{"created":"2023-05-15T10:01:45.681640+00:00","id":6416,"links":{},"metadata":{"_buckets":{"deposit":"e840a65d-e4fa-4026-9db5-2c6a6cb68a90"},"_deposit":{"created_by":5,"id":"6416","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"6416"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00006416","sets":["73","73:36","73:36:330","73:36:330:484"]},"author_link":["33700","14888","11847","33702","11839","33701","33699"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2021-09-28","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"129","bibliographicPageStart":"125","bibliographicVolumeNumber":"50","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In recent years, cyber-attacks such as unauthorized access and malware have been increasing along with the increasing use of network systems and the spread of new network technologies. Intrusion detection systems (IDS) have been attracting attention as one of the security technologies to protect systems from these cyber attacks. The accuracy of intrusion detection using deep learning is highly dependent on the data used for training, and a large amount of labeled training data is required. It is difficult to prepare a large amount of training data while taking into account the bias of the data. In this research, we propose a computationally efficient data expansion method using Jacobian-based Saliency Map Attack (JSMA), one of the adversarial example generation methods, and investigate how to improve the detection accuracy of signature-based IDS using deep learning models. To evaluate the proposed method, we built a small-scale model, extracted data with low classification accuracy, and extended the data with adversarial samples that were perturbed to bring them closer to the correct class, and compared the detection accuracy before and after the data extension. As a result of the experiment, the detection accuracy after the data expansion using the adversarial example was found to be better than that before the data expansion in terms of Accuracy, Recall, and F1-score. Although the proposed method improves the detection performance against attacks, it also increases the possibility of false positives, which requires improvements to reduce the degradation of Precision.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"川畑, 魁星","creatorNameLang":"ja"},{"creatorName":"カワバタ, カイセイ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"金丸, 和樹","creatorNameLang":"ja"},{"creatorName":"カネマル, カズキ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Aburada, Kentaro","creatorNameLang":"en"},{"creatorName":"油田, 健太郎","creatorNameLang":"ja"},{"creatorName":"アブラダ, ケンタロウ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"Kawabata, Kaisei","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kanemaru, Kazuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2021-10-26"}],"displaytype":"detail","filename":"Engineering_50_p125-p129.pdf","filesize":[{"value":"1.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/6416/files/Engineering_50_p125-p129.pdf"},"version_id":"be99c972-7345-4edf-921a-f9a44b566f73"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Intrusion detection system","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Data expansion","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Adversarial example","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Jacobian-based saliency map attack","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"侵入検知システムの検知精度向上のための敵対的サンプルによるデータ拡張法の検討","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"侵入検知システムの検知精度向上のための敵対的サンプルによるデータ拡張法の検討","subitem_title_language":"ja"},{"subitem_title":"Data Expansion Using Adversarial Examples to Improve the Accuracy of Intrusion Detection Systems","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","484"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2021-10-26"},"publish_date":"2021-10-26","publish_status":"0","recid":"6416","relation_version_is_last":true,"title":["侵入検知システムの検知精度向上のための敵対的サンプルによるデータ拡張法の検討"],"weko_creator_id":"5","weko_shared_id":-1},"updated":"2023-09-06T06:30:09.642856+00:00"}