WEKO3
-
RootNode
アイテム
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users
https://ipsj.ixsq.nii.ac.jp/records/225368
https://ipsj.ixsq.nii.ac.jp/records/225368c5996ede-fe4e-46a6-8b17-c68b323307bd
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]()
2025年3月15日からダウンロード可能です。
|
Copyright (c) 2023 by the Information Processing Society of Japan
|
|
非会員:¥0, IPSJ:学会員:¥0, 論文誌:会員:¥0, DLIB:会員:¥0 |
Item type | Journal(1) | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2023-03-15 | |||||||||||||
タイトル | ||||||||||||||
タイトル | Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users | |||||||||||||
タイトル | ||||||||||||||
言語 | en | |||||||||||||
タイトル | Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users | |||||||||||||
言語 | ||||||||||||||
言語 | eng | |||||||||||||
キーワード | ||||||||||||||
主題Scheme | Other | |||||||||||||
主題 | [特集:本格的なDXを支えるためのインターネットと運用技術] security notification, IoT malware infection, simulation, ISP | |||||||||||||
資源タイプ | ||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||
資源タイプ | journal article | |||||||||||||
著者所属 | ||||||||||||||
Yokohama National University/Advanced Institute of Industrial Technology | ||||||||||||||
著者所属 | ||||||||||||||
NTT Data Mathematical Systems Inc. | ||||||||||||||
著者所属 | ||||||||||||||
Yokohama National University/National Institute of Information and Communications Technology | ||||||||||||||
著者所属 | ||||||||||||||
Yokohama National University | ||||||||||||||
著者所属(英) | ||||||||||||||
en | ||||||||||||||
Yokohama National University / Advanced Institute of Industrial Technology | ||||||||||||||
著者所属(英) | ||||||||||||||
en | ||||||||||||||
NTT Data Mathematical Systems Inc. | ||||||||||||||
著者所属(英) | ||||||||||||||
en | ||||||||||||||
Yokohama National University / National Institute of Information and Communications Technology | ||||||||||||||
著者所属(英) | ||||||||||||||
en | ||||||||||||||
Yokohama National University | ||||||||||||||
著者名 |
Xuping, Huang
× Xuping, Huang
× Shunsuke, Mochizuki
× Akira, Fujita
× Katsunari, Yoshioka
|
|||||||||||||
著者名(英) |
Xuping, Huang
× Xuping, Huang
× Shunsuke, Mochizuki
× Akira, Fujita
× Katsunari, Yoshioka
|
|||||||||||||
論文抄録 | ||||||||||||||
内容記述タイプ | Other | |||||||||||||
内容記述 | In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.31(2023) (online) DOI http://dx.doi.org/10.2197/ipsjjip.31.165 ------------------------------ |
|||||||||||||
論文抄録(英) | ||||||||||||||
内容記述タイプ | Other | |||||||||||||
内容記述 | In recent years, malware-infected devices, such as Mirai, have been used to conduct impactful attacks like massive DDoS attacks. Internet Service Providers (ISPs) respond by sending security notifications to infected users, instructing them to remove the malware; however, there are no approaches to quantify or simulate the performance and effectiveness of the notification activities. In this paper, we propose a model of security notification by ISPs. In the proposed model, we simulate the security notification with composite parameters, indicating the nature of malware attacks such as persistence of malware, user response ratio, and notification efforts by ISPs, and then discuss their effectiveness. Moreover, we conduct a simulation based on the actual attack. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.31(2023) (online) DOI http://dx.doi.org/10.2197/ipsjjip.31.165 ------------------------------ |
|||||||||||||
書誌レコードID | ||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||
収録物識別子 | AN00116647 | |||||||||||||
書誌情報 |
情報処理学会論文誌 巻 64, 号 3, 発行日 2023-03-15 |
|||||||||||||
ISSN | ||||||||||||||
収録物識別子タイプ | ISSN | |||||||||||||
収録物識別子 | 1882-7764 | |||||||||||||
公開者 | ||||||||||||||
言語 | ja | |||||||||||||
出版者 | 情報処理学会 |