{"updated":"2025-01-21T21:52:29.030160+00:00","links":{},"id":73610,"created":"2025-01-18T23:31:29.029109+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00073610","sets":["581:6276:6374"]},"path":["6374"],"owner":"11","recid":"73610","title":["効果的なボットネット追跡に関する調査と検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-03-15"},"_buckets":{"deposit":"20b34212-a52e-46a4-ab62-0d5e2d128971"},"_deposit":{"id":"73610","pid":{"type":"depid","value":"73610","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"効果的なボットネット追跡に関する調査と検討","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"効果的なボットネット追跡に関する調査と検討"},{"subitem_title":"Statistics and Studies for an Effective Botnet Traceback","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:マルチメディア、分散、協調とモバイルシステム","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2011-03-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"パナソニック電工株式会社"},{"subitem_text_value":"東京電機大学"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Panasonic Electric Works Co., Ltd","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/73610/files/IPSJ-JNL5203019.pdf"},"date":[{"dateType":"Available","dateValue":"2013-03-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5203019.pdf","filesize":[{"value":"597.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"bf9c7bcd-503b-4d5c-a455-19245e1b46e1","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"甲斐, 俊文"},{"creatorName":"佐々木, 良一"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toshifumi, Kai","creatorNameLang":"en"},{"creatorName":"Ryoichi, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ボットネットの被害が増大してきており,ボットマスタ(ハーダ)まで追跡することが重要な課題となっている.ボットネットごとに通信経路は異なるが,経路上に防弾業者や一般ユーザの端末がある場合には追跡は困難になる.そこで我々は防弾業者や一般ユーザの端末を使用しているボットネットの割合を推定するために,統計調査を実施した.その結果,ユーザ端末を使用しているボットネットの割合は1割から3割程度,防弾業者サーバ端末については少なくとも2割以上,専門のサーバ管理者に管理されている端末は4割から5割程度と見積もられることを示す.また,ボットネットに使用されている端末の国別の傾向について調査した結果も示し,これらの調査に基づいてボットネット追跡の方針を検討する.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The damage of botnet is increasing, and it is an important problem to track bot masters. We analyzed tracing paths of botnet and classified these under 5 patterns. And if there are terminals of bulletproof providers or end users on a path, tracing on the path is difficult. Now we are examining a ratio of botnet using a terminal of bulletproof providers and end users. We have examined a ratio of botnet using a terminal of bulletproof providers and end users. As a result, we estimated the ratio of the botnet which used terminals of end users at around 30% from 10%, bulletproof providers at least 20%, and normal server managers at around 50% from 40%. And we argue about a policy of botnet traceback.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1143","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1136","bibliographicIssueDates":{"bibliographicIssueDate":"2011-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"52"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}