{"id":216991,"updated":"2025-01-19T15:39:55.422065+00:00","links":{},"created":"2025-01-19T01:17:30.072122+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00216991","sets":["1164:2836:10841:10842"]},"path":["10842"],"owner":"44499","recid":"216991","title":["Ethereum RPCハニーポットの最小要件の調査と軽量化手法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-03-03"},"_buckets":{"deposit":"9edafd26-c229-4d48-9cb4-ff5ff36bbf73"},"_deposit":{"id":"216991","pid":{"type":"depid","value":"216991","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Ethereum RPCハニーポットの最小要件の調査と軽量化手法の提案","author_link":["561265","561264","561266","561267"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Ethereum RPCハニーポットの最小要件の調査と軽量化手法の提案"},{"subitem_title":"Minimum Requirements and Lightweight Method for Ethereum RPC Honeypot","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"攻撃検知・機械学習セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-03-03","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"筑波大学"},{"subitem_text_value":"筑波大学/情報通信研究機構"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"University of Tsukuba / National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/216991/files/IPSJ-DPS22190007.pdf","label":"IPSJ-DPS22190007.pdf"},"date":[{"dateType":"Available","dateValue":"2024-03-03"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPS22190007.pdf","filesize":[{"value":"1.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"87f2de05-952f-47fb-bc80-a25054b8ab34","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"内田, 大暉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"面, 和成"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Taiki, Uchida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazumasa, Omote","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10116224","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8906","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,暗号資産が世界中で注目されている.代表的な暗号資産の 1 つである Ethereum においては,資産を盗むための攻撃が盛んに行われていることがハニーポットを用いた観測結果より報告されている.ハニーポットは攻撃の実態を調査するうえで重要なシステムである一方,Ethereum ノードに対する攻撃を観測するハニーポットは運用コストが一般的なハニーポットと比べ高いことが問題視されている.本研究ではそのコストを削減するために,Ethereum におけるハニーポットに必要な最小要件を複数の実験を通して明らかにした.そして軽量化された新しいハニーポットを提案し,従来手法と比較することでその有効性が従来手法と同等であることを示した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, cryptocurrencies have become popular worldwide. In Ethereum, one of the representative cryptocurrencies, honeypots' observation results revealed active attacks to steal cryptocurrencies from its nodes. While honeypots are an effective system for investigating attacks, the operational cost of honeypots for observing attacks on Ethereum nodes is higher than that of ordinary honeypots, which is a problem. This study shows the honeypot's minimum requirements to reduce the costs through several experiments. We propose a new lightweight honeypot, and its effectiveness is equivalent to a conventional method by comparing results.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告マルチメディア通信と分散処理(DPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-03-03","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicVolumeNumber":"2022-DPS-190"}]},"relation_version_is_last":true,"weko_creator_id":"44499"}}