WEKO3
アイテム
DDoS 攻撃ログデータ解析による人と攻撃通信判別に関する研究
http://hdl.handle.net/10458/6086
http://hdl.handle.net/10458/6086fa7b7824-da87-476d-afba-92fd89bdaf8b
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2020-06-21 | |||||||||||||||||||||||||||||
タイトル | ||||||||||||||||||||||||||||||
タイトル | DDoS 攻撃ログデータ解析による人と攻撃通信判別に関する研究 | |||||||||||||||||||||||||||||
言語 | ja | |||||||||||||||||||||||||||||
タイトル | ||||||||||||||||||||||||||||||
タイトル | Discriminating Legitimate Accesses from a Web Access Log Recorded During DDoS Attack | |||||||||||||||||||||||||||||
言語 | en | |||||||||||||||||||||||||||||
言語 | ||||||||||||||||||||||||||||||
言語 | jpn | |||||||||||||||||||||||||||||
キーワード | ||||||||||||||||||||||||||||||
言語 | en | |||||||||||||||||||||||||||||
主題Scheme | Other | |||||||||||||||||||||||||||||
主題 | HTTP-GET Flood attack, Web access log, Machine learning | |||||||||||||||||||||||||||||
資源タイプ | ||||||||||||||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||||||||||||||
資源タイプ | departmental bulletin paper | |||||||||||||||||||||||||||||
その他(別言語等)のタイトル | ||||||||||||||||||||||||||||||
その他のタイトル | DDoS コウゲキ ログ データ カイセキ ニ ヨ ル ジン ト コウゲキ ツウシン ハンベツ ニ カン ス ル ケンキュウ | |||||||||||||||||||||||||||||
著者 |
橘, 弘智
× 橘, 弘智× 有川, 祐樹× 臼崎, 翔太郎
WEKO
28362
× 久保田, 真一郎× 高塚, 佳代子× 山場, 久昭
WEKO
14888
× 岡崎, 直宣
WEKO
11839
× Tachibana, Hiroaki× 有川, 佑樹× 臼崎, 翔太郎
WEKO
28362
× 久保田, 真一郎 |
|||||||||||||||||||||||||||||
抄録 | ||||||||||||||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||||||||||||||
内容記述 | Web services are indispensable in everyday life, and damage caused by denial of service (DoS)/distributed denial of service (DDoS) attacks is becoming serious. An intrusion detection system (IDS) is very useful to detect various attacks including DDoS attacks. But an IDS often makes false detections, not a few legitimate accesses are reported as attacks. Then, there is a possibility that a legitimate user who is detected erroneously can not receive service . We proposed a system to mitigate HTTP-GET Flood attack that is one of DoS/DDoS attacks in the previous work. This system not only can protect servers from attacks using IDS but also can guarantee their services by introducing a server that picks out legitimate accesses in the accesses detected by the IDS. In this study, we propose a method to find out legitimate accesses that is the important part of the HTTP-GET Flood attack mitigation system. Information obtained from the access log is used in the method. Besides, since false detections such that an attack is picked out as a legitimate access make IDSs ineffective, the proposed method must keep such false detection rate low. We conducted an experiment that uses an access log of an actual server to verify the effectiveness of this system. The result of the experiment showed that the proposed method picked out many of the legitimate users that were charged by the IDS falsely and could practically avoid picking out malicious attacks by mistake. | |||||||||||||||||||||||||||||
言語 | en | |||||||||||||||||||||||||||||
書誌情報 |
ja : 宮崎大学工学部紀要 en : Memoirs of Faculty of Engineering, University of Miyazaki 巻 46, p. 239-246, 発行日 2017-07-31 |
|||||||||||||||||||||||||||||
出版者 | ||||||||||||||||||||||||||||||
出版者 | 宮崎大学工学部 | |||||||||||||||||||||||||||||
言語 | ja | |||||||||||||||||||||||||||||
出版者 | ||||||||||||||||||||||||||||||
出版者 | Faculty of Engineering, University of Miyazaki | |||||||||||||||||||||||||||||
言語 | en | |||||||||||||||||||||||||||||
ISSN | ||||||||||||||||||||||||||||||
収録物識別子タイプ | ISSN | |||||||||||||||||||||||||||||
収録物識別子 | 05404924 | |||||||||||||||||||||||||||||
書誌レコードID | ||||||||||||||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||||||||||||||
収録物識別子 | AA00732558 | |||||||||||||||||||||||||||||
著者版フラグ | ||||||||||||||||||||||||||||||
出版タイプ | VoR | |||||||||||||||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |