{"created":"2023-05-15T12:00:48.130220+00:00","id":7755,"links":{},"metadata":{"_buckets":{"deposit":"42f4f79b-1d93-4580-beaa-858d59a5a424"},"_deposit":{"created_by":3,"id":"7755","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"7755"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00007755","sets":["8:24"]},"author_link":["33712","33713","20772"],"item_21_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2021-08-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"312","bibliographicPageEnd":"41","bibliographicPageStart":"32","bibliographicVolumeNumber":"312","bibliographic_titles":[{"bibliographic_title":"Lecture Notes in Networks and Systems"}]}]},"item_21_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"As organizations drastically expand their usage of collaborative systems and multi-user applications during this period of mass remote work, it is crucial to understand and manage the risks that such platforms may introduce. Improperly or carelessly deployed and configured systems hide security threats that can impact not only a single organization, but the whole economy. Cloud-based architecture is used in many collaborative systems, such as audio/video conferencing, collaborative document sharing/editing, distance learning and others. Therefore, it is important to understand that safety risk can be triggered by attacks on remote servers and confidential information might be compromised. In this paper, we present an AI powered application that aims to constantly introspect multiple virtual servers in order to detect malicious activities based on their anomalous behavior. Once the suspicious process(es) detected, the application in real-time notifies system administrator about the potential threat. Developed software is able to detect user-space based keyloggers, rootkits, process hiding and other intrusion artifacts via agent-less operation, by operating directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Conducted experiments on more than twenty different types of malicious applications provide evidence of high detection accuracy.","subitem_description_type":"Abstract"}]},"item_21_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"13th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2021), September 1-3, 2021, Asia University, Virtual Conference (Online Presentation)","subitem_description_type":"Other"}]},"item_21_description_60":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"Journal Article","subitem_description_type":"Other"}]},"item_21_publisher_7":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer, Cham"}]},"item_21_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1007/978-3-030-84910-8_4","subitem_relation_type_select":"DOI"}}]},"item_21_relation_9":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-3-030-84909-2","subitem_relation_type_select":"ISBN"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-3-030-84910-8","subitem_relation_type_select":"ISBN"}}]},"item_21_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (c) Springer Nature Switzerland AG 2021. This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Networks and Systems. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-84910-8_4."}]},"item_21_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"yes"}]},"item_21_text_36":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"City University of New York, City College"},{"subitem_text_value":"City University of New York, City College"},{"subitem_text_value":"Kyushu Institute of Technology"}]},"item_21_text_63":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"9782"}]},"item_21_version_type_58":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Huseynov,  Huseyn"}],"nameIdentifiers":[{"nameIdentifier":"33712","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Saadawi,  Tarek"}],"nameIdentifiers":[{"nameIdentifier":"33713","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Kourai, Kenichi","creatorNameLang":"en"},{"creatorName":"光来, 健一","creatorNameLang":"ja"},{"creatorName":"コウライ, ケンイチ","creatorNameLang":"ja-Kana"}],"familyNames":[{"familyName":"Kourai","familyNameLang":"en"},{"familyName":"光来","familyNameLang":"ja"},{"familyName":"コウライ","familyNameLang":"ja-Kana"}],"givenNames":[{"givenName":"Kenichi","givenNameLang":"en"},{"givenName":"健一","givenNameLang":"ja"},{"givenName":"ケンイチ","givenNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"20772","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60372463","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000060372463"},{"nameIdentifier":"12143198700","nameIdentifierScheme":"Scopus著者ID","nameIdentifierURI":"https://www.scopus.com/authid/detail.uri?authorId=12143198700"},{"nameIdentifier":"0000-0002-5455-4418","nameIdentifierScheme":"ORCiD","nameIdentifierURI":"https://orcid.org/0000-0002-5455-4418"},{"nameIdentifier":"303","nameIdentifierScheme":"九工大研究者情報","nameIdentifierURI":"https://hyokadb02.jimu.kyutech.ac.jp/html/303_ja.html"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2022-08-08"}],"displaytype":"detail","filename":"RECN_2021-09.pdf","filesize":[{"value":"240.0 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"RECN_2021-09.pdf","url":"https://kyutech.repo.nii.ac.jp/record/7755/files/RECN_2021-09.pdf"},"version_id":"b01a47d2-195e-4e70-a677-8a0c1e65b537"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Bio-inspired VM Introspection for Securing Collaboration Platforms","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Bio-inspired VM Introspection for Securing Collaboration Platforms"}]},"item_type_id":"21","owner":"3","path":["24"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-08-08"},"publish_date":"2022-08-08","publish_status":"0","recid":"7755","relation_version_is_last":true,"title":["Bio-inspired VM Introspection for Securing Collaboration Platforms"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-10-25T08:59:10.052138+00:00"}