{"updated":"2025-01-22T03:06:21.598030+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00060496","sets":["581:582:5581"]},"path":["5581"],"owner":"10","recid":"60496","title":["マルウェア亜種の動的挙動を利用した自動分類手法の提案と実装"],"pubdate":{"attribute_name":"公開日","attribute_value":"2009-04-15"},"_buckets":{"deposit":"0d383bbc-9c69-4b64-a914-b2c672cf536a"},"_deposit":{"id":"60496","pid":{"type":"depid","value":"60496","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"マルウェア亜種の動的挙動を利用した自動分類手法の提案と実装","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マルウェア亜種の動的挙動を利用した自動分類手法の提案と実装"},{"subitem_title":"Proposal and Implementation of Automated Malware Variant Classification Based on Dynamic Behavior","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"一般論文","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2009-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"防衛省技術研究本部電子装備研究所,情報セキュリティ大学院大学"},{"subitem_text_value":"防衛省技術研究本部電子装備研究所"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Electronic Systems Research Center, Technical Research & Development Institute, Ministry of Defense,INSTITUTE of INFORMATION SECURITY","subitem_text_language":"en"},{"subitem_text_value":"Electronic Systems Research Center, Technical Research & Development Institute, Ministry of Defense","subitem_text_language":"en"},{"subitem_text_value":"INSTITUTE of INFORMATION SECURITY","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/60496/files/IPSJ-JNL5004010.pdf"},"date":[{"dateType":"Available","dateValue":"2011-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5004010.pdf","filesize":[{"value":"2.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"eb5a5a4f-d458-4919-ab64-4bcb7405eb31","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2009 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"堀合, 啓一"},{"creatorName":"今泉, 隆文"},{"creatorName":"田中, 英彦"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Keiichi, Horiai","creatorNameLang":"en"},{"creatorName":"Takafumi, Imaizumi","creatorNameLang":"en"},{"creatorName":"Hidehiko, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764 ","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"マルウェアの動的な挙動を多次元のベクトルとして数値化し,ベクトル間の距離からマルウェアの亜種を判定する手法について提案する.マルウェアの実行にともなって顕在化したプロセスの起動やファイルの変化および発生するトラフィックなどの出現頻度を基に2値のカテゴリ・データとして数値化し,距離の算出は,高速に演算が可能なハミング距離を用いる.提案手法の有用性を実験によって検証するとともにマルウェア自動解析システムへ実装した.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This paper describes a method for malware variant classification using the distance between multi-dimensional vectors which represent the dynamic behavior of the malware. The dynamic behavior, involving state changes of processes, files, and network traffic, is transformed into binary category data. The measurement of the distance is based on Hamming distance, which requires less processing power than measurements proposed in previous works. The proposed method is proved its efficiency by our experiments and we applied the method to the automated Malware analyzing system.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1333","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1321","bibliographicIssueDates":{"bibliographicIssueDate":"2009-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"50"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:22:57.813214+00:00","id":60496,"links":{}}