{"created":"2023-05-15T10:01:20.779290+00:00","id":5889,"links":{},"metadata":{"_buckets":{"deposit":"92e19d7f-ec0b-46e5-918f-98b8ecf021f6"},"_deposit":{"created_by":5,"id":"5889","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"5889"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00005889","sets":["73","73:36","73:36:330","73:36:330:329"]},"author_link":["11839","28362","11847","14888"],"item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"リアルタイムセイ オ コウリョシタ エントロピーベースDDoS コウゲキケンチシュホウ ノ テイアン","subitem_alternative_title_language":"ja-Kana"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2019-07","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"181","bibliographicPageStart":"167","bibliographicVolumeNumber":"48","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"From the background that the risk of DDoS attacks is increasing year by year, it is important to detect attacks in real time and quickly shift to attack mitigation processing. Entropy methods with high detection accuracy and speed computation are widely used as one of the DDoS attacks detection approach to improve real-time performance. On the other hand, although the entropy method is recommended to use a wide window size to reduce the influence of noise, not only the processing efficiency degrades when the window size is increased but also the attack detection delays since the interval of detection processing increases. In addition, the attack detection using the entropy is important to learn the average and variance parameters from the latest data with a small degree of abnormality in order to determine the optimum threshold. Our method reduces the influence of noise with shortening the detection interval by applying the existing data mining method with efficient aggregation processing and sequentially learns the latest data in the period except for the burst traffic to automatically adjust the parameter. Experimental results show that our method has the Precision up to 0.978 and the Accuracy up to 0.992, these values are inferior to the maximum 1.0 with existing method, however, sufficient detection accuracy. On the other hand, in CICIDS 2017, the Precision was as low as 0.790 at the maximum. Although our method extracted the attack observation period, we need to calculate the abnormality for each host in the future. In terms of the processing time, proposal method is faster than the 296μsec of existing method. The performance is also higher than the basic entropy detection method. In future work, we need to evaluate the performance using real data traffic.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Aburada, Kentaro","creatorNameLang":"en"},{"creatorName":"油田, 健太郎","creatorNameLang":"ja"},{"creatorName":"アブラダ, ケンタロウ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"臼崎, 翔太郎","creatorNameLang":"ja"},{"creatorName":"ウスザキ, ショウタロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Usuzaki, Shotaro","creatorNameLang":"en"},{"creatorName":"臼﨑, 翔太郎","creatorNameLang":"ja"}],"familyNames":[{},{},{},{}],"givenNames":[{},{},{},{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"167-181.pdf","filesize":[{"value":"2.4 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/5889/files/167-181.pdf"},"version_id":"9b66ed19-b131-4250-80f9-d53078da0591"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"DDoS, Entropy, Aggregation pyramid, Real-time detection, Burst detection","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"リアルタイム性を考慮したエントロピーベースDDoS攻撃検知手法の提案","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"リアルタイム性を考慮したエントロピーベースDDoS攻撃検知手法の提案","subitem_title_language":"ja"},{"subitem_title":"A Proposal of Real-Time Entropy-based DDoS Attack Detection Method","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","329"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-06-21"},"publish_date":"2020-06-21","publish_status":"0","recid":"5889","relation_version_is_last":true,"title":["リアルタイム性を考慮したエントロピーベースDDoS攻撃検知手法の提案"],"weko_creator_id":"5","weko_shared_id":2},"updated":"2023-10-12T00:40:33.457044+00:00"}