{"created":"2023-05-15T11:59:49.903919+00:00","id":6437,"links":{},"metadata":{"_buckets":{"deposit":"cc620c07-48c8-44a3-8c1e-35fdc5f36846"},"_deposit":{"created_by":3,"id":"6437","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"6437"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00006437","sets":["8:24"]},"author_link":["27948","8847","25154","27012","27013","19491"],"control_number":"6437","item_1689815586683":{"attribute_name":"CRID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://cir.nii.ac.jp/crid/1390001288151024256","subitem_relation_type_select":"URI"}}]},"item_21_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2019-07-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicPageEnd":"1407","bibliographicPageStart":"1404","bibliographicVolumeNumber":"E102.D","bibliographic_titles":[{"bibliographic_title":"IEICE Transactions on Information and Systems","bibliographic_titleLang":"en"}]}]},"item_21_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Some of the most serious threats to network security involve malware. One common way to detect malware-infected machines in a network is by monitoring communications based on blacklists. However, such detection is problematic because (1) no blacklist is completely reliable, and (2) blacklists do not provide the sufficient evidence to allow administrators to determine the validity and accuracy of the detection results. In this paper, we propose a malicious DNS query clustering approach for blacklist-based detection. Unlike conventional classification, our cause-based classification can efficiently analyze malware communications, allowing infected machines in the network to be addressed swiftly.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_21_link_62":{"attribute_name":"研究者情報","attribute_value_mlt":[{"subitem_link_url":"https://hyokadb02.jimu.kyutech.ac.jp/html/81_ja.html"}]},"item_21_publisher_7":{"attribute_name":"出版社","attribute_value_mlt":[{"subitem_publisher":"電子情報通信学会","subitem_publisher_language":"ja"}]},"item_21_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1587/transinf.2018EDL8211","subitem_relation_type_select":"DOI"}}]},"item_21_rights_13":{"attribute_name":"著作権関連情報","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2019 The Institute of Electronics, Information and Communication Engineers"}]},"item_21_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"yes"}]},"item_21_source_id_10":{"attribute_name":"NCID","attribute_value_mlt":[{"subitem_source_identifier":"AA10826272","subitem_source_identifier_type":"NCID"}]},"item_21_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1745-1361","subitem_source_identifier_type":"EISSN"},{"subitem_source_identifier":"0916-8532","subitem_source_identifier_type":"PISSN"}]},"item_21_subject_16":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"548","subitem_subject_scheme":"NDC"}]},"item_21_text_28":{"attribute_name":"論文ID(連携)","attribute_value_mlt":[{"subitem_text_value":"10350265"}]},"item_21_text_63":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"8145"}]},"item_21_version_type_58":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNames":[{}]}],"creatorNames":[{"creatorName":"Sato, Akihiro","creatorNameLang":"en"},{"creatorName":"佐藤, 彰洋","creatorNameLang":"ja"},{"creatorName":"サトウ, アキヒロ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{},{}]},{"creatorAffiliations":[{"affiliationNames":[{}]}],"creatorNames":[{"creatorName":"Nakamura, Yutaka","creatorNameLang":"en"},{"creatorName":"中村, 豊","creatorNameLang":"ja"},{"creatorName":"ナカムラ, ユタカ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{}]},{"creatorAffiliations":[{"affiliationNames":[{}]}],"creatorNames":[{"creatorName":"Nobayashi, Daiki","creatorNameLang":"en"},{"creatorName":"野林, 大起","creatorNameLang":"ja"},{"creatorName":"ノバヤシ, ダイキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"Sasai, Kazuto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kitagata, Gen","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNames":[{}]}],"creatorNames":[{"creatorName":"Ikenaga, Takeshi","creatorNameLang":"en"},{"creatorName":"池永, 全志","creatorNameLang":"ja"},{"creatorName":"イケナガ, タケシ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-03-05"}],"displaytype":"detail","filename":"transinf.2018EDL8211.pdf","filesize":[{"value":"177.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"transinf.2018EDL8211.pdf","url":"https://kyutech.repo.nii.ac.jp/record/6437/files/transinf.2018EDL8211.pdf"},"version_id":"12f3c392-d41e-4899-82b3-f8c733494d85"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"malware","subitem_subject_scheme":"Other"},{"subitem_subject":"blacklist","subitem_subject_scheme":"Other"},{"subitem_subject":"DNS query","subitem_subject_scheme":"Other"},{"subitem_subject":"machine learning","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Clustering Malicious DNS Queries for Blacklist-Based Detection","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Clustering Malicious DNS Queries for Blacklist-Based Detection","subitem_title_language":"en"}]},"item_type_id":"21","owner":"3","path":["24"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-03-05"},"publish_date":"2020-03-05","publish_status":"0","recid":"6437","relation_version_is_last":true,"title":["Clustering Malicious DNS Queries for Blacklist-Based Detection"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-01-29T01:19:08.687649+00:00"}