{"id":228716,"created":"2025-01-19T01:27:51.388443+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00228716","sets":["6164:6165:6462:11379"]},"path":["11379"],"owner":"44499","recid":"228716","title":["新たなハニーポットの分析から得られた暗号資産の盗難対策"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-10-23"},"_buckets":{"deposit":"7f681b80-77d9-4df1-b536-5d97b96ef07d"},"_deposit":{"id":"228716","pid":{"type":"depid","value":"228716","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"新たなハニーポットの分析から得られた暗号資産の盗難対策","author_link":["613461","613464","613459","613462","613463","613460"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"新たなハニーポットの分析から得られた暗号資産の盗難対策"},{"subitem_title":"Anti-Theft Measures for Crypto-assets from New Honeypot Analysis","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ブロックチェーン,Ethereum,JSON-RPC,ハニーポット,クラスタリング","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2023-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"筑波大学"},{"subitem_text_value":"横浜国立大学"},{"subitem_text_value":"筑波大学/情報通信研究機構"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"University of Tsukuba / National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/228716/files/IPSJ-CSS2023103.pdf","label":"IPSJ-CSS2023103.pdf"},"date":[{"dateType":"Available","dateValue":"2025-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2023103.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ee300a42-098d-4efe-be2f-ee47b3a2d6d5","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"内堀, 紘徳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"面, 和成"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hironori, Uchibori","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazumasa, Omote","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,BitcoinやEthereumをはじめとする暗号資産への注目が高まっている.一方で,暗号資産を支えるブロックチェーンネットワークでは他ユーザの資産の奪取を試みる攻撃が報告されている.これまでブロックチェーンへの攻撃観測では,ハニーポットが満たすべき要件の調査やハニーポットに攻撃者をより引きつける手法の検討がなされてきた.本研究では,実際のEtherを保有せずとも高額Etherを保有する他者のウォレットに紐づける新たなタイプのRPCハニーポット手法を提案し,残高の異なる2つのウォレットに対する攻撃者の振舞いの差異を分析した.また,大量のログデータの効率的な分析を可能とするクラスタリングを用いた分析を行い,攻撃者を攻撃目的別に分類できることを明らかにした.さらに,本提案ハニーポット手法のアイデアを応用することで,ユーザのウォレットが暗号資産の盗難攻撃の標的となるリスクを低減する新たな防御手法を提案した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there have been reports of attacks on the blockchain networks that support crypto-assets, in which attackers attempt to steal other users' assets. In the observation of blockchain attacks, there have been investigations into the requirements that honeypots should satisfy and methods to attract more attackers to honeypots. In this study, we propose a new type of RPC honeypot method that associates with the wallets of others holding high amounts of Ether without actually possessing Ether. We then analyze the differences in attacker behavior between two wallets with different balances. We also analyze a large amount of log data using clustering, which enables efficient analysis, and clarify that attackers can be classified according to the purpose of their attacks. Furthermore, by applying the idea of the proposed honeypot method, we propose a new defense method to reduce the risk of user wallets becoming a target of crypto-asset theft attacks.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"762","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2023論文集"}],"bibliographicPageStart":"755","bibliographicIssueDates":{"bibliographicIssueDate":"2023-10-23","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T11:45:02.990732+00:00","links":{}}