{"created":"2025-01-18T23:44:45.784616+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00098534","sets":["581:7397:7450"]},"path":["7450"],"owner":"11","recid":"98534","title":["Evaluating payload features for malware infection detection"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-02-15"},"_buckets":{"deposit":"933054e3-66e4-4090-9645-ca52508d020f"},"_deposit":{"id":"98534","pid":{"type":"depid","value":"98534","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Evaluating payload features for malware infection detection","author_link":["358772","358770","358773","358771","358775","358776","358778","358777","358774","358769"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Evaluating payload features for malware infection detection"},{"subitem_title":"Evaluating payload features for malware infection detection","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文(推薦論文)] malware, infection detection, traffic, payload","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2014-02-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications"},{"subitem_text_value":"The University of Electro-Communications"},{"subitem_text_value":"The University of Electro-Communications"},{"subitem_text_value":"NTT Communications Corporation"},{"subitem_text_value":"The University of Electro-Communications"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"NTT Communications Corporation","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":11,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/98534/files/IPSJ-JNL5502058.pdf","label":"IPSJ-JNL5502058"},"date":[{"dateType":"Available","dateValue":"2016-02-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5502058.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"cd107ca2-ed98-4cf1-bb3d-abe9494bffdf","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yusuke, Otsuki"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masatsugu, Ichino"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Soichi, Kimura"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuhiro, Hatada"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Yoshiura"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yusuke, Otsuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masatsugu, Ichino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Soichi, Kimura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuhiro, Hatada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Yoshiura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Analysis of malware-infected traffic data revealed the payload features that are the most effective for detecting infection. The traffic data was attack traffic using the D3M2012 dataset and CCC DATAsets 2009, 2010, and 2011. Traffic flowing on an intranet at two different sites was used as normal traffic data. Since the type of malware (worm, Internet connection confirmation, etc.) affects the type of traffic generated, the malware was divided into three types―worm, Trojan horse, and file-infected virus―and the most effective features were identified for each type.\n\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.22.376\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Analysis of malware-infected traffic data revealed the payload features that are the most effective for detecting infection. The traffic data was attack traffic using the D3M2012 dataset and CCC DATAsets 2009, 2010, and 2011. Traffic flowing on an intranet at two different sites was used as normal traffic data. Since the type of malware (worm, Internet connection confirmation, etc.) affects the type of traffic generated, the malware was divided into three types―worm, Trojan horse, and file-infected virus―and the most effective features were identified for each type.\n\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.22.376\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2014-02-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"55"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":98534,"updated":"2025-01-20T06:46:57.827953+00:00","links":{}}