{"created":"2025-01-19T01:39:35.580400+00:00","updated":"2025-01-19T08:59:04.400416+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00237133","sets":["1164:6389:11481:11662"]},"path":["11662"],"owner":"44499","recid":"237133","title":["ルータのセキュリティ不備を突くサイバー攻撃を長期観測するためのハニーポット"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-07-15"},"_buckets":{"deposit":"bc27b347-e533-4257-8078-0579c3de81e4"},"_deposit":{"id":"237133","pid":{"type":"depid","value":"237133","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ルータのセキュリティ不備を突くサイバー攻撃を長期観測するためのハニーポット","author_link":["648472","648475","648477","648473","648474","648476"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ルータのセキュリティ不備を突くサイバー攻撃を長期観測するためのハニーポット"},{"subitem_title":"Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-07-15","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"横浜国立大学大学院環境情報学府"},{"subitem_text_value":"横浜国立大学先端科学高等研究院"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/先端科学高等研究院"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":" Graduate School of Environment and Information Sciences","subitem_text_language":"en"},{"subitem_text_value":"AffiliationInstitute of Advanced Sciences, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Sciences, Yokohama National University / Institute of Advanced Sciences, Yokohama National University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/237133/files/IPSJ-SPT24056012.pdf","label":"IPSJ-SPT24056012.pdf"},"date":[{"dateType":"Available","dateValue":"2026-07-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT24056012.pdf","filesize":[{"value":"1.8 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"39304a0f-986d-416d-90d5-4413297b2211","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"溝口, 将隆"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐々木, 貴之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masataka, Mizokuchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takayuki, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"企業や家庭において外部と内部ネットワークとの境界に設置されるルータはセキュリティ上重要な通信機器であるが,インターネット上にはセキュリティ設定等に不備のあるルータが存在し,これらを経由して内部ネットワークへ侵入する事例や脆弱なルータを踏み台として悪用する事例が多く発生している.しかしながら,多様化するルータへの攻撃を長期的かつ詳細に分析した研究は少ない.そこで本稿では実機のルータを用いたハニーポットによる攻撃の長期観測を試みる.この際,悪用や占有を目的としたルータの設定変更等については観測に必要な機能を維持できる範囲で許容することで,段階的な攻撃手順を明らかにし,その実態を解明する.プロトタイプシステムによる初期的な観測では,DDNS やポート待ち受け設定の変更により独占的にルータを制御する試みや,DNS 設定変更による内部ネットワークの機器への干渉を試みる活動が観測された.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Although routers installed at the boundaries between external and internal networks in enterprises and homes are important communication devices for security purposes, there are routers with inadequate security on the Internet, and there are many cases of intrusion into internal networks via these routers or exploitation of vulnerable routers as stepping stones. However, there have been few studies that have conducted long-term and detailed analysis of attacks on diversified routers. In this paper, we propose long-term observation of attacks by a honeypot using actual routers. We allow configuration changes of routers for the purpose of exploitation and occupation as long as we can maintain the observation environment to clarify the step-by-step attack procedures and to elucidate the actual conditions of the attacks. In the initial observations using the prototype system, we observed activities such as attempts to exclusively control routers by changing DDNS and port settings, and attempts to interfere with devices in the internal network by changing DNS settings.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-07-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"2024-SPT-56"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":237133,"links":{}}