@article{oai:miyazaki-u.repo.nii.ac.jp:00005681, author = {臼崎, 翔太郎 and Usuzaki, Shotaro and 臼﨑, 翔太郎 and 有川, 佑樹 and Arikawa, Yuki and Yamaba, Hisaaki and 山場, 久昭 and Aburada, Kentaro and 油田, 健太郎 and Okazaki, Naonobu and 岡崎, 直宣 and 臼崎, 翔太郎 and Usuzaki, Shotaro and 臼﨑, 翔太郎 and 有川, 佑樹 and Arikawa, Yuki}, journal = {宮崎大学工学部紀要, Memoirs of Faculty of Engineering, University of Miyazaki}, month = {Jul}, note = {DDoS attack is a serious threat in the current information society where the Internet plays an important role as social infrastructure. Since this attack transmits data so that there is no difference in behaviors from legitimate users, it is difficult to distinguish the user from the attack traffic. Therefore, legitimate users cannot receive the service when their traffic are erroneously detected as the attack. We had previously proposed a system that guarantees continuous service use of legitimate users by introducing a quarantine server apart from the web server that performs ordinary web services. The quarantine server has a function of identifying legitimate users and attacks from the access detected as the attack by the IDS or the firewall. Our previous method finds the legitimate user by extracting feature from the access log after the communication is finished. In other words, this method performs the analyzing after the service is over. Therefore, the previous method is not suitable for continuous service of legitimate users. In this study, we propose a new method that can distinguish between legitimate users and attacks even if the services running. As a result of the experiment, we confirmed that the proposed method can distinguish between legitimate users from attacks.}, pages = {201--209}, title = {トラフィック特性による正当なユーザとDDoS攻撃の識別手法の提案}, volume = {47}, year = {2018}, yomi = {ウスザキ, ショウタロウ and アリカワ, ユウキ and ヤマバ, ヒサアキ and アブラダ, ケンタロウ and オカザキ, ナオノブ and ウスザキ, ショウタロウ and アリカワ, ユウキ} }