{"created":"2023-05-15T12:25:46.901817+00:00","id":1096,"links":{},"metadata":{"_buckets":{"deposit":"725b5b96-403c-4619-b038-5757a833721f"},"_deposit":{"created_by":4,"id":"1096","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"1096"},"status":"published"},"_oai":{"id":"oai:kait.repo.nii.ac.jp:00001096","sets":["2:16:42:127"]},"author_link":[],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2013-03-20","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"88","bibliographicPageStart":"85","bibliographicVolumeNumber":"37","bibliographic_titles":[{"bibliographic_title":"神奈川工科大学研究報告.B,理工学編"}]}]},"item_10002_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"This report proposes an egress strategy using authentication-based proxy for advanced persistent threats. This is the 3rd strategy for blocking backdoor communication, which is one of egress strategies proposed by \"A Guide of Design and Operation for a Countermeasure of Advanced Persistent Threats.\" This 3rd strategy uses an authentication-based proxy in order to discriminate malware communication and human communication. Even if a malware tries to communicate with a web server on Internet via a proxy server, the malware must be authenticated to pass through the proxy server. In that way, malware communication is blocked, while human communication is permitted. Blocking malware communication prevents the leak of confidential information and malware updates, etc.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.34411/00001089","subitem_identifier_reg_type":"JaLC"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"神奈川工科大学"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10074179","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"09161902","subitem_source_identifier_type":"PISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡本, 剛","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"Okamoto, Takeshi","creatorNameLang":"en"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2013-09-17"}],"displaytype":"detail","filename":"kkb-037-017.pdf","filesize":[{"value":"3.6 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"kkb-037-017.pdf","objectType":"fulltext","url":"https://kait.repo.nii.ac.jp/record/1096/files/kkb-037-017.pdf"},"version_id":"1697eccd-e526-4136-938a-46b76f14441f"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"authentication-based proxy","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"advanced persistent threats","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"egress strategy","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"malware","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"新しいタイプの攻撃に対する出口対策としての認証プロキシの導入","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"新しいタイプの攻撃に対する出口対策としての認証プロキシの導入","subitem_title_language":"ja"},{"subitem_title":"An Egress Strategy using Authentication-Based Proxy for Advanced Persistent Threats","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"4","path":["127"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-11-24"},"publish_date":"2020-11-24","publish_status":"0","recid":"1096","relation_version_is_last":true,"title":["新しいタイプの攻撃に対する出口対策としての認証プロキシの導入"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-08-04T09:23:30.614980+00:00"}