{"updated":"2025-01-19T18:49:57.670042+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00208513","sets":["6164:6165:6462:10428"]},"path":["10428"],"owner":"44499","recid":"208513","title":["データ欠損を起こしたマルウェアの機械学習による同定"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-10-19"},"_buckets":{"deposit":"7f0e11c9-fccb-48c7-92be-6bc23d0c9f05"},"_deposit":{"id":"208513","pid":{"type":"depid","value":"208513","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"データ欠損を起こしたマルウェアの機械学習による同定","author_link":["523292","523293","523294","523297","523295","523296"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"データ欠損を起こしたマルウェアの機械学習による同定"},{"subitem_title":"Identification of Corrupted Malware Using Machine Learning","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア,データ欠損,フォレンジック,機械学習,マルウェア同定","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2020-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"筑波大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"FUJITSU LABORATORIES LTD.","subitem_text_language":"en"},{"subitem_text_value":"FUJITSU LABORATORIES LTD.","subitem_text_language":"en"},{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/208513/files/IPSJCSS2020085.pdf","label":"IPSJCSS2020085.pdf"},"date":[{"dateType":"Available","dateValue":"2022-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2020085.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"af719e1a-d2ba-440d-aa48-d955c4de65bb","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小久保, 博崇"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"江田, 智尊"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大山, 恵弘"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hirotaka, Kokubo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoru, Koda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshihiro, Oyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"サイバー攻撃の被害状況を特定するにあたって,何のマルウェアが攻撃に使われたかを知ることは重要である.<br>しかし,調査妨害を目的とした自己消去を行うマルウェアも存在する.<br>消去されたファイルはストレージの使用とともに情報が欠損していくため,フォレンジック技術を使用しても完全な形でマルウェアを復元できないこともある.<br>本稿では,このようなデータの欠損を起こしたマルウェア(欠損マルウェア)に着目する.<br>欠損マルウェアをアンチウイルスによって同定することは難しいという実験結果を,過去に著者らは示した.<br>本稿では,欠損マルウェアからマルウェア名をどの程度同定できるかを,機械学習技術を用いて実験した.<br>欠損マルウェアはデータの欠損を起こしており,ヘッダ情報や挙動解析情報などの有用な特徴が得られないため,分類には画像特徴量を使用した.<br>その結果,アンチウイルスによる同定に致命的な悪影響を与えるファイル先頭の欠損があったとしても,欠損前のマルウェア検体を学習に用いれば約97%の精度,欠損前のマルウェア検体と同種の検体を学習に用いれば約48%の精度で,マルウェア名の同定が可能であることがわかった.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In order to know the damage situation of cyber attack, it is important to know what kind of malware was used for the attack.<br>Some malware erases itself to prevent investigation.<br>Erased malware can be recovered by digital forensics technology, but data loss can occur.<br>In this paper, we identify malware names from corrupted malware binary by using machine learning.<br>We use image feature values to perform identification because header information and behavior analysis information cannot be used due to data loss.<br>As a result, it was found that the malware name can be identified with high accuracy even if the malware file head is missing.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"617","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2020論文集"}],"bibliographicPageStart":"610","bibliographicIssueDates":{"bibliographicIssueDate":"2020-10-19","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:09:54.126716+00:00","id":208513,"links":{}}