{"created":"2023-05-15T12:00:17.648413+00:00","id":7044,"links":{},"metadata":{"_buckets":{"deposit":"8ee179c0-ed52-4c0c-a67b-00926c9805f3"},"_deposit":{"created_by":3,"id":"7044","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"7044"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00007044","sets":["15:20"]},"author_link":["30432","30431","5853","20772"],"item_23_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020-11","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_23_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"We designed and developed a novel application that applies blockchain technology in cybersecurity. This architecture allows different companies to come together to promptly exchange cyberattack information in a secure way to detect coordinated or distributed attacks. In addition to this, the architecture allows the public node to connect to the blockchain network and retrieve the stored attack information in real-time. The processes involved in exchanging the attack information are: (i) extraction of the attack information, (ii) preparing and submitting it as transactions to a blockchain network, (iii) verification of the submitted information, (iv) validation and chaining the transaction to blockchain and (v) distribution to other blockchain nodes. The novelty in the proposed work is that the architecture facilitates scalable and secured attack features exchange and ensures the integrity and consistency of the shared features. Furthermore, it detects and prevents malicious activities on the stored data from both outsider and insider threats, it presents the features in a standard format which encourages heterogeneous IDS nodes participation, and finally, it is robust to public IDS nodes joining and leaving the blockchain network.","subitem_description_type":"Abstract"}]},"item_23_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"US-Japan binational research community Workshop on Programmable Networking, November 16-18, 2020 (US dates), online","subitem_description_type":"Other"}]},"item_23_description_60":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"Conference Paper","subitem_description_type":"Other"}]},"item_23_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"yes"}]},"item_23_text_37":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"City University of New York, City College (CCNY)"},{"subitem_text_value":"City University of New York, City College (CCNY)"},{"subitem_text_value":"Kyushu Institute of Technology"},{"subitem_text_value":"Kyushu Institute of Technology"}]},"item_23_text_62":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"8827"}]},"item_23_version_type_58":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ajayi,  Oluwaseyi"}],"nameIdentifiers":[{"nameIdentifier":"30431","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Saadawi,  Tarek"}],"nameIdentifiers":[{"nameIdentifier":"30432","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Kourai, Kenichi","creatorNameLang":"en"},{"creatorName":"光来, 健一","creatorNameLang":"ja"},{"creatorName":"コウライ, ケンイチ","creatorNameLang":"ja-Kana"}],"familyNames":[{"familyName":"Kourai","familyNameLang":"en"},{"familyName":"光来","familyNameLang":"ja"},{"familyName":"コウライ","familyNameLang":"ja-Kana"}],"givenNames":[{"givenName":"Kenichi","givenNameLang":"en"},{"givenName":"健一","givenNameLang":"ja"},{"givenName":"ケンイチ","givenNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"20772","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60372463","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000060372463"},{"nameIdentifier":"12143198700","nameIdentifierScheme":"Scopus著者ID","nameIdentifierURI":"https://www.scopus.com/authid/detail.uri?authorId=12143198700"},{"nameIdentifier":"0000-0002-5455-4418","nameIdentifierScheme":"ORCiD","nameIdentifierURI":"https://orcid.org/0000-0002-5455-4418"},{"nameIdentifier":"303","nameIdentifierScheme":"九工大研究者情報","nameIdentifierURI":"https://hyokadb02.jimu.kyutech.ac.jp/html/303_ja.html"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Tsuru, Masato","creatorNameLang":"en"},{"creatorName":"鶴, 正人","creatorNameLang":"ja"},{"creatorName":"ツル, マサト","creatorNameLang":"ja-Kana"}],"familyNames":[{"familyName":"Tsuru","familyNameLang":"en"},{"familyName":"鶴","familyNameLang":"ja"},{"familyName":"ツル","familyNameLang":"ja-Kana"}],"givenNames":[{"givenName":"Masato","givenNameLang":"en"},{"givenName":"正人","givenNameLang":"ja"},{"givenName":"マサト","givenNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"5853","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"40231443","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000040231443"},{"nameIdentifier":"7005093872","nameIdentifierScheme":"Scopus著者ID","nameIdentifierURI":"https://www.scopus.com/authid/detail.uri?authorId=7005093872"},{"nameIdentifier":"0000-0001-7340-6798","nameIdentifierScheme":"ORCiD","nameIdentifierURI":"https://orcid.org/0000-0001-7340-6798"},{"nameIdentifier":"206","nameIdentifierScheme":"九工大研究者情報","nameIdentifierURI":"https://hyokadb02.jimu.kyutech.ac.jp/html/206_ja.html"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2021-05-13"}],"displaytype":"detail","filename":"RECN_2020-19.pdf","filesize":[{"value":"148.0 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"RECN_2020-19.pdf","url":"https://kyutech.repo.nii.ac.jp/record/7044/files/RECN_2020-19.pdf"},"version_id":"6db5ae4c-b356-4bc7-b410-431adfac5a2c"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Blockchain-based Architecture for Interdomain Cybersecurity Research","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Blockchain-based Architecture for Interdomain Cybersecurity Research"}]},"item_type_id":"23","owner":"3","path":["20"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-05-13"},"publish_date":"2021-05-13","publish_status":"0","recid":"7044","relation_version_is_last":true,"title":["Blockchain-based Architecture for Interdomain Cybersecurity Research"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-10-25T10:44:14.785242+00:00"}