{"created":"2023-05-15T12:25:49.099130+00:00","id":1131,"links":{},"metadata":{"_buckets":{"deposit":"8302fb2d-15c5-4c22-91be-8551dca99df4"},"_deposit":{"created_by":4,"id":"1131","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"1131"},"status":"published"},"_oai":{"id":"oai:kait.repo.nii.ac.jp:00001131","sets":["2:16:42:129"]},"author_link":[],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-03-20","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"72","bibliographicPageStart":"65","bibliographicVolumeNumber":"39","bibliographic_titles":[{"bibliographic_title":"神奈川工科大学研究報告.B,理工学編"}]}]},"item_10002_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"A cyber-attack is any type of offensive maneuver (such as a DDoS attack) employed by individuals or organizations against infrastructures, computer networks, and/or personal computers and handheld devices. Assailants can attack targets using a variety of malicious actions, usually originating from anonymous sources, with the purpose of stealing from, altering, or destroying a specified target. Most Internet service providers have established countermeasures to DDoS attacks in their network backbones. These devices can control available bandwidth while implemented proxy responses, but they often cut off valid communications because it is impossible to clearly discern legitimate users from hidden attackers. In this paper, we consider about HTTP flood attacks provision method by server and clients. When a server determines attacks are in progress, it records the interval between the session establishment and update times and then diverts any further incoming attack messages to the virtual Web server(decoy server). If legitimate users are hijacked or tricked into attacking the server, the server displays an error page informing them of the nature of the attack and how to stop it.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.34411/00001124","subitem_identifier_reg_type":"JaLC"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"神奈川工科大学"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12669200","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"21882878","subitem_source_identifier_type":"PISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡崎, 美蘭","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"Okazaki, Mirang","creatorNameLang":"en"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-04-30"}],"displaytype":"detail","filename":"kkb-039-012.pdf","filesize":[{"value":"1.7 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"kkb-039-012.pdf","objectType":"fulltext","url":"https://kait.repo.nii.ac.jp/record/1131/files/kkb-039-012.pdf"},"version_id":"270562e1-55a5-4e2c-9893-180ad2d9e466"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"DoS","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"DDoS","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"HTTP-Get Flood","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"サーバ側とクライアント側とのマルチ手法によるDDoS 攻撃対策に関する考察","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"サーバ側とクライアント側とのマルチ手法によるDDoS 攻撃対策に関する考察","subitem_title_language":"ja"},{"subitem_title":"A Study of DDoS Attacks Provision Method by Server and Clients.","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"4","path":["129"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-11-24"},"publish_date":"2020-11-24","publish_status":"0","recid":"1131","relation_version_is_last":true,"title":["サーバ側とクライアント側とのマルチ手法によるDDoS 攻撃対策に関する考察"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-08-04T09:26:30.175619+00:00"}