{"created":"2025-01-18T23:45:34.979676+00:00","updated":"2025-01-21T11:59:42.462860+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00099578","sets":["1164:6389:7521:7522"]},"path":["7522"],"owner":"11","recid":"99578","title":["能動的サイバー攻撃観測プラットフォームGHOSTセンサの実装と評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-03-20"},"_buckets":{"deposit":"dde71b62-9cb5-4003-883a-d909d0bd238b"},"_deposit":{"id":"99578","pid":{"type":"depid","value":"99578","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"能動的サイバー攻撃観測プラットフォームGHOSTセンサの実装と評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"能動的サイバー攻撃観測プラットフォームGHOSTセンサの実装と評価"},{"subitem_title":"Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2014-03-20","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"独立行政法人情報通信研究機構"},{"subitem_text_value":"株式会社クルウィット"},{"subitem_text_value":"独立行政法人情報通信研究機構"},{"subitem_text_value":"独立行政法人情報通信研究機構"},{"subitem_text_value":"独立行政法人情報通信研究機構"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"clwit, Inc.","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/99578/files/IPSJ-SPT14008019.pdf"},"date":[{"dateType":"Available","dateValue":"2100-01-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT14008019.pdf","filesize":[{"value":"903.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"05de7a6c-fa9e-40bb-96cc-ca4be99c6264","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Institute of Electronics, Information and Communication Engineers\nThis SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"衛藤, 将史"},{"creatorName":"田中, 友英"},{"creatorName":"鈴木, 宏栄"},{"creatorName":"井上, 大介"},{"creatorName":"中尾, 康二"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masashi, Eto","creatorNameLang":"en"},{"creatorName":"Tomohide, Tanaka","creatorNameLang":"en"},{"creatorName":"Koei, Suzuki","creatorNameLang":"en"},{"creatorName":"Daisuke, Inoue","creatorNameLang":"en"},{"creatorName":"Koji, Nakao","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"巧妙化,多様化するサイバー攻撃に対応するため,ブラックホールモニタリング;高対話・低対話型ハニーポット,ウェブクローラ,サービス特化型ハニーポットなどのさまざまなサイパー攻撃観測センサが開発,運用されている.筆者らは,こういったさまざまな観測センサの中から,攻撃者に応じて最適なハニーポットを動的に選択して用いることで,より柔軟にサイバー攻撃情報を収集する能動的サイバー攻撃観測プラットフォーム (GHOST センサ) の研究開発を行っている.本手法は前述の柔軟な攻撃情報の収集だけでなく,観測対象となる IP アドレスや物理的なハードウェアなどの資源の有効利用にも役立つほか,クライアント型ハニーポットにおいて IP アドレスが攻撃者側のブラックリストに登録されることによる攻撃情報収集の効率低下に対しても有効であると考えられる.本稿では,提案手法のプロトタイプシステムの実装について述べ,その試験運用を通じて未知の攻撃元ホストからの攻撃情報収集能力,および資源の有効利用に関する評価を行う.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophisticted cyber attacks. The authors have proposed a proactive cyber attack monitoring platform (GHOST sensor), which dynamically assings a targeted IP address to an appropriate monitoring system so that sensors can flexibly observe cyber attacks. The system enables effective utilization of physical and logical resources such as hardware of honeypots and observed IP addresses. This paper introduces an implementation of a prototype system of GHOST sensor and evaluates the efficiency of attack observation and resource utilization.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2014-03-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"19","bibliographicVolumeNumber":"2014-SPT-8"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":99578,"links":{}}