{"id":209510,"updated":"2025-01-19T18:29:52.471735+00:00","links":{},"created":"2025-01-19T01:10:48.947137+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00209510","sets":["1164:4088:10494:10495"]},"path":["10495"],"owner":"44499","recid":"209510","title":["Webページの類似性を利用したTorにおける複数セッションに対するフィンガープリンティング攻撃"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-02-22"},"_buckets":{"deposit":"490e6328-42f3-442c-b961-b7b79c88ec51"},"_deposit":{"id":"209510","pid":{"type":"depid","value":"209510","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Webページの類似性を利用したTorにおける複数セッションに対するフィンガープリンティング攻撃","author_link":["528157","528154","528155","528156"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Webページの類似性を利用したTorにおける複数セッションに対するフィンガープリンティング攻撃"},{"subitem_title":"Fingerprinting Attack for plural Webpages accesses on Tor by using similarity of Webpages","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IOT","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-02-22","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"埼玉大学大学院理工学研究科数理電子情報部門情報領域"},{"subitem_text_value":"埼玉大学大学院理工学研究科数理電子情報部門情報領域"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Information and Computer Sciences, Saitama University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Computer Sciences, Saitama University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/209510/files/IPSJ-IOT21052015.pdf","label":"IPSJ-IOT21052015.pdf"},"date":[{"dateType":"Available","dateValue":"2023-02-22"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT21052015.pdf","filesize":[{"value":"924.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"484e759a-6e9e-4df6-8373-ef8410d2af23","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"滕, 文杰"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉浦, 紀晃"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Wenjie, Teng","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Noriaki, Yoshiura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"匿名化通信を可能にする Tor では,パケットから通信を行っている実際の IP アドレスが分からない.よって,Tor を用いて Web サイトヘアクセスしているとき,アクセス先の Web サイトは不明である.一方,Tor に対して,どの Web サイトへアクセスしたかを特定する手法としてフィンガープリンティング攻撃がある.フィンガープリンティング攻撃の多くは,Web サイトへの 1 つのアクセスを攻撃対象としており,同時に複数の Web サイトへアクセスしている場合に,これらの Web サイトを特定することを想定していない.複数の Web サイトへアクセスの特定する手法も研究されているが,特定の精度は低い.本研究では,同時にアクセスする Web サイトの類似度が高いという前提の下で,特定の精度に影響があるかを分析する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Tor is a low-latency anonymity network. Tor will hide IP address when communicating so that the destination server will not be discovered. On the other hand, Website Fingerprinting attack that pose security threats to the Tor network. In the past, the attack method was aimed at the situation where the user only visited one website. When visiting multiple websites at the same time, then Website Fingerprinting Unable to Decision the website succesfuly. In this paper, we try to find the factors that affect accuracy while user visiting multiple websites at the same time.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-02-22","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"15","bibliographicVolumeNumber":"2021-IOT-52"}]},"relation_version_is_last":true,"weko_creator_id":"44499"}}