{"created":"2023-05-15T11:04:31.070164+00:00","links":{},"metadata":{"_buckets":{"deposit":"808c4c5e-1837-4ab3-b966-ef32528c94bc"},"_deposit":{"id":"2378.1","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"2378.1"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00002378.1","sets":["73","73:36","73:36:330:314"]},"author_link":["11837","11838","11839","11840","11841"],"item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワーク サービス フノウ コウゲキ ノ ツイセキ シュホウ ノ ヒョウカ ニ カンスル ケントウ","subitem_alternative_title_language":"ja-Kana"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2004-10","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"390","bibliographicPageStart":"383","bibliographicVolumeNumber":"33","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Abstract \nRecently, frequency of Denial of Service attacks are increased, and it is difficult to trace \npackets with incorrect or \"spoofed\", source address Savage et al. proposed a method to trace \nflooding attacks by \"marking\" packets. This method, however, has some problems including the \ntime consuming for gathering packets to re-configure the attacking paths. Okazaki et al. proposed \na method to solve this problem by extending marking area in each packet. \nIn this paper, we will implement the both algorithms to estimate the usability of them. From the \nresults of some experiments, we will conclude the effectiveness of the extended method.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"河村, 栄寿","creatorNameLang":"ja"},{"creatorName":"カワムラ, シゲヒサ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"11837","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"坂元, 一正"},{"creatorName":"サカモト, カズマサ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"11838","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"岡崎, 直宣"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"},{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"11839","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"90347047","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=90347047"}]},{"creatorNames":[{"creatorName":"Kawamura, Shigehisa","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"11840","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Sakamoto, Kazumasa","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"11841","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"KJ00002428273.pdf","filesize":[{"value":"1.1 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"KJ00002428273.pdf","url":"https://miyazaki-u.repo.nii.ac.jp/record/2378.1/files/KJ00002428273.pdf"},"version_id":"46628595-a5a0-424c-a301-75f605825e73"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Denial of Service attacks, IP trace-back","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"ネットワークサービス不能攻撃の追跡手法の評価に関する検討","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ネットワークサービス不能攻撃の追跡手法の評価に関する検討","subitem_title_language":"ja"},{"subitem_title":"An experimental evaluation of trace-back techniques of Denial of Service attacks","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"2","path":["36","73","314"],"pubdate":{"attribute_name":"公開日","attribute_value":"2007-06-28"},"publish_date":"2007-06-28","publish_status":"0","recid":"2378.1","relation_version_is_last":true,"title":["ネットワークサービス不能攻撃の追跡手法の評価に関する検討"],"weko_creator_id":"2","weko_shared_id":2},"updated":"2023-07-29T11:23:58.293115+00:00"}