{"created":"2023-05-15T10:01:09.798210+00:00","id":5681,"links":{},"metadata":{"_buckets":{"deposit":"ab0d5f26-de4c-4dff-8c73-1301b79df660"},"_deposit":{"created_by":5,"id":"5681","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"5681"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00005681","sets":["73","73:36","73:36:330","73:36:330:328"]},"author_link":["11839","28362","11847","14888","28374"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-07","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"209","bibliographicPageStart":"201","bibliographicVolumeNumber":"47","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"DDoS attack is a serious threat in the current information society where the Internet plays an important role as social infrastructure. Since this attack transmits data so that there is no difference in behaviors from legitimate users, it is difficult to distinguish the user from the attack traffic. Therefore, legitimate users cannot receive the service when their traffic are erroneously detected as the attack. We had previously proposed a system that guarantees continuous service use of legitimate users by introducing a quarantine server apart from the web server that performs ordinary web services. The quarantine server has a function of identifying legitimate users and attacks from the access detected as the attack by the IDS or the firewall. Our previous method finds the legitimate user by extracting feature from the access log after the communication is finished. In other words, this method performs the analyzing after the service is over. Therefore, the previous method is not suitable for continuous service of legitimate users. In this study, we propose a new method that can distinguish between legitimate users and attacks even if the services running. As a result of the experiment, we confirmed that the proposed method can distinguish between legitimate users from attacks.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"有川, 佑樹","creatorNameLang":"ja"},{"creatorName":"アリカワ, ユウキ","creatorNameLang":"ja-Kana"},{"creatorName":"Arikawa, Yuki","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Aburada, Kentaro","creatorNameLang":"en"},{"creatorName":"油田, 健太郎","creatorNameLang":"ja"},{"creatorName":"アブラダ, ケンタロウ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"有川, 佑樹","creatorNameLang":"ja"},{"creatorName":"アリカワ, ユウキ","creatorNameLang":"ja-Kana"},{"creatorName":"Arikawa, Yuki","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"p201-209_vol47.pdf","filesize":[{"value":"1.7 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/5681/files/p201-209_vol47.pdf"},"version_id":"9b0ae2f8-8a8c-467d-a54d-0b9fb4907de4"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"DDoS attack, distinction between human and attack, traffic characteristic","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"トラフィック特性による正当なユーザとDDoS攻撃の識別手法の提案","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"トラフィック特性による正当なユーザとDDoS攻撃の識別手法の提案","subitem_title_language":"ja"},{"subitem_title":"Introduction of Traffic Characteristics to Distinguish Legitimate User Traffic from DDoS Attack Traffic","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","328"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-06-21"},"publish_date":"2020-06-21","publish_status":"0","recid":"5681","relation_version_is_last":true,"title":["トラフィック特性による正当なユーザとDDoS攻撃の識別手法の提案"],"weko_creator_id":"5","weko_shared_id":2},"updated":"2023-11-05T10:59:13.767736+00:00"}