{"created":"2023-05-15T11:05:38.474246+00:00","links":{},"metadata":{"_buckets":{"deposit":"92f6f334-3c1d-476c-b7da-81c5f24d2d59"},"_deposit":{"id":"2929.1","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"2929.1"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00002929.1","sets":["73","73:36","73:36:330:313"]},"author_link":["11839","15523","15525"],"item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワーク サービス フノウ コウゲキ ノ ツイセキ シュホウ ニ カンスル イチケントウ"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2003-07","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"388","bibliographicPageStart":"381","bibliographicVolumeNumber":"32","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Abstract \nRecently, frequency of Denial of Service attacks are increased, and it is difficult to trace \npackets with incorrect or \"spoofed\", source address. Savage et al. proposed a method to trace \nflooding attacks by \"marking\" packets called \"marking method\". This paper describes an \nextension of marking method to reduce the computation time for reconstruct a path back to the \nattacker. We present an abstract algorithms for implementing our method and detail a concrete \nencoding strategy for our algorithm.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"},{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"11839","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"90347047","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=90347047"}]},{"creatorNames":[{"creatorName":"河村, 栄寿","creatorNameLang":"ja"},{"creatorName":"カワムラ, シゲヒサ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"15523","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Kawamura, Shigehisa","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"15525","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"KJ00002426441.pdf","filesize":[{"value":"816.7 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"KJ00002426441.pdf","url":"https://miyazaki-u.repo.nii.ac.jp/record/2929.1/files/KJ00002426441.pdf"},"version_id":"cc979108-09a5-4b30-8715-d4716d7f3987"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Denial of Service attacks, IP trace-back","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"ネットワークサービス不能攻撃の追跡手法に関する一検討","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ネットワークサービス不能攻撃の追跡手法に関する一検討","subitem_title_language":"ja"},{"subitem_title":"A Trace method for packets in Denial of Service attacks","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"2","path":["36","73","313"],"pubdate":{"attribute_name":"公開日","attribute_value":"2007-06-28"},"publish_date":"2007-06-28","publish_status":"0","recid":"2929.1","relation_version_is_last":true,"title":["ネットワークサービス不能攻撃の追跡手法に関する一検討"],"weko_creator_id":"2","weko_shared_id":2},"updated":"2023-07-29T11:15:13.439897+00:00"}