@article{oai:ipsj.ixsq.nii.ac.jp:00070333,
 author = {酒井, 崇裕 and 竹森, 敬祐 and 安藤, 類央 and 西垣, 正勝 and Takahiro, Sakai and Keisuke, Takemori and Ruo, Ando and Masakatsu, Nishigaki},
 issue = {9},
 journal = {情報処理学会論文誌},
 month = {Sep},
 note = {ボットは巧妙な手段でPC内に潜伏するため正規プロセスとの切り分けが難しく,ボット検知のためにはボットの本質をとらえたビヘイビアの発見が求められる.ボットは外部からの制御によって動作するため,PC内に常駐してハーダからの指令を待ち受ける必要がある.このため,多くのボットにとって,初期感染の際にシステムフォルダ内に侵入し,自身をOSの自動実行リストに登録すること(以下,侵入挙動)は必須のビヘイビアとなっている.このため,環境に応じて侵入挙動と攻撃挙動を使い分けるボットであれば,実行環境を感染前の状態に戻してやることによって,侵入挙動が再び観測されると考えられる.また,単純に侵入挙動と攻撃挙動を行い続けるボットであれば,侵入挙動がつねに観測される.そこで本研究では,このボットの「侵入挙動の反復性」をボットの本質的なビヘイビアと定義し,これを利用してボットを検出する方式を提案する., Due to bot's sophisticated techniques for hiding itself, it is difficult to distinguish the bot's malicious process from legitimate process. Hence it is quite essential for bot detection to find bot's inevitable behaviors. The bots are remotely controlled by commands sent through the Internet from a bot-master. This means that these bots have to stay alive themselves in PC so that they can await for further commands from the bot-master. In other words, for almost all bots, intrusion into system directory and registration themselves to auto run list are key functions which they should equip. Therefore, a clever bot, which has both intrusion and attack behaviors and separate them according to the execution environment, will exhibit again its intrusion behavior as long as its environment is restored to pre-intrusion state. Needless to add, a naive bot, which simply iterates intrusion and attack behaviors, will always show its intrusion behavior. Therefore in this paper, we focus on this characteristic of “the repetitiveness of intrusion” as a bot's inevitable behavior and propose a bot detection scheme to utilize the characteristic.},
 pages = {1591--1599},
 title = {侵入挙動の反復性を用いたボット検知方式},
 volume = {51},
 year = {2010}
}