Project/Area Number |
18K18045
|
Research Category |
Grant-in-Aid for Early-Career Scientists
|
Allocation Type | Multi-year Fund |
Review Section |
Basic Section 60060:Information network-related
|
Research Institution | Nara Women's University (2022) Hiroshima Institute of Technology (2020-2021) Ritsumeikan University (2018-2019) |
Principal Investigator |
Takimoto Eiji 奈良女子大学, 情報基盤センター, 准教授 (90395054)
|
Project Period (FY) |
2018-04-01 – 2023-03-31
|
Project Status |
Completed (Fiscal Year 2022)
|
Budget Amount *help |
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2020: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2019: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
|
Keywords | 情報セキュリティ / ネットワーク / マルウェア / シミュレーション / ネットワークセキュリティ / ネットワークシミュレータ / DDoS攻撃 / ネットワークシミュレーション |
Outline of Final Research Achievements |
We created a node that imitates a Command & Control (C & C) server on a network simulator, and created a mechanism to communicate with malware Mirai and its variants for IoT devices that run on real devices. We also adopted a mechanism that does not depend on the network structure, and made it possible to operate malware without affecting the outside world by pulling all communication content into the simulator. This makes it easy to analyze and verify bot-based malware, and is expected to be applied to security enhancement and security education.
|
Academic Significance and Societal Importance of the Research Achievements |
情報セキュリティ対策は喫緊の課題である.本研究成果によって,外部に設置されたC&Cサーバとの連携が前提となるボットの動作確認,動作解析を容易にすることができる.これにより,動作解析の結果をセキュリティ対策に組み込むことが想定できる.さらに,実際のマルウェアの振舞いを安全に確認できるため,情報セキュリティ教育への効果も期待できる.
|