{"created":"2023-05-15T10:01:09.929120+00:00","id":5684,"links":{},"metadata":{"_buckets":{"deposit":"746b495c-1865-42dd-a33f-5b08f27f54b5"},"_deposit":{"created_by":5,"id":"5684","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"5684"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00005684","sets":["73","73:36","73:36:330","73:36:330:328"]},"author_link":["11839","28362","11847","14888"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-07","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"225","bibliographicPageStart":"221","bibliographicVolumeNumber":"47","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"The damage caused by DDoS (Distributed Denial-of-Service) attack is a big threat for modern society. It is expected that the damage will become bigger, therefore effective attack detection system is desired. In general, DDoS attack detection methods are roughly divided into signature type and anomaly type. The signature type has signature database that stores a pattern of an attack packet. This method detects the attack by comparing its characteristics with the signature every time a packet arrives. However, the more the pattern of registered attack increases, the more the responsiveness decreases because of computational complexity of pattern matching. On the other hand, the anomaly type detects the attack by using statistical information. This method detects attack by comparing statistical information of the current packet series and those of normal case for each window size. However, it has the trade-off relationship between detection accuracy and responsiveness. This is because it is necessary to widen the window size in order to improve the detection accuracy. The detection process is not performed until the window size is exceeded. In order to solve the problem, we propose the anomaly-based DDoS attack detection method using a data mining technique that can process when event occurs, while maintaining sufficient data necessary for detection processing. In this research, we evaluate the detection accuracy and the processing efficiency of the proposed method.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Aburada, Kentaro","creatorNameLang":"en"},{"creatorName":"油田, 健太郎","creatorNameLang":"ja"},{"creatorName":"アブラダ, ケンタロウ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"p221-225_vol47.pdf","filesize":[{"value":"958.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/5684/files/p221-225_vol47.pdf"},"version_id":"eba96c38-6252-40d4-a645-1f8a8d2a0fd7"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"network security, DDoS attack detection, data mining","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"リアルタイムバースト検出手法による即応性を考慮したDDoS攻撃検知手法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"リアルタイムバースト検出手法による即応性を考慮したDDoS攻撃検知手法","subitem_title_language":"ja"},{"subitem_title":"Highly Responsive Detection Method of Distributed Denial-of-Service Attacks Using Data Mining Technique","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","328"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-06-21"},"publish_date":"2020-06-21","publish_status":"0","recid":"5684","relation_version_is_last":true,"title":["リアルタイムバースト検出手法による即応性を考慮したDDoS攻撃検知手法"],"weko_creator_id":"5","weko_shared_id":2},"updated":"2023-10-12T00:40:33.827990+00:00"}