WEKO3
アイテム
トラフィック特性による正当なユーザとDDoS攻撃の識別手法の提案
http://hdl.handle.net/10458/6438
http://hdl.handle.net/10458/64385242fb7a-748c-4089-9cdd-a0e7e8519ccf
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2020-06-21 | |||||
タイトル | ||||||
タイトル | トラフィック特性による正当なユーザとDDoS攻撃の識別手法の提案 | |||||
言語 | ja | |||||
タイトル | ||||||
タイトル | Introduction of Traffic Characteristics to Distinguish Legitimate User Traffic from DDoS Attack Traffic | |||||
言語 | en | |||||
言語 | ||||||
言語 | jpn | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | DDoS attack, distinction between human and attack, traffic characteristic | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | departmental bulletin paper | |||||
著者 |
臼崎, 翔太郎
× 臼崎, 翔太郎× 有川, 佑樹× 山場, 久昭× 油田, 健太郎× 岡崎, 直宣× 臼崎, 翔太郎× 有川, 佑樹 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | DDoS attack is a serious threat in the current information society where the Internet plays an important role as social infrastructure. Since this attack transmits data so that there is no difference in behaviors from legitimate users, it is difficult to distinguish the user from the attack traffic. Therefore, legitimate users cannot receive the service when their traffic are erroneously detected as the attack. We had previously proposed a system that guarantees continuous service use of legitimate users by introducing a quarantine server apart from the web server that performs ordinary web services. The quarantine server has a function of identifying legitimate users and attacks from the access detected as the attack by the IDS or the firewall. Our previous method finds the legitimate user by extracting feature from the access log after the communication is finished. In other words, this method performs the analyzing after the service is over. Therefore, the previous method is not suitable for continuous service of legitimate users. In this study, we propose a new method that can distinguish between legitimate users and attacks even if the services running. As a result of the experiment, we confirmed that the proposed method can distinguish between legitimate users from attacks. | |||||
言語 | en | |||||
書誌情報 |
ja : 宮崎大学工学部紀要 en : Memoirs of Faculty of Engineering, University of Miyazaki 巻 47, p. 201-209, 発行日 2018-07 |
|||||
出版者 | ||||||
出版者 | 宮崎大学工学部 | |||||
言語 | ja | |||||
出版者 | ||||||
出版者 | Faculty of Engineering, University of Miyazaki | |||||
言語 | en | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 05404924 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA00732558 | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |