{"created":"2025-01-19T01:24:52.806308+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00225368","sets":["581:11107:11112"]},"path":["11112"],"owner":"44499","recid":"225368","title":["Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-03-15"},"_buckets":{"deposit":"93cd15e4-5f4d-496c-812f-70a928d39296"},"_deposit":{"id":"225368","pid":{"type":"depid","value":"225368","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users","author_link":["596110","596114","596116","596115","596112","596113","596117","596111"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users"},{"subitem_title":"Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:本格的なDXを支えるためのインターネットと運用技術] security notification, IoT malware infection, simulation, ISP","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2023-03-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Yokohama National University/Advanced Institute of Industrial Technology"},{"subitem_text_value":"NTT Data Mathematical Systems Inc."},{"subitem_text_value":"Yokohama National University/National Institute of Information and Communications Technology"},{"subitem_text_value":"Yokohama National University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Yokohama National University / Advanced Institute of Industrial Technology","subitem_text_language":"en"},{"subitem_text_value":"NTT Data Mathematical Systems Inc.","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University / National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/225368/files/IPSJ-JNL6403006.pdf","label":"IPSJ-JNL6403006.pdf"},"date":[{"dateType":"Available","dateValue":"2025-03-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6403006.pdf","filesize":[{"value":"2.5 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6251a6e5-9240-4900-9eeb-0bb07995a3ec","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Xuping, Huang"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shunsuke, Mochizuki"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Fujita"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Xuping, Huang","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shunsuke, Mochizuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Fujita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.31(2023) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.31.165\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.31(2023) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.31.165\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2023-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"64"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":225368,"updated":"2025-01-19T12:49:59.184191+00:00","links":{}}