{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240881","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240881","title":["プライバシーと検知精度の両立を目指した悪性通信検出手法の実社会通信データセットへの応用"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"d4d1c53b-b0f5-49b1-ba86-6b12b4d1a63d"},"_deposit":{"id":"240881","pid":{"type":"depid","value":"240881","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"プライバシーと検知精度の両立を目指した悪性通信検出手法の実社会通信データセットへの応用","author_link":["661922","661923","661924","661925","661926","661927","661928","661929"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"プライバシーと検知精度の両立を目指した悪性通信検出手法の実社会通信データセットへの応用","subitem_title_language":"ja"},{"subitem_title":"Application of Malicious Activity Detection to Real World Traffic Dataset to Achieve Both Privacy and Accuracy","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"悪性通信検知,通信ログ,プライバシー,匿名化","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"名古屋大学大学院情報学研究科"},{"subitem_text_value":"国立情報学研究所ストラテジックサイバーレジリエンス研究開発センター"},{"subitem_text_value":"名古屋大学情報基盤センター"},{"subitem_text_value":"名古屋大学情報基盤センター"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Informatics, Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics","subitem_text_language":"en"},{"subitem_text_value":"Information Technology Center, Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Information Technology Center, Nagoya University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240881/files/IPSJ-CSS2024135.pdf","label":"IPSJ-CSS2024135.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024135.pdf","filesize":[{"value":"856.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"dcac47dd-e0c7-41af-9690-5afa48373048","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小川, 剛史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"長谷川, 皓一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山口, 由紀子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"嶋田, 創"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takeshi, Ogawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hirokazu, Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yukiko, Yamaguchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hajime, Shimada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"通信ログからの悪意のある通信の検出は利用者のネットワーク上における全活動を監視する関係上,プライバシー侵害になる恐れがある.一方で,社会貢献のためのビッグデータ活用の面から匿名化したデータの利用については,個人情報保護法の改正など,活用が許可される方向に進んでいる.我々はこれまでにハニーポットで収集した良性/悪性通信のデータセットを利用して無害/悪性通信の識別器を作成し,識別精度の寄与度とプライバシーへの影響が大きい特徴量に対して離散値に置き換えるなどのそれぞれの性質に応じた部分匿名化を行うことで,検知精度を維持しつつプライバシーを保護する通信ログの匿名加工についての検討を行った.本研究では,ハニーポットと比較して通信継続時間や通信量の取りうる範囲が大きいなどの特性があるより実社会の通信に近いデータセットの特徴量に対して,そのような特性に即した部分匿名化を施し,適用時の検知性能の評価を行うことで,提案する通信ログ匿名加工の実用性について調査した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The detection of malicious traffic from traffic logs may pose a risk of privacy infringement as it requires monitoring all activities on users' networks. However, the utilization of anonymized data for the purpose of utilizing big data to improve society is moving towards permission with amendments to the Personal Information Protection Law. We have created classifiers for harmless/malicious traffic using a data set of benign/malicious traffic collected by honeypots and performed partial anonymization according to the characteristics of each, such as replacing discrete values for features that have a large contribution to identification accuracy and privacy impact, while maintaining detection accuracy. In this study, we investigated the practicality of the proposed anonymous processing of traffic logs by applying partial anonymization to the features of a data set more similar to real-world communication, which has characteristics such as a larger range of communication time and volume than honeypots, and by evaluating the detection performance when the anonymization is applied. The practicality of the proposed anonymous processing of traffic logs was investigated by evaluating the detection performance when applied.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1013","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"1006","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240881,"updated":"2025-03-06T05:35:41.073452+00:00","links":{},"created":"2025-01-19T01:45:19.585473+00:00"}