{"updated":"2025-01-19T10:13:58.942780+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233044","sets":["1164:4088:11480:11520"]},"path":["11520"],"owner":"44499","recid":"233044","title":["動的なIPアドレス変換機構を用いた通信情報の隠蔽"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-05"},"_buckets":{"deposit":"47cd60cd-095c-44f7-b263-4d078c810dbe"},"_deposit":{"id":"233044","pid":{"type":"depid","value":"233044","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"動的なIPアドレス変換機構を用いた通信情報の隠蔽","author_link":["632100","632097","632099","632098"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"動的なIPアドレス変換機構を用いた通信情報の隠蔽"},{"subitem_title":"A Dynamic IP Address Translation for Hiding Source and Destination Information","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IA-D","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-03-05","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"トヨタ自動車株式会社情報通信企画部InfoTech-IS"},{"subitem_text_value":"トヨタ自動車株式会社情報通信企画部InfoTech-IS"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"InfoTech-IS, Toyota Motor Corporation","subitem_text_language":"en"},{"subitem_text_value":"InfoTech-IS, Toyota Motor Corporation","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233044/files/IPSJ-IOT24064024.pdf","label":"IPSJ-IOT24064024.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT24064024.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"ea5a8da7-f645-454e-935f-5fad5549f12f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡田, 和也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"阿部, 博"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuya, Okada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Abe","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"サイバー攻撃においては,攻撃対象の IP アドレスを知ることが必要となる.端末やサーバの IP アドレスが特定されると,外部からのサイバー攻撃の危険に晒されてしまい,サービスの停止など深刻な被害を招く可能性がある.しかしながら,IP パケットにおいて送信元・宛先の IP アドレス情報は,エンドツーエンドの転送に利用されるため暗号化等により隠蔽できない.この問題に対して筆者は,先行研究で通信網の境界(エッジ)にて宛先・送信元の IP アドレスを動的に代理の IP アドレスへ変換することで,通信路の一部でパケットが盗聴されても実際の IP アドレスを特定しにくくする方式を提案した.しかし,既存のソフトウェアルータを用いた実装では提案方式が動作するものの,アドレス変換ルールの更新に時間を要し,通信が大幅に遅延してしまう課題があった.本報告では,通信に影響を与えずにリアルタイムにアドレスの変換を行える実装を検討し評価した結果を報告する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In cyber attacks, it is crucial to know the IP addresses of the targets. Once the IP addresses of terminals or servers are identified, they become vulnerable to cyber attacks from external sources, which can lead to serious damages such as service disruption. However, the information of source and destination IP addresses in IP packets cannot be concealed by encryption or other means since it is used for end-to-end transmission of data. To tackle this issue, the author proposed a method in previous research where the IP addresses of the destination and source are dynamically translated to proxy IP addresses at the boundary (edge) of the communication network. This makes it difficult to identify the actual IP addresses even if packets are intercepted at some point along the communication route. However, the implementation using existing software routers presents a challenge due to time-consuming updates of address conversion rules, resulting in significant communication delays, although the proposed method functions. This report discusses and evaluates the results of an investigation into an implementation capable of real-time address conversion without affecting communication.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-05","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"24","bibliographicVolumeNumber":"2024-IOT-64"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:34:15.534335+00:00","id":233044,"links":{}}