{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00225606","sets":["581:11107:11113"]},"path":["11113"],"owner":"44499","recid":"225606","title":["Androidにおける悪性Webサイトアクセスのログ収集と可視化手法の提案と評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-04-15"},"_buckets":{"deposit":"6aa17c11-53f3-48b4-be17-84fe10d2672c"},"_deposit":{"id":"225606","pid":{"type":"depid","value":"225606","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Androidにおける悪性Webサイトアクセスのログ収集と可視化手法の提案と評価","author_link":["597332","597336","597333","597334","597329","597335","597331","597330"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Androidにおける悪性Webサイトアクセスのログ収集と可視化手法の提案と評価"},{"subitem_title":"Proposal and Evaluation of a Log Collection and Visualization Method for Malicious Website Access in Android","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文(推薦論文)] Web媒介型攻撃,悪性Webサイト,Webセキュリティ,Android,Webブラウザ","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2023-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"岡山大学大学院自然科学研究科"},{"subitem_text_value":"岡山大学工学部"},{"subitem_text_value":"岡山県立大学情報工学部"},{"subitem_text_value":"岡山大学学術研究院自然科学学域"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"School of Engineering, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Computer Science and Systems Engineering, Okayama Prefectural University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Natural Science and Technology, Okayama University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/225606/files/IPSJ-JNL6404013.pdf","label":"IPSJ-JNL6404013.pdf"},"date":[{"dateType":"Available","dateValue":"2025-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6404013.pdf","filesize":[{"value":"1.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"28201f64-6158-4e6c-9a50-cd30ac3fcd26","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"市岡, 秀一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"川島, 千明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐藤, 将也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山内, 利宏"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shuichi, Ichioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Chiaki, Kawashima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaya, Sato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshihiro, Yamauchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Androidにおける悪性Webサイトヘ誘導する攻撃では,遷移元Webサイトから複数の経由Webサイトへ遷移した後,悪性Webサイトヘ遷移することが多い.また,経由Webサイトでは,遷移先URLの生成やブラウザの履歴を変更しており,攻撃において重要な役割を担っている.このため,経由Webサイトに着目して分析することで攻撃の特徴が明らかになる可能性がある.本論文では,Android上の悪性Webサイトアクセスのログを収集し,可視化する手法を提案する.まず,Androidに対する悪性Webサイトへの誘導攻撃の把握における課題と対処について述べ,提案手法の実現方式について述べる.提案手法を用いて,既知の悪性Webサイトへ遷移するWebサイトへアクセスし,ページ遷移を分析したところ,複数の遷移元Webサイトから共通の経由Webサイトや悪性Webサイトへページ遷移する事例があることを明らかにした.また,提案手法で発見したFQDNをもとに,スマートフォンを対象にしたユーザ参加型Web媒介型攻撃対策の実証実験により収集されたログを分析した結果を報告する.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In an attack that redirects users to a malicious website, users are redirected from the source website to multiple transit websites. After that, the user is often redirected to a malicious website. In addition, the generation of destination URLs and modification of browser histories at the transit websites are important in the attack. Therefore, analysis focusing on the transit website may reveal the characteristics of the attack. In this paper, we propose a method to collect and visualize logs of malicious website accesses on Android. First, we describe the challenges in understanding and dealing with attacks that redirect users to malicious websites for Android, and then we describe the implementation method of the proposed method. Using the proposed method, we accessed websites that transitioned to known malicious websites and analyzed the page transitions, and found that there were cases of page transitions from multiple source websites to common transit websites and malicious websites. In addition, we report the results of analyzing logs collected from a demonstration experiment of countermeasures against user-participatory Web-based attacks on smartphones based on the FQDNs discovered by the proposed method.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"903","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"892","bibliographicIssueDates":{"bibliographicIssueDate":"2023-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"64"}]},"relation_version_is_last":true,"item_2_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.20729/00225497","subitem_identifier_reg_type":"JaLC"}]},"weko_creator_id":"44499"},"id":225606,"updated":"2025-01-19T12:43:55.994544+00:00","links":{},"created":"2025-01-19T01:25:06.693480+00:00"}