{"created":"2023-05-15T12:16:54.928753+00:00","id":398,"links":{},"metadata":{"_buckets":{"deposit":"587238f4-062e-4129-9dba-5383f3f6d7e3"},"_deposit":{"created_by":3,"id":"398","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"398"},"status":"published"},"_oai":{"id":"oai:tuis.repo.nii.ac.jp:00000398","sets":["1:4:44:60"]},"author_link":["1649","1650","1651","1652","1653","1654"],"control_number":"398","item_1701328008552":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"東京情報大学","subitem_publisher_language":"ja"}]},"item_1_biblio_info_14":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2012-03-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicPageEnd":"25","bibliographicPageStart":"13","bibliographicVolumeNumber":"15","bibliographic_titles":[{"bibliographic_title":"東京情報大学研究論集","bibliographic_titleLang":"ja"}]}]},"item_1_creator_6":{"attribute_name":"著者名(日)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"水野, 雅継","creatorNameLang":"ja"},{"creatorName":"ミズノ, マサツグ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森口, 一郎","creatorNameLang":"ja"},{"creatorName":"モリグチ, イチロウ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mizuno, Masatsugu","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Moriguchi, Ichirou","creatorNameLang":"en"}]}]},"item_1_creator_7":{"attribute_name":"著者名よみ","attribute_type":"creator","attribute_value_mlt":[{"nameIdentifiers":[{}]},{"nameIdentifiers":[{}]}]},"item_1_creator_8":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"nameIdentifiers":[{}]},{"nameIdentifiers":[{}]}]},"item_1_description_1":{"attribute_name":"ページ属性","attribute_value_mlt":[{"subitem_description":"P(論文)","subitem_description_type":"Other"}]},"item_1_description_11":{"attribute_name":"抄録(日)","attribute_value_mlt":[{"subitem_description":"被害ホストが出力するログを解析してDDoS攻撃を検出し、攻撃ホストを探索して攻撃ホストに最も近いノードで攻撃を抑制するシステムの開発と評価を行った。従来は被害ホスト付近に設置されたファイアーウォールやIPSによって防御を行っていたが、この防御手法では攻撃ホストからファイアーウォールまでの負荷を減少させることはできない。本システムではシグネチャによって攻撃ホストを検出し、トレースバックを行って攻撃ホストからの経路を探索する。探索された経路から攻撃ホスト付近のノード情報を取得し、そのノードで攻撃を抑制することによって被害ホストから攻撃ホストまでのネットワーク負荷を低下させる。しかしログの転送にかかる時間と攻撃情報を他のノードに伝搬する遅延が大きく、反応するまでに時間がかかる。本システムの反応速度が改善され、プロバイダ等のルータに実装されると、DDoS被害の低減が期待できる。","subitem_description_language":"ja","subitem_description_type":"Other"}]},"item_1_description_12":{"attribute_name":"抄録(英)","attribute_value_mlt":[{"subitem_description":"We devised and evaluated a dispersion DDoS defense system. This system detects DDoS attacks by analyzing logs and looks for attacking computers. Usually attacks have been blocked by firewalls or IPSs near servers, however this defense technique cannot reduce malicious traffic between firewalls and servers. Our defense system blocks malicious traffic near assailants. This system detects attacks by signatures and finds the route toward the assailants by trace-back. As a result, this system can reduce that traffic between assailants and servers. However, at present this system takes time to propagate logs and attack information among defense nodes. If these delays will be improved, this system will be expected to reduce DDoS attacks drastically in the Internet world.","subitem_description_language":"en","subitem_description_type":"Other"}]},"item_1_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.15029/00000397","subitem_identifier_reg_type":"JaLC"}]},"item_1_source_id_13":{"attribute_name":"雑誌書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA11155514","subitem_source_identifier_type":"NCID"}]},"item_1_text_10":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_language":"en","subitem_text_value":"Tokyo University of Information Sciences, Faculty of Informatics, Department of Information Systems, Undergraduate Student"},{"subitem_text_language":"en","subitem_text_value":"Tokyo University of Information Sciences, Faculty of Informatics, Department of Information Systems"}]},"item_1_text_9":{"attribute_name":"著者所属(日)","attribute_value_mlt":[{"subitem_text_language":"ja","subitem_text_value":"東京情報大学総合情報学部情報システム学科学部学生"},{"subitem_text_language":"ja","subitem_text_value":"東京情報大学総合情報学部情報システム学科"}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2012-03-01"}],"displaytype":"detail","filename":"KJ00007699439.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","license_note":"TUIS","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"KJ00007699439","url":"https://tuis.repo.nii.ac.jp/record/398/files/KJ00007699439.pdf"},"version_id":"5017a46e-4afe-4b00-881d-856bfda4f383"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"DDoS","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"ファイアーウォール","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"セキュリティ","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"トレースバック","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"DDoS","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"firewall","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"trace-back","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"IPトレースバックを用いた分散協調型DDoS防御手法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"IPトレースバックを用いた分散協調型DDoS防御手法","subitem_title_language":"ja"},{"subitem_title":"Dispersion DDoS Defense Technique by Using IP Trace-back","subitem_title_language":"en"}]},"item_type_id":"1","owner":"3","path":["60"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2012-03-01"},"publish_date":"2012-03-01","publish_status":"0","recid":"398","relation_version_is_last":true,"title":["IPトレースバックを用いた分散協調型DDoS防御手法"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2023-12-22T02:16:05.927723+00:00"}