{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00218798","sets":["1164:4088:10830:10916"]},"path":["10916"],"owner":"44499","recid":"218798","title":["SSHブルートフォース攻撃検知における認証時間の有効性について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-07-05"},"_buckets":{"deposit":"8bd64c6c-1e9d-49da-8001-38d925820f3b"},"_deposit":{"id":"218798","pid":{"type":"depid","value":"218798","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"SSHブルートフォース攻撃検知における認証時間の有効性について","author_link":["569754","569762","569753","569755","569758","569757","569761","569760","569759","569756"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SSHブルートフォース攻撃検知における認証時間の有効性について"},{"subitem_title":"The Effectiveness of Authentication Time in Detecting the SSH Bruteforce Attacks","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2022-07-05","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"関西大学総合情報学部"},{"subitem_text_value":"関西大学総合情報学部"},{"subitem_text_value":"関西大学総合情報学部"},{"subitem_text_value":"関西大学総合情報学部"},{"subitem_text_value":"関西大学総合情報学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Informatics, Kansai University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Informatics, Kansai University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Informatics, Kansai University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Informatics, Kansai University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Informatics, Kansai University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/218798/files/IPSJ-IOT22058011.pdf","label":"IPSJ-IOT22058011.pdf"},"date":[{"dateType":"Available","dateValue":"2024-07-05"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT22058011.pdf","filesize":[{"value":"421.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"32401387-c505-4dbd-85c9-21b0dace113b","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小林, 孝史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"嶋田, 洸希"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大歳, 英征"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"伊佐, 眞寿"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"武田, 瑞樹"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takashi, Kobayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koki, Shimada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hideyuki, Otoshi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shingo, Isa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mizuki, Takeda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"これまで,SSH 接続時の認証時間(パスワード要求からパスワードを入力して送信してくるまでの時間)を利用した攻撃検知の研究を行ってきた.以前の研究では,この認証時間に閾値を設定したり,時間帯や接続元 IP アドレスに依る適応的に閾値を設定して検知を行ってきたが,認証時間を用いることの有効性が明らかになっていなかった.本研究では,認証時間を用いることにより,いくつかの機械学習においても検知率の向上に寄与できることを示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We have been studying attack detection using the authentication time (the time between the password request and the password input and transmission) for SSH connections. In previous studies, we set a threshold value for the authentication time or an adaptive thresold value based on the time of day or the source IP address, but the effectiveness of using the authentication time has not been cleared. In this study, we show that the use of authentication time can contribute to improving the detection rate in several machine learning methods.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-07-05","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicVolumeNumber":"2022-IOT-58"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":218798,"updated":"2025-01-19T15:01:49.027403+00:00","links":{},"created":"2025-01-19T01:19:08.705394+00:00"}