{"created":"2023-05-15T09:58:33.818624+00:00","id":2545,"links":{},"metadata":{"_buckets":{"deposit":"08b040d5-6b68-481d-a3c2-c97c497494da"},"_deposit":{"created_by":5,"id":"2545","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"2545"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00002545","sets":["73","73:36","73:36:330","73:36:330:317"]},"author_link":["13076","11839","15482"],"item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"トラフィック カンシ オ モチイタ ネットワーク コウゲキ ノ ツイセキ シュホウ ノ テイアン ト ヒョウカ","subitem_alternative_title_language":"ja-Kana"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2007-08-30","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"264","bibliographicPageStart":"257","bibliographicVolumeNumber":"36","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In recent years, DoS (Denial of Service) attack and more powerful DDoS (Distributed DoS) attack pose security problems on the Internet. As the measure to these attacks, it is important to trace attackers and stop the attacks. However, since information of the attacker is \"spoofed\", it is difficult to trace. Therefore, the method of specifying attackers is required. Savage et al. proposed a method to trace flooding attacks by \"marking\" packets. This method, however, has some problems gathering the attack packets through a lot of hops. In this paper, we propose a method to solve this problem by observing the feature of attack traffic and change the \"marking probability\" of the routers. we implement the both algorithm to estimate the usability of them. From the results of some experiments, we will conclude the effectiveness of our proposed scheme.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"矢羽田, 哲也","creatorNameLang":"ja"},{"creatorName":"ヤハタ, テツヤ","creatorNameLang":"ja-Kana"},{"creatorName":"Yahata, Tetsuya","creatorNameLang":"en"}],"familyNames":[{"familyName":"矢羽田","familyNameLang":"ja"},{"familyName":"ヤハタ","familyNameLang":"ja-Kana"},{"familyName":"Yahata","familyNameLang":"en"}],"givenNames":[{"givenName":"哲也","givenNameLang":"ja"},{"givenName":"テツヤ","givenNameLang":"ja-Kana"},{"givenName":"Tetsuya","givenNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"13076","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"古賀, 勝寛","creatorNameLang":"ja"},{"creatorName":"コガ, カツヒロ","creatorNameLang":"ja-Kana"},{"creatorName":"Koga, Katsuhiro","creatorNameLang":"en"}],"familyNames":[{"familyName":"古賀","familyNameLang":"ja"},{"familyName":"コガ","familyNameLang":"ja-Kana"},{"familyName":"Koga","familyNameLang":"en"}],"givenNames":[{"givenName":"勝寛","givenNameLang":"ja"},{"givenName":"カツヒロ","givenNameLang":"ja-Kana"},{"givenName":"Katsuhiro","givenNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"15482","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"https://isni.org/isni/"}],"affiliationNames":[{"affiliationName":"宮崎大学","affiliationNameLang":"ja"},{"affiliationName":"University of Miyazaki","affiliationNameLang":"en"}]}],"creatorNames":[{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"},{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"}],"familyNames":[{"familyName":"岡崎","familyNameLang":"ja"},{"familyName":"オカザキ","familyNameLang":"ja-Kana"},{"familyName":"Okazaki","familyNameLang":"en"}],"givenNames":[{"givenName":"直宣","givenNameLang":"ja"},{"givenName":"ナオノブ","givenNameLang":"ja-Kana"},{"givenName":"Naonobu","givenNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"11839","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"90347047","nameIdentifierScheme":"e-Rad_Researcher","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=90347047"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"矢羽田, 哲也","creatorNameLang":"ja"},{"creatorName":"ヤハタ, テツヤ","creatorNameLang":"ja-Kana"},{"creatorName":"Yahata, Tetsuya","creatorNameLang":"en"}],"familyNames":[{"familyName":"矢羽田","familyNameLang":"ja"},{"familyName":"ヤハタ","familyNameLang":"ja-Kana"},{"familyName":"Yahata","familyNameLang":"en"}],"givenNames":[{"givenName":"哲也","givenNameLang":"ja"},{"givenName":"テツヤ","givenNameLang":"ja-Kana"},{"givenName":"Tetsuya","givenNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"13076","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"古賀, 勝寛","creatorNameLang":"ja"},{"creatorName":"コガ, カツヒロ","creatorNameLang":"ja-Kana"},{"creatorName":"Koga, Katsuhiro","creatorNameLang":"en"}],"familyNames":[{"familyName":"古賀","familyNameLang":"ja"},{"familyName":"コガ","familyNameLang":"ja-Kana"},{"familyName":"Koga","familyNameLang":"en"}],"givenNames":[{"givenName":"勝寛","givenNameLang":"ja"},{"givenName":"カツヒロ","givenNameLang":"ja-Kana"},{"givenName":"Katsuhiro","givenNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"15482","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"KJ00004682897.pdf","filesize":[{"value":"990.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"KJ00004682897.pdf","url":"https://miyazaki-u.repo.nii.ac.jp/record/2545/files/KJ00004682897.pdf"},"version_id":"18bd602f-40e3-4167-9a4b-51529179a85e"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Denial of service, distributed DoS, IP spoofing, IP traceback, marking scheme, detecting attacks","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"トラフィック監視を用いたネットワーク攻撃の追跡手法の提案と評価","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"トラフィック監視を用いたネットワーク攻撃の追跡手法の提案と評価","subitem_title_language":"ja"},{"subitem_title":"A proposal of tracing method for distributed denial of service attacks by monitoring the feature of traffic","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","317"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2007-10-30"},"publish_date":"2007-10-30","publish_status":"0","recid":"2545","relation_version_is_last":true,"title":["トラフィック監視を用いたネットワーク攻撃の追跡手法の提案と評価"],"weko_creator_id":"5","weko_shared_id":2},"updated":"2025-01-09T05:37:13.227684+00:00"}