{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:13:26Z","timestamp":1715645606678},"reference-count":40,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1587\/transinf.2022ici0001","type":"journal-article","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T23:08:34Z","timestamp":1693523314000},"page":"1302-1315","source":"Crossref","is-referenced-by-count":0,"title":["Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware"],"prefix":"10.1587","volume":"E106.D","author":[{"given":"Koji","family":"NAKAO","sequence":"first","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Katsunari","family":"YOSHIOKA","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"},{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Takayuki","family":"SASAKI","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Rui","family":"TANABE","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Xuping","family":"HUANG","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"}]},{"given":"Takeshi","family":"TAKAHASHI","sequence":"additional","affiliation":[{"name":"NICT"}]},{"given":"Akira","family":"FUJITA","sequence":"additional","affiliation":[{"name":"NICT"}]},{"given":"Jun'ichi","family":"TAKEUCHI","sequence":"additional","affiliation":[{"name":"Kyushu University"}]},{"given":"Noboru","family":"MURATA","sequence":"additional","affiliation":[{"name":"Waseda University"}]},{"given":"Junji","family":"SHIKATA","sequence":"additional","affiliation":[{"name":"Institute of Advanced Sciences, Yokohama National University"},{"name":"Graduate School of Environment and Information Sciences, Yokohama National University"}]},{"given":"Kazuki","family":"IWAMOTO","sequence":"additional","affiliation":[{"name":"SecureBrain Corporation"}]},{"given":"Kazuki","family":"TAKADA","sequence":"additional","affiliation":[{"name":"SecureBrain Corporation"}]},{"given":"Yuki","family":"ISHIDA","sequence":"additional","affiliation":[{"name":"SecureBrain Corporation"}]},{"given":"Masaru","family":"TAKEUCHI","sequence":"additional","affiliation":[{"name":"JAPAN DATACOM Co., Ltd."}]},{"given":"Naoto","family":"YANAI","sequence":"additional","affiliation":[{"name":"Osaka University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] S. Kato, R. Tanabe, K. Yoshioka, and T. Matsumoto, \u201cAdaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices,\u201d 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp.143-151, 2021."},{"key":"2","unstructured":"[2] \u201cVirusTotal,\u201d https:\/\/www.virustotal.com\/."},{"key":"3","unstructured":"[3] T. Inoue, S. Hara, H. Sakaki, K. Okada, E. Shioji, M. Akiyama, T. Sasaki, R. Tanabe, K. Yoshioka, K. Nakao, and T. Matsumoto, \u201cDynamic Analysis of Persistent IoT Malware Using Adaptive Sandbox,\u201d ICSS2020-41, pp.90-95, 2021. (In Japanese)"},{"key":"4","unstructured":"[4] X. Huang, S. Mochizuki, and K. Yoshioka, \u201cIoT Malware Infection Analysis for Network Identification and Uplink Speed Estimation,\u201d SIG Technical Reports, vol.2021-CSEC-95(18), pp.1-6, 2021."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] X. Huang, S. Mochizuki, and K. Yoshioka, \u201cConnection Type Identification and Uplink Speed Estimation of Malware Infected Hosts,\u201d Journal of Information Processing, vol.30, pp.859-864, 2022. 10.2197\/ipsjjip.30.859","DOI":"10.2197\/ipsjjip.30.859"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] O. Cetin, C. Ganan, L. Altena, D. Inoue, T. Kasama, K. Tamiya, Y. Tie, K. Yoshioka, M. van Eeten, \u201cCleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai,\u201d The Network and Distributed System Security Symposium (NDSS 2019), 2019. 10.14722\/ndss.2019.23438","DOI":"10.14722\/ndss.2019.23438"},{"key":"7","unstructured":"[7] X. Huang, S. Mochizuki, A. Fujita, and K. Yoshioka, \u201cSimulation of security notification by ISP to malware-infected users,\u201d IEICE Technical Reports, vol.121, no.410, ICSS2021-82, pp.141-146, 2022."},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] X. Huang, S. Mochizuki, A. Fujita, and K. Yoshioka, \u201cSimulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users,\u201d Journal of Information Processing, vol.31, pp.165-173, 2023. 10.2197\/ipsjjip.31.165","DOI":"10.2197\/ipsjjip.31.165"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] C. Han, A. Tanaka, and T. Takahashi, \u201cDarknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension,\u201d IEEE Workshop on Big Data for Cybersecurity, pp.2980-2988, Dec. 2022. 10.1109\/bigdata55660.2022.10021021","DOI":"10.1109\/BigData55660.2022.10021021"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] C. Han, J. Takeuchi, T. Takahashi, and D. Inoue, \u201cDark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns,\u201d IEEE Access, vol.10, pp.13038-13058, 2022, doi: 10.1109\/ACCESS.2022.3145966. 10.1109\/ACCESS.2022.3145966","DOI":"10.1109\/ACCESS.2022.3145966"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] C. Han, J. Takeuchi, T. Takahashi, and D. Inoue, \u201cAutomated Detection of Malware Activities Using Nonnegative Matrix Factorization,\u201d IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom): Emerging Tech Track, pp.548-556, 2021. 10.1109\/trustcom53373.2021.00085","DOI":"10.1109\/TrustCom53373.2021.00085"},{"key":"12","unstructured":"[12] Y. Endo, K. Sameshima, R. Tanabe, K. Yoshioka, and T. Matsumoto, \u201cML-based Detection of C&amp;C Communications for Sandbox Analysis of IoT Malware,\u201d ICSS2021-75, pp.99-104, 2021. (In Japanese)"},{"key":"13","unstructured":"[13] K. Sameshima, Y. Endo, R. Tanabe, K. Yoshioka, K. Namao, and T. Matsumoto, \u201cObservation of Attack Infrastructures by Scripts that Mimic C&amp;C Communications of IoT Bots,\u201d ICSS2022-44 pp.37-42, 2022. (In Japanese)"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] M.E. Aminanto, T. Ban, R. Isawa, T. Takahashi, and D. Inoue, \u201cThreat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis,\u201d IEEE Access, vol.8, pp.217977-217986, 2020. 10.1109\/access.2020.3041837","DOI":"10.1109\/ACCESS.2020.3041837"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] T. Ban, N. Samuel, T. Takahashi, and D. Inoue, \u201cCombat Security Alert Fatigue with AI-Assisted Techniques,\u201d Proc. Cyber Security Experimentation and Test Workshop (CSET &apos;21), pp.9-16, 2021. 10.1145\/3474718.3474723","DOI":"10.1145\/3474718.3474723"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] A. Fujita, T. Ban, T. Takahashi, and D. Inoue, \u201cOn-premises Analysis of Advanced Threat Prevention Appliances,\u201d Proc. Cyber Security Experimentation and Test Workshop (CSET &apos;21), pp.1-8, 2021. 10.1145\/3474718.3474720","DOI":"10.1145\/3474718.3474720"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] S. Ndichu, S. Kim, S. Ozawa, T. Misu, and K. Makishima, \u201cA machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors,\u201d Applied Soft Computing, vol.84, 105721, 2019. 10.1016\/j.asoc.2019.105721","DOI":"10.1016\/j.asoc.2019.105721"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] S. Ndichu, T. Ban, T. Takahashi, and D. Inoue, \u201cSecurity-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks,\u201d Proc. 17th Asia Joint Conference on Information Security (AsiaJCIS 2022), pp.1-7, 2022. 10.1109\/asiajcis57030.2022.00011","DOI":"10.1109\/AsiaJCIS57030.2022.00011"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] K. Masumi, C. Han, T. Ban, and T. Takahashi, \u201cTowards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort.\u201d Proc. Eleventh ACM Conference on Data and Application Security and Privacy (CODASPY &apos;21), pp.329-331, 2021. 10.1145\/3422337.3450326","DOI":"10.1145\/3422337.3450326"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] R. Ishibashi, K. Miyamoto, C. Han, T. Ban, T. Takahashi, and J. Takeuchi, \u201cGenerating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems,\u201d IEEE Access, vol.10, pp.53972-53986, 2022. 10.1109\/access.2022.3176098","DOI":"10.1109\/ACCESS.2022.3176098"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] K. Miyamoto, H. Goto, R. Ishibashi, C. Han, T. Ban, T. Takahashi, and J. Takeuchi, \u201cMalicious Packet Classification Based on Neural Network Using Kitsune Features,\u201d Proc. 2nd Intl. Conf. on Inttel. Syst. and Patern Recognit., 2022.","DOI":"10.1007\/978-3-031-08277-1_25"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, \u201cKitsune: an ensemble of autoencoders for online network intrusion detection,\u201d Network and Distributed System Security Symposium, 2018. 10.14722\/ndss.2018.23204","DOI":"10.14722\/ndss.2018.23204"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] N. Saitou and M. Nei, \u201cThe neighbor-joining method: a new method for reconstructing phylogenetic trees,\u201d Mol. Biol. Evol., vol.4, no.4, pp.406-425, 1987. 10.1093\/oxfordjournals.molbev.a040454","DOI":"10.1093\/oxfordjournals.molbev.a040454"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] T. He, C. Han, R. Isawa, T. Takahashi, S. Kijima, J. Takeuchi, and K. Nakao, \u201cA Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering,\u201d Proc. 24th Intl. Conf. on Neural Inform. Processing, vol.11953, pp.766-778, 2019. 10.1007\/978-3-030-36708-4_63","DOI":"10.1007\/978-3-030-36708-4_63"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] R. Kawasoe, C. Han, R. Isawa, T. Takahashi, and J. Takeuchi, \u201cInvestigating Behavioral Differences between IoT Malware via Function Call Sequence Graphs,\u201d Proc. 36th ACM\/SIGAPP Symp. on Applied Comput., pp.1674-1682, March 2021. 10.1145\/3412841.3442041","DOI":"10.1145\/3412841.3442041"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] X. Liao, K. Yuan, X. Wang, Z. Li, L. Xing, and R. Beyah, \u201cAcing the IOC game: Toward automatic discovery and analysis of open-source cyber threat intelligence,\u201d Proc. 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.755-766, Vienna, Austria, Oct. 2016. 10.1145\/2976749.2978315","DOI":"10.1145\/2976749.2978315"},{"key":"27","unstructured":"[27] C. Sabottke, O. Suciu, and T. Dumitras, \u201cVulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits,\u201d In USENIX Security Symposium, pp.1041-1056, Washington, USA, Aug. 2015."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] A. Sapienza, A. Bessi, S. Damodaran, P. Shakarian, K. Lerman, and E. Ferrara, \u201cEarly warnings of cyber threats in online discussions,\u201d IEEE International Conference on Data Mining series (ICDM), pp.667-674, New Orleans, USA, Nov. 2017. 10.1109\/icdmw.2017.94","DOI":"10.1109\/ICDMW.2017.94"},{"key":"29","unstructured":"[29] A. Soeda, Y. Shiraishi, M. Mohri, and M. Morii, \u201cSecurity Information Retrieval Engine for Cyber Attack Analysis,\u201d Proc. International Symposium on Information Theory and its Applications, Oct. 2022."},{"key":"30","unstructured":"[30] L. van der Maaten and G. Hinton, \u201cVisualizing data using t-SNE,\u201d Journal of Machine Learning Research, vol.9, pp.2579-2625, 2008."},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] S. Robertson and H. Zaragoza, \u201cThe probabilistic relevance framework: BM25 and beyond,\u201d Now Publishers Inc, vol.3, no.4, pp.333-389, 2009. 10.1561\/1500000019","DOI":"10.1561\/1500000019"},{"key":"32","unstructured":"[32] T. Sugiura, R. Okuda, A. Kodama, T. Inoue, and N. Murata, \u201cConstructing Maps from Multiple Similarities with Stochastic Embedding,\u201d IEICE Trans. Inf. &amp; Syst. (Japanese Edition), 2022 (in press)."},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] T. Takahashi, Y. Umemura, C. Han, T. Ban, K. Furumoto, O. Nakamura, K. Yoshioka, J. Takeuchi, N. Murata, and Y. Shiraishi, \u201cDesigning Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?,\u201d 2021 IEEE International Conference on Pervasive Comput. and Communications Workshops and other Affiliated Events (PerCom Workshops), pp.376-379, 2021. 10.1109\/percomworkshops51409.2021.9431125","DOI":"10.1109\/PerComWorkshops51409.2021.9431125"},{"key":"34","unstructured":"[34] https:\/\/suricata.io\/"},{"key":"35","unstructured":"[35] Y. Watanabe, N. Yanai, and J. Shikata, \u201cMulti-Designated Verifier Signatures over IoT Networks,\u201d SCIS 2022 Proceedings, pp.1E2-1, 2022. (In Japanese)"},{"key":"36","unstructured":"[36] Y. Watanabe, N. Yanai, and J. Shikata, \u201cAnonymous Broadcast Authentication over IoT Networks,\u201d SCIS 2021 Proceedings, pp.3B3-4, 2021. (In Japanese)"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] Y. Watanabe, N. Yanai, and J. Shikata, \u201cAnonymous broadcast authentication for securely remote-controlling IoT devices,\u201d Proc. AINA 2021, vol.226, pp.679-690, 2021. 10.1007\/978-3-030-75075-6_56","DOI":"10.1007\/978-3-030-75075-6_56"},{"key":"38","unstructured":"[38] M. Yata and Y. Sanada, \u201cCRC-aided erasure demodulation on outputs of sum-product decoding for hamming coded M-ary chirp spread spectrum signal,\u201d Proc. ICETC 2021, p.4, 2021."},{"key":"39","unstructured":"[39] Y. Watanabe, N. Yanai, and J. Shikata, \u201cIoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures,\u201d arXiv:2208.0381, https:\/\/arxiv.org\/abs\/2208.03781"},{"key":"40","doi-asserted-by":"crossref","unstructured":"[40] H. Kobayashi, Y. Watanabe, and J. Shikata, \u201cAsymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication,\u201d Cryptography and Coding, LNCS 13129, vol.13129, pp.105-128, Springer, Dec. 2021. 10.1007\/978-3-030-92641-0_6","DOI":"10.1007\/978-3-030-92641-0_6"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E106.D\/9\/E106.D_2022ICI0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T04:58:36Z","timestamp":1715576316000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E106.D\/9\/E106.D_2022ICI0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2022ici0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]},"article-number":"2022ICI0001"}}