{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00216655","sets":["1164:6389:10832:10833"]},"path":["10833"],"owner":"44499","recid":"216655","title":["ブロックチェーン技術を用いたDNSキャッシュポイズニング検知方式の評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-02-28"},"_buckets":{"deposit":"18f70ee6-3509-4e39-8615-28df9fc8f62f"},"_deposit":{"id":"216655","pid":{"type":"depid","value":"216655","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ブロックチェーン技術を用いたDNSキャッシュポイズニング検知方式の評価","author_link":["559566","559562","559563","559569","559564","559567","559565","559568"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ブロックチェーン技術を用いたDNSキャッシュポイズニング検知方式の評価"},{"subitem_title":"Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京工科大学コンピュータサイエンス学部"},{"subitem_text_value":"東京工科大学コンピュータサイエンス学部"},{"subitem_text_value":"信州大学大学院総合理工学研究科"},{"subitem_text_value":"信州大学総合情報センター"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Computer Science, Tokyo University of Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science, Tokyo University of Technology","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Science and Technology, Shinshu University","subitem_text_language":"en"},{"subitem_text_value":"Integrated Intelligence Center, Shinshu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/216655/files/IPSJ-SPT22046012.pdf","label":"IPSJ-SPT22046012.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT22046012.pdf","filesize":[{"value":"2.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"0ca8a296-8790-4ac6-b5f0-dee107934444","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"田中, 健士朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"布田, 裕一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岡崎, 裕之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鈴木, 彦文"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kenshiro, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuichi, Futa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroyuki, Okazaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hikofumi, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"インターネット通信の利用において必要不可欠な DNS への攻撃として,DNS キャッシュポイズニングが存在する.高橋らは,ブロックチェーンの要素技術を用いた DNS キャッシュポイズニング攻撃の検知方式を提案している.その方式の課題として,キャッシュポイズニング攻撃の発生が検知されるまでの流れの詳細な検討, TTL の考慮不足が挙げられる.本稿では,これらの課題を検討するため,合意形成部分に着目し,情報更新や攻撃が発生した場合などを想定し,評価を行った.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detection method of DNS cache poisoning using elemental technologies of blockchain. Issues of the method include detailed consideration of flows of cache poisonings, and introduction of TTL. In this report, we focus on the consensus building part and evaluate the method in the cases of information updating and occurrences of cache poisonings.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"2022-SPT-46"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":216655,"updated":"2025-01-19T15:46:48.261739+00:00","links":{},"created":"2025-01-19T01:17:10.613990+00:00"}