{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077925","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77925","title":["IPv6インターネットを攻撃経路とするセキュリティ問題についての一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"b40cf729-16d8-4ba1-8a71-8efca4a7e76b"},"_deposit":{"id":"77925","pid":{"type":"depid","value":"77925","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"IPv6インターネットを攻撃経路とするセキュリティ問題についての一考察","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"IPv6インターネットを攻撃経路とするセキュリティ問題についての一考察"},{"subitem_title":"Consideration of security problem to assume the IPv6 Internet to be attack route","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"攻撃元データ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"インターネットマルチフィード株式会社"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Internet Multifeed co.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77925/files/IPSJCSS2011030.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011030.pdf","filesize":[{"value":"589.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"b8152425-c4fb-42d4-9380-3cf1c267d739","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"須藤, 年章"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toshiaki, Sudoh","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"2011年4月,日本を含めアジア太平洋地域では通常の申請により割り振り可能であるIPv4アドレスの在庫がなくなる「IPv4アドレス枯渇」となった.それに伴い様々なサービスでIPv6対応がすすみ,インターネットサービスプロバイダが提供するアクセスラインサービスでもIPv6アドレスが標準で利用可能になるなどIPv6を利用できる通信環境が整備されはじめている.このようなインターネット環境の変化は,フィッシング,スパムやマルウェア感染などのセキュリティ問題へも影響を与える.本稿では,IPv6インターネットを攻撃経路とする攻撃データとMWS2011 DATAset[2]の攻撃通信データの関連性を分析し,IPv6網を利用した攻撃の現状と今後の影響について解析する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It became \"IPv4 address dryness\" in which the IPv4 address that was able to be the allotment became out of stock by usual application in Asia Pacific region including Japan in April, 2011. The Internet communication environment that can use IPv6 as it becomes possible for the IPv6 correspondence by various services to proceed along with it, and to use the IPv6 address by the standard in the access line service that Internet Service Provider provides begins to be maintained. And, the change in such an electronic environment influences the security problems such as the fishing, spam, and the malware infection. In this text, the relativity of the attack communication data of attack data and MWS2011 DATAset 2 of which the attack route is the IPv6 Internet is analyzed, and the current state of the attack using the IPv6 net and the influence in the future are analyzed.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"178","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"173","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:40:58.782209+00:00","created":"2025-01-18T23:33:24.557453+00:00","links":{},"id":77925}