{"updated":"2025-01-22T10:15:40.464611+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00044865","sets":["1164:3925:3946:3947"]},"path":["3947"],"owner":"1","recid":"44865","title":["行動制限型ハニーポットの改良方法の提案・実装・運用"],"pubdate":{"attribute_name":"公開日","attribute_value":"2004-12-20"},"_buckets":{"deposit":"dad1b362-a076-48e5-be33-aac8ab455e92"},"_deposit":{"id":"44865","pid":{"type":"depid","value":"44865","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"行動制限型ハニーポットの改良方法の提案・実装・運用","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"行動制限型ハニーポットの改良方法の提案・実装・運用"},{"subitem_title":"A Proposal and Development of Honeypot with Command Wrapper for Activity Restricted","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2004-12-20","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"慶應義塾大学大学院政策・メディア研究科"},{"subitem_text_value":"電気通信大学大学院情報システム学研究科"},{"subitem_text_value":"慶應義塾大学環境情報学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Medea and Governance, Keio University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Systems, University of Electro - Communications","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Environmental Information, Keio University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/44865/files/IPSJ-CSEC04027011.pdf"},"date":[{"dateType":"Available","dateValue":"2006-12-20"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC04027011.pdf","filesize":[{"value":"250.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"944d3771-3c3a-4f6a-bd54-94c17af4d0c5","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2004 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小泉, 芳"},{"creatorName":"小池, 英樹"},{"creatorName":"安村, 通晃"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kanba, Koizumi","creatorNameLang":"en"},{"creatorName":"Hideki, Koike","creatorNameLang":"en"},{"creatorName":"Michiaki, Yasumura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では不正侵入者の行動観察を目的とした行動制限型ハニーポットにおける幾つかの改良方法を提案する.改良のコンセプトはラッパー方式によるコマンド制御を行うことで、ハニーポットであるとより気づかれ難く、また設置・運用をより効率的に行うものである.主な改良機能として特殊OSの偽装(ダミーOS)、偽の対話インターフェイス(ダミープロンプト)、コマンドに対する偽の返答(ダミーメッセージ)などである.本論文では改良システムの設計・実装について説明し、また運用を通じて得られた侵入者に関する知見を述べる.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In this paper, we propose and develop the honeypot with the activity restricted. Proposal system is for the purpose of intruder monitoring and consist of command wrapper. Command wrapper has data capture and data control ability. It's basically output dummy message and dummy prompt that pretend UNIX like OS. We explain the detail of our system, and knowledge by monitoring intruders.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"62","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"57","bibliographicIssueDates":{"bibliographicIssueDate":"2004-12-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"129(2004-CSEC-027)","bibliographicVolumeNumber":"2004"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"created":"2025-01-18T23:10:56.415360+00:00","id":44865,"links":{}}