{"created":"2023-05-15T10:00:49.129629+00:00","id":5237,"links":{},"metadata":{"_buckets":{"deposit":"5988ed9b-707d-470a-b9dd-eeb51023dbb3"},"_deposit":{"created_by":5,"id":"5237","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"5237"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00005237","sets":["73","73:36","73:36:330","73:36:330:327"]},"author_link":["14889","11839","28362","28361","28367","28360","25736","14888","28374"],"item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"DDoS コウゲキ ログ データ カイセキ ニ ヨ ル ジン ト コウゲキ ツウシン ハンベツ ニ カン ス ル ケンキュウ"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2017-07-31","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"246","bibliographicPageStart":"239","bibliographicVolumeNumber":"46","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Web services are indispensable in everyday life, and damage caused by denial of service (DoS)/distributed denial of service (DDoS) attacks is becoming serious. An intrusion detection system (IDS) is very useful to detect various attacks including DDoS attacks. But an IDS often makes false detections, not a few legitimate accesses are reported as attacks. Then, there is a possibility that a legitimate user who is detected erroneously can not receive service . We proposed a system to mitigate HTTP-GET Flood attack that is one of DoS/DDoS attacks in the previous work. This system not only can protect servers from attacks using IDS but also can guarantee their services by introducing a server that picks out legitimate accesses in the accesses detected by the IDS. In this study, we propose a method to find out legitimate accesses that is the important part of the HTTP-GET Flood attack mitigation system. Information obtained from the access log is used in the method. Besides, since false detections such that an attack is picked out as a legitimate access make IDSs ineffective, the proposed method must keep such false detection rate low. We conducted an experiment that uses an access log of an actual server to verify the effectiveness of this system. The result of the experiment showed that the proposed method picked out many of the legitimate users that were charged by the IDS falsely and could practically avoid picking out malicious attacks by mistake.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"橘, 弘智","creatorNameLang":"ja"},{"creatorName":"タチバナ, ヒロアキ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"有川, 祐樹","creatorNameLang":"ja"},{"creatorName":"アリカワ, ユウキ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"久保田, 真一郎","creatorNameLang":"ja"},{"creatorName":"クボタ, シンイチロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Kubota, Shin-Ichiro","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高塚, 佳代子","creatorNameLang":"ja"},{"creatorName":"タカツカ, カヤコ","creatorNameLang":"ja-Kana"},{"creatorName":"Takatsuka, Kayoko","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"Tachibana, Hiroaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"有川, 佑樹","creatorNameLang":"ja"},{"creatorName":"アリカワ, ユウキ","creatorNameLang":"ja-Kana"},{"creatorName":"Arikawa, Yuki","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"久保田, 真一郎","creatorNameLang":"ja"},{"creatorName":"クボタ, シンイチロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Kubota, Shin-Ichiro","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"p239.pdf","filesize":[{"value":"1.2 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/5237/files/p239.pdf"},"version_id":"91b24dd6-7147-449e-a27d-e9de52d58636"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"HTTP-GET Flood attack, Web access log, Machine learning","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"DDoS 攻撃ログデータ解析による人と攻撃通信判別に関する研究","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"DDoS 攻撃ログデータ解析による人と攻撃通信判別に関する研究","subitem_title_language":"ja"},{"subitem_title":"Discriminating Legitimate Accesses from a Web Access Log Recorded During DDoS Attack","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","327"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-06-21"},"publish_date":"2020-06-21","publish_status":"0","recid":"5237","relation_version_is_last":true,"title":["DDoS 攻撃ログデータ解析による人と攻撃通信判別に関する研究"],"weko_creator_id":"5","weko_shared_id":2},"updated":"2023-11-05T10:59:13.295021+00:00"}