{"created":"2023-05-15T10:01:20.823197+00:00","id":5890,"links":{},"metadata":{"_buckets":{"deposit":"cf078238-1cb8-424b-87bf-c405e0212466"},"_deposit":{"created_by":5,"id":"5890","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"5890"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00005890","sets":["73","73:36","73:36:330","73:36:330:329"]},"author_link":["31739","31633","11847","14888","11839"],"control_number":"5890","item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"クライアント ノHTTP リクエスト ソウシン ドウサ ニ チャクモク シ タ ボ ッ ト ケンチ シュホウ","subitem_alternative_title_language":"ja-Kana"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2019-07","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"187","bibliographicPageStart":"183","bibliographicVolumeNumber":"48","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Attack detection comes to be more important because distributed denial of service (DDoS) attacks cause serious disruption to web servers. In addition, we have to achieve a further task to tell a new phenomenon called flash events and DDoS attacks apart. In recent years, the emergence of flash events, which are spikes in network traffic from legitimate users, has been seen frequently. Flash events are often recognized as DDoS attacks by mistake because of their large amount of traffic and numerous clients. We need to react to them in a different way, though their behaviors are similar. To realize this, we must identify the factors of them. In this paper, we propose a bot detection system that focuses on the HTTP request transmission behavior of clients to identify increases in traffic and clients. In an evaluation experiment, we evaluated the detection accuracy using datasets of flash events and DDoS attacks.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"藤, 竜成","creatorNameLang":"ja"},{"creatorName":"フジ, リュウセイ","creatorNameLang":"ja-Kana"},{"creatorName":"Fuji, Ryusei","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Aburada, Kentaro","creatorNameLang":"en"},{"creatorName":"油田, 健太郎","creatorNameLang":"ja"},{"creatorName":"アブラダ, ケンタロウ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"Fhji, Ryusei","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"183-187.pdf","filesize":[{"value":"2.2 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/5890/files/183-187.pdf"},"version_id":"b13c8344-8fb2-4755-8eae-028cfb4773ad"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"bot similarity, DDoS attack, flash event","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"クライアントのHTTPリクエスト送信動作に着目したボット検知手法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"クライアントのHTTPリクエスト送信動作に着目したボット検知手法","subitem_title_language":"ja"},{"subitem_title":"On a Bot Detection Method Focused on HTTP Request Transmission Behavior of Clients","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","329"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-06-21"},"publish_date":"2020-06-21","publish_status":"0","recid":"5890","relation_version_is_last":true,"title":["クライアントのHTTPリクエスト送信動作に着目したボット検知手法"],"weko_creator_id":"5","weko_shared_id":-1},"updated":"2023-10-09T09:52:51.222022+00:00"}