{"created":"2025-01-18T23:31:04.776475+00:00","updated":"2025-01-21T22:10:10.800851+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00072903","sets":["1164:4088:6330:6331"]},"path":["6331"],"owner":"10","recid":"72903","title":["Quaggaを用いたscan攻撃の遮断について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-02-21"},"_buckets":{"deposit":"1eb7ce80-1cec-43fb-8eb1-23b81a1e7bda"},"_deposit":{"id":"72903","pid":{"type":"depid","value":"72903","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"Quaggaを用いたscan攻撃の遮断について","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Quaggaを用いたscan攻撃の遮断について"},{"subitem_title":"Blocking scan attacks using Quagga","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ネットワーク異常・侵入検知","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2011-02-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大分大学工学部知能情報システム工学科"},{"subitem_text_value":"大分大学工学部知能情報システム工学科"},{"subitem_text_value":"大分大学大学院工学研究科知能情報システム工学専攻"},{"subitem_text_value":"大分大学大学院工学研究科知能情報システム工学専攻"},{"subitem_text_value":"大分大学学術情報拠点情報基盤センター"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Computer Science and Intelligent Systems, Faculty of Engineering, Oita University","subitem_text_language":"en"},{"subitem_text_value":"Department of Computer Science and Intelligent Systems, Faculty of Engineering, Oita University","subitem_text_language":"en"},{"subitem_text_value":"Computer Science and Intelligent Systems, Graduate School of Engineering, Oita University","subitem_text_language":"en"},{"subitem_text_value":"Computer Science and Intelligent Systems, Graduate School of Engineering, Oita University","subitem_text_language":"en"},{"subitem_text_value":"Center for Academic Information and Library Services, Oita University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/72903/files/IPSJ-IOT11012041.pdf"},"date":[{"dateType":"Available","dateValue":"2013-02-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT11012041.pdf","filesize":[{"value":"870.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"088b1828-8347-4d2b-a6a0-16679cf6467e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"熊谷, 悠平"},{"creatorName":"有馬, 竜昭"},{"creatorName":"永山, 聖希"},{"creatorName":"藤原, 健志"},{"creatorName":"吉田, 和幸"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuhei, Kumagai","creatorNameLang":"en"},{"creatorName":"Tatsuaki, Arima","creatorNameLang":"en"},{"creatorName":"Toshiki, Nagayama","creatorNameLang":"en"},{"creatorName":"Takeshi, Fujiwara","creatorNameLang":"en"},{"creatorName":"Kazuyuki, Yoshida","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"scan 攻撃とは、ネットワークを介した攻撃において、攻撃者がネットワークに接続されたサーバや PC の IP アドレスや提供しているサービスの情報を収集する行為のことである。攻撃者は scan 攻撃実行後に DoS(Denial of Service) 攻撃を始めとした破壊行為を行う。我々はこれ注目し、scan 攻撃を遮断することにより攻撃者の情報収集を妨害し、その後行われる攻撃を防ぐことができると考えた。本論文では、Quagga を用いた scan 攻撃遮断システムの概要について述べ、利点と欠点を示した後、実際の運用で得られたログの詳細について述べる。","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The scan attack, in attacks over the network, is that the improper act of gathering information about connecting to a network server or PC's IP addresses or provided service in network attack. Attackers do DoS (Denial of Service) attacks and some sabotage after the scan attack. We would like to disturb information collecting action from attackers by blocking the scan attack, then subsequent attacks made by them can be prevented. In this paper, we described a summary of the Quagga system for scan attack interception, and showing the advantages and disadvantages of this method, lastly discuss and analyze the log information obtained in actual operation.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2011-02-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"41","bibliographicVolumeNumber":"2011-IOT-12"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"id":72903,"links":{}}