{"updated":"2025-01-19T15:43:55.438893+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00216797","sets":["1164:4088:10830:10831"]},"path":["10831"],"owner":"44499","recid":"216797","title":["DGAベースのマルウェアが生成した不審なDoH通信の検知システムに関する一検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-02-28"},"_buckets":{"deposit":"56454ae6-9e9f-4e58-9d68-92dfca83fa42"},"_deposit":{"id":"216797","pid":{"type":"depid","value":"216797","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"DGAベースのマルウェアが生成した不審なDoH通信の検知システムに関する一検討","author_link":["560342","560345","560343","560344","560346","560341"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"DGAベースのマルウェアが生成した不審なDoH通信の検知システムに関する一検討"},{"subitem_title":"A proposal of detection system for malicious DoH communication generated by DGA-based malware","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IA","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学大学院情報理工学系研究科/北海道大学"},{"subitem_text_value":"東京工業大学"},{"subitem_text_value":"北海道大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"北海道大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Technology, the University of Tokyo /  Hokkaido University","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Hokkaido University","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Hokkaido University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/216797/files/IPSJ-IOT22056041.pdf","label":"IPSJ-IOT22056041.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT22056041.pdf","filesize":[{"value":"2.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"14bbe3d4-cb55-4150-b5e2-833481e7fe0d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"三橋, 力麻"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"金, 勇"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"飯田, 勝吉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"品川, 高廣"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高井, 昌彰"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"A, proposal of detection system for malicious DoH communication generated by DGA-based malware","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"DNS over HTTPS(DoH)プロトコルは,プライバシー保護や改ざん防止などが期待できる一方で,マルウェアによって生成された不審なドメイン名の検知が困難になる問題がある.近年,OS レベルでの DoH サポートが普及しつつあるため,DGA ベースのマルウェアを用いたサイバー攻撃の早期発見が困難になることが予想される.本研究では機械学習技術を用いた分類方法により,Web アクセスなど一般的なHTTPS トラフィックと,DGA ベースのマルウェアが生成した DoH トラフィックを分類するシステムを検討する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The DNS over HTTPS (DoH) protocol can provide privacy-protection and data-tampering for Internet users. However, DoH has a problem that makes it difficult for network administrators to detect malicious domain names generated by malware. Unfortunately, the widespread use of DoH support at the OS level is predicted to make early detection of cyber attacks using DGA-based malware more difficult. In this research, we propose a machine learning based system that filter the DoH traffic from the HTTPS traffic such as web access and then recognize the malicious DoH traffic generated by DGA-based malware.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"41","bibliographicVolumeNumber":"2022-IOT-56"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:17:18.788860+00:00","id":216797,"links":{}}