{"updated":"2025-01-19T20:15:55.372512+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00204279","sets":["581:10023:10026"]},"path":["10026"],"owner":"44499","recid":"204279","title":["特定のIoT機器のWebUIを狙ったサイバー攻撃の分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-03-15"},"_buckets":{"deposit":"d33af517-4717-4dae-9291-9c4d4cfef623"},"_deposit":{"id":"204279","pid":{"type":"depid","value":"204279","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"特定のIoT機器のWebUIを狙ったサイバー攻撃の分析","author_link":["505628","505625","505624","505623","505621","505622","505626","505631","505627","505629","505630","505620","505619","505632"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"特定のIoT機器のWebUIを狙ったサイバー攻撃の分析"},{"subitem_title":"An Analysis of Cyber Attacks Targeting WebUI of Specific IoT Devices","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:IoT活用のためのインターネットと運用技術] ","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2020-03-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"横浜国立大学先端科学高等研究院"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学先端科学高等研究院/横浜国立大学大学院環境情報研究院"},{"subitem_text_value":"横浜国立大学先端科学高等研究院/横浜国立大学大学院環境情報研究院"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University / Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Institute of Advanced Sciences, Yokohama National University / Graduate School of Environment and Information Sciences, Yokohama National University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/204279/files/IPSJ-JNL6103023.pdf","label":"IPSJ-JNL6103023.pdf"},"date":[{"dateType":"Available","dateValue":"2022-03-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6103023.pdf","filesize":[{"value":"1.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"4ea9e993-19ac-4529-bc69-86fd1b91bb7d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"藤田, 彬"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"江澤, 優太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田宮, 和樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中山, 颯"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鉄, 頴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松本, 勉"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akira, Fujita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ezawa, Yuta","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuki, Tamiya","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sou, Nakayama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ying, Tie","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsutomu, Matsumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"IoT機器には機器の管理や操作のためのWebUIを持ちインターネットに接続可能な機器が多数存在する.それらの機器のなかには,脆弱性や認証の問題を抱えたままインターネット上に公開されているものが存在する.本研究ではIoT機器の実機を用いることでハニーポットを構築し,WebUIに対する攻撃の観測を行う.観測結果にはWebサイト公開用の通常のWebサーバに対する攻撃も観測されるため,観測対象機器向けの攻撃を判別する指標を示す.次に,自動化されている攻撃の特徴を示し,IoT機器向けの攻撃を分析する手法を提案する.提案手法をもとに検証実験を行い,特定のIoT機器向けの攻撃が自動化されている実態を示す.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"There are many IoT devices that have WebUI for device management and operation. Some of them are open to the Internet with vulnerability and weak credentials. In this paper, we propose a honeypot to monitor attacks against these WebUIs by using bare-metal devices. The observation results contain attacks against regular Web servers, so we show how to identify attacks targeting particular device. Next, we show some of the attacks are automatically conducted by using some tools or malware. Our observation and analysis shows that attacks on WebUI of IoT devices are widely conducted with a certain degree of automation.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"706","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"695","bibliographicIssueDates":{"bibliographicIssueDate":"2020-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"61"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:06:34.267379+00:00","id":204279,"links":{}}