{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077945","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77945","title":["情報セキュリティ研究用ハニーポット通信データの一般頒布に向けた技術的要件の調査"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"49ccce2e-0298-4577-8b2b-0827cbdca22e"},"_deposit":{"id":"77945","pid":{"type":"depid","value":"77945","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"情報セキュリティ研究用ハニーポット通信データの一般頒布に向けた技術的要件の調査","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"情報セキュリティ研究用ハニーポット通信データの一般頒布に向けた技術的要件の調査"},{"subitem_title":"Investigation on Technical Requirements toward Open Distribution of Honeypot Trace Data for Information Security Research","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"攻撃通信データ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77945/files/IPSJCSS2011050.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011050.pdf","filesize":[{"value":"221.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"ab1b1765-a938-4c2d-b41f-62ee03bc74a1","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"細井, 琢朗"},{"creatorName":"松浦, 幹太"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takurou, Hosoi","creatorNameLang":"en"},{"creatorName":"Kanta, Matsuura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ネットワークセキュリティ分野の研究で利用される通信データは,プライバシー情報や危険なデータを含む可能性があるためほとんどの場合公開されず,研究成果の検証や類似研究の推進の壁となっている.本研究では,共通の研究用データセットCCC DATAset 2011内にも主要なデータとして含まれる,ハニーポットの通信データをセキュリティ研究向けに一般頒布することを考えた場合に,その通信データに求められる技術的要件を,安全性と有用性の観点から調査した.また一例として,CCC DATAset 2011の「攻撃通信データ」で,通信データ取得ホストの位置特定が目的と疑われる通信の検出を簡便な方法で試みた.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Traffic data (traces) which are used in network security researches potentially contain privacy information and hazardous data, so most of them are only used privately, which hinders third-party verification of their results and promotion of their relating researches. In this research, we investigated technical requirements for honeypot traces, such as ones included in the common research dataset CCC DATAset 2011, toward their open distribution for information security researches regarding their security and usefullness. We also tried to detect suspicious host location identification traffic from Attack Traffic Data of CCC DATAset 2011 by simple easy ways as a first step.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"294","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"289","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:41:36.528911+00:00","created":"2025-01-18T23:33:25.526283+00:00","links":{},"id":77945}