{"created":"2025-01-19T01:13:08.161006+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00212118","sets":["1164:6389:10492:10642"]},"path":["10642"],"owner":"44499","recid":"212118","title":["SVMを用いた制御システムに対する偽装命令攻撃の検知"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-07-12"},"_buckets":{"deposit":"e1398d56-a1aa-40e2-a4f5-b682184be715"},"_deposit":{"id":"212118","pid":{"type":"depid","value":"212118","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"SVMを用いた制御システムに対する偽装命令攻撃の検知","author_link":["540397","540398","540400","540399","540402","540401"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SVMを用いた制御システムに対する偽装命令攻撃の検知"},{"subitem_title":"Fake Command Attack Detection of Industrial Control System with SVM","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ISEC","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-07-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京工科大学大学院バイオ・情報メディア研究科コンピュータサイエンス専攻"},{"subitem_text_value":"東京工科大学コンピュータサイエンス学部"},{"subitem_text_value":"信州大学学術研究院(工学系)"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokyo University of Technology Graduate School","subitem_text_language":"en"},{"subitem_text_value":"Tokyo University of Technology","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Engineering, Shinshu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/212118/files/IPSJ-SPT21043006.pdf","label":"IPSJ-SPT21043006.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT21043006.pdf","filesize":[{"value":"1.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"85db8454-97e4-46ca-8f10-0069a88a0ee0","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"原田, 雄基"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"布田, 裕一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岡崎, 裕之"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuki, Harada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuichi, Futa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroyuki, Okazaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"工場などで利用される制御システムは,従来はクローズドな環境で運用されてきた.そのため,セキュリティ上の脅威に対してあまり考慮されていなかった.しかし,近年では汎用製品,TCP/IP 通信プロトコルなどが導入されてきており, それらの技術に対する攻撃が制御システムにおいても発生するリスクが高まっている.また,工場の機能に影響を与えないセキュリティ対策として攻撃検知技術が必要となってきている.工場ネットワークに対する攻撃には,制御システム特有の攻撃として制御ネットワークおける偽装命令による攻撃がある.さらに,IT ネットワークでも起こる攻撃としてマルウェアに感染することで bot とする攻撃や不正なファイルの操作が行われる攻撃などがある.複数の種類の攻撃が想定されるため,1 つの方法での検知は難しいと考えられる.本研究では,制御系通信で行われる攻撃である偽装命令に対して,One Class SVM の効果を高めるために複数のフィルタを用いた検知を行う.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, industrial control systems (ICS) are introduced TCP/IP protocol and connect internet via office network. Security threats to ICS are increasing. Malicious attacks against ICS have many types. It is difficult to detect multiple attacks using a detection method for single attacks. Therefore, it is necessary to combine multiple detection methods. In this paper, we focus a fake command in control network that is one of the malicious attack against factory network. We use attack detection methods using One Class SVM. We introduce TCP port replacements and multiple filters to improve the effect of One Class SVM.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-07-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2021-SPT-43"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":212118,"updated":"2025-01-19T17:35:54.139290+00:00","links":{}}