{"updated":"2025-01-21T21:59:01.504620+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00073205","sets":["1164:3925:6360:6361"]},"path":["6361"],"owner":"10","recid":"73205","title":["IPv6環境下におけるルータへのなりすましによる通信傍受の実験と対策の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-03-03"},"_buckets":{"deposit":"2ec28229-f356-40c3-a4ed-5eaa75c85fc1"},"_deposit":{"id":"73205","pid":{"type":"depid","value":"73205","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"IPv6環境下におけるルータへのなりすましによる通信傍受の実験と対策の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"IPv6環境下におけるルータへのなりすましによる通信傍受の実験と対策の提案"},{"subitem_title":"Experiment of the network wiretapping by spoofing to the router in the IPv6 environment and proposal of its countermeasure","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ネットワークセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2011-03-03","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"パナソニック電工株式会社"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Panasonic Electric Works Co. Ltd.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/73205/files/IPSJ-CSEC11052005.pdf"},"date":[{"dateType":"Available","dateValue":"2013-03-03"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC11052005.pdf","filesize":[{"value":"624.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7e70992d-12eb-491e-b6eb-7268836de076","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"坂本, 知弥"},{"creatorName":"佐々木, 良一"},{"creatorName":"甲斐, 俊文"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomoya, Sakamoto","creatorNameLang":"en"},{"creatorName":"Ryoichi, Sasaki","creatorNameLang":"en"},{"creatorName":"Toshifumi, Kai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,インターネットの普及により,IPv4 アドレスの枯渇が懸念されている.その為,IPv6 の導入が進められており,IPv6 が導入された場合,IP アドレス数の大幅な増加だけでなく,様々な利点が期待されている.しかし,その利点を逆手に取った攻撃手法も同時に発見されており,迅速な対応が求められている.そのような攻撃手法の 1 つがアドレス自動割り当て時における,ルータへのなりすましによる不正 RA (Router Advertisement) 攻撃である.既存対策としてはネットワーク機器やルータへの機能実装による対策が提案されているが,実現性や有効性の問題により,現実的ではない.そこで,本研究では実験を通じて不正 RA 攻撃がどの程度容易に実現出来るかを示すとともに,PC 側でフィルタリングを行う簡易で効率的な手法の提案と評価を行う.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, exhaustion of IPv4 address becomes a big issue caused by the spread of Internet. This tendency leads the introduction of IPv6 address which has the various advantages such as large increase of the number of the IP addresses. However, the attack technique that took the advantage underhand is discovered at the same time, and quick countermeasure is required. One of such attack techniques is unjust RA (Router Advertisement) attack by spoofing to the router in the address automatic allotment. Although the conventional measures to the network equipment or router have been proposed, these measures are not realistic from the view point of usefulness and effectiveness. Therefore we show how easily we can realize unjust RA attack through an experiment, and we propose and evaluate a filtering technique which is simple and effective in the PC side in this study.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2011-03-03","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"2011-CSEC-52"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:31:17.781244+00:00","id":73205,"links":{}}