{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00218936","sets":["1164:2735:10865:10970"]},"path":["10970"],"owner":"44499","recid":"218936","title":["ニューラルネットワークによるウェブアプリケーション攻撃の自動生成"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-07-19"},"_buckets":{"deposit":"12a2e16c-15a5-416b-83e1-ed223cf95bd7"},"_deposit":{"id":"218936","pid":{"type":"depid","value":"218936","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ニューラルネットワークによるウェブアプリケーション攻撃の自動生成","author_link":["570389","570386","570387","570388"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ニューラルネットワークによるウェブアプリケーション攻撃の自動生成"},{"subitem_title":"Automatic Generation of Web application Attack using Neural Network","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2022-07-19","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"阪南大学"},{"subitem_text_value":"国立研究開発法人情報通信研究機構"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hannan University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/218936/files/IPSJ-MPS22139009.pdf","label":"IPSJ-MPS22139009.pdf"},"date":[{"dateType":"Available","dateValue":"2024-07-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MPS22139009.pdf","filesize":[{"value":"784.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"17"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"9c24ee6c-b3a4-449f-a1fe-e052714e79d8","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"松田, 健"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"園田, 道夫"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takeshi, Matsuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Michio, Sonoda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10505667","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8833","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ウェブアプリケーションに対する攻撃は古くから知られており,その対策についても有効な手法が様々な媒体を通して公開されているにも関わらず,脆弱性データベースに関連する脆弱性の情報が報告され続けている.従来研究においても,機械学習を用いた様々な検知方法が提案されているが,いずれも過去の観測データに基づいて予測を行う方法がほとんどである.本研究は,攻撃データを構造化し,その構造を元にして新たな攻撃データを生成する方法を提案し,その有用性について考察する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Web application attacks is very famous cyber security, and the countermeasure of those attacks has been investigated by many researchers. Nevertheless, the damage caused by the attack and the vulnerability of web application continues to be reported. This paper proposed an automatic generation method of web application attack using neural network. The purpose of this study is to find a new vulnerability faster than attackers.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"3","bibliographic_titles":[{"bibliographic_title":"研究報告数理モデル化と問題解決(MPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-07-19","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"2022-MPS-139"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":218936,"updated":"2025-01-19T14:59:01.631708+00:00","links":{},"created":"2025-01-19T01:19:16.735877+00:00"}