行に基づくホームネットワークセキュリティの検証"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-03-15"},"_buckets":{"deposit":"a7589fde-aeb2-470d-8020-f86b451eaf47"},"_deposit":{"id":"204262","pid":{"type":"depid","value":"204262","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"実攻撃の観測と疑似攻撃の試行に基づくホームネットワークセキュリティの検証","author_link":["505478","505483","505496","505480","505479","505493","505492","505476","505490","505489","505477","505486","505495","505487","505481","505491","505497","505485","505482","505494","505484","505488"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"実攻撃の観測と疑似攻撃の試行に基づくホームネットワークセキュリティの検証"},{"subitem_title":"Examination of Home Network Security Considering Real and Proof-of-concept Attacks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:若手研究者] ホームネットワーク,IoT,テストベッド","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2020-03-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"横浜国立大学先端科学高等研究院"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学先端科学高等研究院/横浜国立大学大学院環境情報研究院"},{"subitem_text_value":"横浜国立大学先端科学高等研究院/横浜国立大学大学院環境情報研究院"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University / Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University / Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/204262/files/IPSJ-JNL6103006.pdf","label":"IPSJ-JNL6103006.pdf"},"date":[{"dateType":"Available","dateValue":"2022-03-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6103006.pdf","filesize":[{"value":"929.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"bcda4fd4-4e30-4382-b390-9d2aa8817191","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"藤田, 彬"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"楊, 志勇"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"熊, 佳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鉄, 頴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"楊, 笛"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"江澤, 優太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中山, 颯"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田宮, 和樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西田, 慎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松本, 勉"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akira, Fujita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Zhiyong, Yang","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jia, Xiong","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ying, Tie","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Di, Yang","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuta, Ezawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sou, Nakayama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuki, Tamiya","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shin, Nishida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsutomu, Matsumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,ホームネットワーク内のIoT機器を狙ったサイバー攻撃の脅威が顕在化している.本研究では,一般消費者の家庭のネットワーク環境を模擬したテストベッドを構築し,サイバー攻撃の観測および当該攻撃がホームネットワークに及ぼす影響の分析を行う.多くの家庭で一般的に使用されていることが見込まれるIoT機器複数台とWi-Fiルータを用意し,インターネットに接続されたネットワークを構成する.当該ネットワークの通信トラフィックを観測可能な機器を付設したうえで,疑似的に攻撃を発生させる.すでに存在が確認されている攻撃手法にくわえ,今後出現しうる攻撃手法も想定し,それらの攻撃がホームネットワークに与える影響を調査する.また,すでに流通しているホームネットワーク向けのセキュリティ製品がそれらの攻撃を検知できるか検証する.調査の結果,想定した攻撃手法の多くが実際にホームネットワークに影響を与えうることが分かった.また,検証対象としたセキュリティ製品が,本研究で想定した攻撃の大半を検知できず,検知可能な対象がポートスキャン等の一部の攻撃に限られることが分かった.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, the threat of cyber attacks which is targeting IoT devices in a home network reveals. In this research, we aim to monitor the attacks and to analyze how the attacks affect to home networks, by a testbed that simulates the home network environment of a general consumer. We prepared multiple IoT devices and a Wi-Fi router that is expected to be commonly used in many homes, configured a network connected to the Internet, deployed the devices that can observe communication traffic in the network, and generated pseudo attacks. We investigated the impact of attacks that have already been confirmed and also that may emerge in the future. We also verified whether security products for home networks, which is commercially available can detect those attacks or can not. As a result of the investigation, it revealed that most of the assumed attack methods can actually affect the home network. Also, it was found that the security products for home network targeted for verification cannot detect most of the attacks assumed in our research, and the targets that can be detected are limited to some attacks such as port scan.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"580","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"567","bibliographicIssueDates":{"bibliographicIssueDate":"2020-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"61"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:06:33.293026+00:00","updated":"2025-01-19T20:16:20.173742+00:00","id":204262}