஠ё! 1 !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ

пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข

࠻≊ී ق໵ݔऌ׭τᏱၦଊᆔ౪Ᏹ

ݭݎࢋ ق໵ݔऌ׭τᏱၦଊᆔ౪Ᏹ

༂߭ሠ ق໵ݔऌ׭τᏱၦଊᆔ౪Ᏹ

ᄣ् ٿң٪ࢴ೻ᡞٻឋᚡȂҭࠊ඾ႈޠᑺକȂႬဟԋӓԚ࣐Κঐ२्ޠᓎ຀ᆪርᆪၰ ؂ޠᒧȶ੿ࢴጇȷᇅȶ௮ࢴЖᔞȷٸл्ښࢴᐡ٪ޠખᚾȄ೼᜹ޠៗႬဟռܼ੿ࢴ٪ ࢴР٪ޠུ؂੿ࢴ౱ҢȂ੿ࢴጇུޠ ҂ְؑЉԥ 8~10فϘ૗Ⴒ٪ུ੿ࢴȄ਴ᐄःུ ಜӶུ੿ࢴя౫Յۧґԥ୏ข੿ࢴጇق੿ࢴȂޠུژ੿ࢴጇϟࠊȂ୏ขུ؂ᒳݳءԓ ౱Ңޠ೼ࢳ෉໣࢑ߩள૓৶йӡᓏޠȄҐ፤НණяпҐᡞ፤Мන໐ӈ੿ࢴ՘࣐୏ขІ ᜌҐᡞȂпᆔ౪໐ӈ੿ࢴ՘ޤ࡛Ҵ໐ӈ੿ࢴܓ੬ޠРݳȂଭᄈ໐ӈ੿ࢴޠᜌᆔ౪ޤڐ ᜱ߾ޠϟ໣܉ᇅ྆܉ᜌҐᡞ໣྆ޤ਴ᐄ໐ӈ੿ࢴٯᐄп୏ข໐ӈ੿ࢴȂٯᜌޤ࣐ࣻᜱ ൹Τޠණяහኌ࠯فᄙᙾඳ࣐ዂጚࣃᆶᆪၰ๗ᄻໍ՘௱፤Ȃп୏ข໐ӈ੿ࢴȄҐःם ಜȂഇႇ໐ӈ੿ࢴ௱፤ЖᔞȂق໐ӈԋӓޠԓ໐ӈႇᘯ၇ဋȂ࢝೪ܼႬφ໐ӈႣၿπ web-based ᆔ౪Ϯ८ȂР߰ᆔ ޠЅ๢ٽಜණقϟႬφ໐ӈႇᘯفႇᘯ໐ӈ੿ࢴȄҐः Ԟึ߭ӈȄٿң޲ٻಜᆔ౪ІΚૢق౪޲ໍ՘

ಜقᜱᗥມȈҐᡞ፤ȃዂጚࣃᆶᆪၰȃ໐ӈ੿ࢴȃ൹Τԓ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 2

Ontology-Based Malicious Email Detection

Hsiu-Sen Chiang Department of Information Management, National Yunlin University of Science and Technology

Dong-Her Shih Department of Information Management, National Yunlin University of Science and Technology

Shin-Chuan Huang Department of Information Management, National Yunlin University of Science and Technology

Abstract The widespread of causes computer security becomes an important issue. Currently, anti-virus software is the primary mechanism to prevent computers from the damage of virus. Such mechanism relies on the update of virus pattern (or signature) and scan engine to detect a new virus. Eight to ten viruses are created every day and most cannot be accurately detected until signatures have been generated for them. During this time period, systems protected by signature-based algorithms are vulnerable to attacks. We propose a method that uses ontology to support the behavior detection and the knowledge management of email virus. It constructs the ontology of the email virus in accords with the behavior characteristics of the email virus. It then uses the ontology to detect as well as manage the behavior of mail virus. This paper transforms the ontology into fuzzy Petri-Nets to detect the email virus and transforms it into fuzzy Petri-Nets automatically. Finally, we use Protégé 2000 to implement and manage the email virus behavior ontology. We designed and implemented an intelligent email filter with embedded system. It acts as an email gateway to filter inbound messages by enforcing an email virus rule’s policies. In the embedded system, we also provided a web-based administrative interface for the system administrators to do the system configuration and to set up their email virus rule filtering policies.

Key words: Ontology, Fuzzy Petri Net, Email viruses, Embedded System пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 3

൧ȃᆲ፤

໐ӈԚུ࣐ޠх༉ಜڦητൾቩߞȂᄛᄛםң௒ٻޠூႬφ໐ӈٻ඾Іηޠᆪၰ ژႬφ໐ӈ኶໕ႁ 100 ቈࡍȂႲॏޠ೾РԓȂIDC զॏ 2001 Ԓӓ౩҂ְΚЉึяྜྷޠ Ϝኈ៫ഷڐ౿՘ोҢя೩ӼୱᚡȂޠቈࡍȄႬφ໐ӈ 350 ژԒȂ኶໕ཽђॼԚߞ 2005 ߓұȈ܇ୱᚡȄᗎ༗ऌ׭׭೛Мනഌစ౪ݔᓇޠ໐ӈֲۀ߰࢑Ⴌφ໐ӈ੿ࢴᇅޠτ ΩᇅҢ౱ΩȂկӤލഁӵቩђӍཿᝰץңȂٻހኅޠ඾ІᇅӍཿႬφ໐ӈޠ ȶInternet Ӷ฼܂܂Ⴌφ໐ӈȂޠ༉࢘൭ϮȄߤழԥ੿ࢴᔭ਱ޠഁץ؂ژ׳ȂηᡲႬဟ੿ࢴޠኻ ϵܛ (ICSA) ཽڟਣ໣ϲΚ༉ΫȃΫ༉ԼȂആԚଽทਞᔗԓഀᚈད࢘Ȅ୾ርႬဟԋӓ ༉ޠᡘұȂႬφ໐ӈ៛Ё࣐Ⴌဟ੿ࢴഷл्ݏȶ2005 Ԓ࡚੿ࢴ༉ክᗎ༗ൣ֚ȷ๗ޠո ഷл्൭ϮȂԄޠክ൭ϮȂԄߓ 1ȄඳّϟȂႬφ໐ӈϑစԚ࣐Ⴌဟ੿ࢴ༉ሏད࢘ τ໕༉ژႁٿHappy99ȃMelissaȃؒᙜ߭ȃLoveletterȃWinbird.a ๊എ࢑ᙥҦႬφ໐ӈ ୱᚡȄޠȂӱԫԄե٪ጓႬφ໐ӈַழႬဟ੿ࢴϑ࢑ϛூϛೞ२ຝޠҭޠክ

(ȈICSAȂ2005ྜٿߓ 1Ȉ੿ࢴ༉ክ൭ϮЩၷߓ! 1996-2004 (ၦਠ

Virus Source 1996 1997 1998 1999 2000 2001 2002 2003 2004 Email Attachment 9% 26% 32% 56% 87% 83% 86% 88% 92% Internet Downloads 10% 16% 9% 11% 1% 13% 11% 16% 8% Web Browsing 0% 5% 2% 3% 0% 7% 4% 4% 2% Other Vector 0% 5% 1% 1% 1% 2% 3% 11% 12% Software 0% 3% 3% 0% 1% 2% 0% 0% 0% Distribution Diskette: other 71% 84% 64% 27% 7% 1% 0% 0% 0%

ആԚܛ෇զॏȂ҂ְᛗึΚ଺੿ࢴȂՎЎ஡ݱІ 25 ѯႬဟȂཽڟ୾ርႬဟԋӓ ޠ൑՞ԚҐ཭ѷӶ 8,000 जϰпαȄᆪርᆪၰޠึႁആԚႬဟ੿ࢴ༉ክޠഁ࡚ߩள τȂ਴؂ખᚾޠആԚܛખᚾȄ໐ӈ੿ࢴޠܓՅ࢑ӓ౩ܓ࢑ୣ஀ܗȂϛӶѬ४ܼঐ΢ץ ᡑᆎ੿ࢴȂആԚޠKlez ؒᙜ߭੿ࢴ࢑ಒΚঐᐤစΚԒ ޠಜॏȂ2003 Ԓޠᐄᗎ༗ऌ׭ SQL Slammer ੿ࢴȂആ ޠ׿ᔟȇ2004 Ԓڨ཭ȂົႇϳԼ࿳ѯႬဟڨӓ౩ΟΫቈजϰ ཭ѷளளᜳпޠആԚܛ཭ȂົႇΚԼ࿳ѯႬဟೞ׿ᔟȄႬဟϜࢴࡤڨԚӓ౩Ϋቈजϰ ਞ౦ȃޠםฯȂณޠਣ໣ȃ΢Ωȃߝᓁ࢑ঐ΢ңЙᇅӍཿңЙޠ׺ΤܛಜঔඉقզॏȂ ੿ࢴད࢘ڨࣽяȈ࿌ಣᙒ᎐ޠѠ݃ᡘ؂ณݳզॏȄ௄შ 1 ϜȂ؂ඉ঩Ȃޠ୧៘ȃၦਠ ࡤȂሇࠍኈ៫ঐ΢Ϗձਞ౦ȇ२ࠍആԚᐍঐಣᙒᕋၽ୅ᘜȂܛആԚޠ཭ѷϛ૗զॏȄ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 4

შ 1Ȉ੿ࢴӶಣᙒϲഌܛആԚޠ཭ѷ௷ӫ

ޠف୏ข׭೛η࢑өРःޠႬဟ੿ࢴٿȂӱԫߗԒུ؂ϛᘟᅌᡑޠҦܼႬဟ੿ࢴ ੿ࢴ୏ข׭೛ޠ܂Κ໷२्ୱᚡȂႇޠ؛࢑྄ࡠೞ၍؂Ⴌဟ੿ࢴޠޤ२ᘉȂՅ୏ขґ ޠ੿ࢴ੬ኊȂึ৥яѠ୏ขف੿ࢴя౫ࡤȂӕःژᇅ٪ࢴ೻ᡞԥΚ२τુѷȂ߰࢑๊ ηԥࣻ࿌ӼٿખᚾȄߗޠਣȂ੿ࢴϑစആԚᝓ२ٿяف੿ࢴጇःޠ੿ࢴጇȂԄԫӶུ ୱᚡ྄ޠРݳϜΚኻηԇӶ຀ࣻ࿌Ӽٳ୏ขȂดՅӶ೼ޠႬဟ੿ࢴޤ࢑ଭᄈґفःޠ ୱᚡȄޠᇅ௥ଇ؛ਞ૗๊എ࢑ሰ्၍ޠ୏ข౦ȃᇳց౦пІ୏ขޠࡠջ݉ȂԄ୏ข੿ࢴ ౫ϭޠ໐ӈ੿ࢴ୏ขᏣ೾ளԥѳঐુᘉȂ(1)ณ፤೻฾ᡞቌੀࣲߩள݂ີȂ୞ሆ኶ ঐᡞՅّԚҐഎࣻ࿌ାȂ(2)Ӷ੿ࢴ୏ขႇโϜȂ٪ࢴ೻ᡞխܗΫ࿳ϰȂᄈӍཿȃಣᙒ ུ؂ң޲Ս՘ٻϛ߰Ȃ(3)٪ࢴ೻ᡞ҇໹Ꭽޠңα྄τٻң޲ٻಜၦྜȂആԚقңЋӼ ޠԥ೼ኻءٯңՅّȂٻޠᄙȂᄈτഌϸޒޠಜ೏ܼԋӓقޠ੿ࢴጇȂϘ૗ጃߴՍϐ ԥءၸڤٟഁٯഁȂץ༉ክߩளޠ੿ࢴȄђα౫ϭ੿ࢴޠȃུޤȂ(4)ґ૗୏ขґ܉ᢏ ཭ѷȄޠࢴ೻ᡞȂᡷԚѽτ٪ޠུ؂ ୏ขٿ੬ኊ՘࣐ٳ੬ኊȂ਴ᐄ೼ޠ׾؂෉గഇႇϸݚ໐ӈ੿ࢴ՘࣐ϜณݳفҐः ܛ஡੿ࢴٯ੿ࢴጇȂη૗ԥਞ୏ขя੿ࢴȂུ؂੿ࢴȂԄԫࠍϛ҇ۢ෉ޠޤȃґޠུ ᔗң८ߩளኅڐ౫ᇅߓұ֖ޠᜌ୉ᎍ࿌ޤᜌҐᡞ፤૗஡ޤഷմȄҦܼژ།ড়७ޠആԚ ౫֖ޠԥਞܓ੬ޠᜌߓұޤ ՘࣐ዂԓȂഇႇҐᡞ፤ Ontologyޠᔤϸݚ੿ࢴفȂҐःހ ޠ ၽң Petri NetٯᐄȂٸޠҐᡞ፤ձ࣐ႇᘯ೤ࠍޠ੿ࢴ՘࣐੬ኊȂ࡛Ҵ໐ӈ੿ࢴ՘࣐ ࢻโցᘟዂԓȂ஡໐ӈ੿ࢴ՘࣐Ґᡞᙾඳ࣐੿ࢴ୏ขޠ௱፤ЖᔞȂԥਞႇᘯϑޤᇅґ ಜପقණяϟ໐ӈ੿ࢴႇᘯ࢝ᄻ௵ң൹Τԓف໐ӈ੿ࢴȂ஡཭ড়७ՎഷմȄҐःޠޤ Ϯ८ޠң޲ഇႇᎍ࿌ٻಜԚҐȂйҐ࢝ᄻϟ೪ॏȂ૗ᡲقӬ Linux ҂ѯȂ૗ԥਞ७մ ೪ॏଷ૗ණାԋӓޠঐ΢лᐡȂ೼ኻژಜᘳ៕߭ӈȂՅϛң஡߭ӈίၸقΤ൹Τԓี ಜਞ૗Ȅقң޲щϸၽңٻୱᚡȂᡲޠಜၦྜق૗ᗘռխң؂ѵȂܓ

ະȃНᝧ௥ଇ

ࣻᜱНᝧђп௥ଇȂᙥпᘫޠಜقଭᄈ໐ӈ੿ࢴȃ੿ࢴ୏ขРݳȃ൹ΤԓفҐः ୱᚡȄޠԇӶܛᔯຝҭࠊ୏ขРݳٯȂܓԥϟ੬ڏܛાяႬဟ੿ࢴᇅ໐ӈ੿ࢴ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 5

Κȃ໐ӈ੿ࢴ

ΩȂ஡੿ࢴҐٙፓᇨࡤ᠍ޠಜ஛ଛ໐ӈقூ၏ڦ໐ӈ੿ࢴӶஉ՘ખᚾ՘୞ਣȂཽ ໐஛ሏଛяџ(Kienzle and Elder, 2003)Ȃቔ໸኉ (2001)ۢဏδഇႇႬφ໐ӈձ࣐༉ٯ (ជᙬ(Worm)Ȃְᆏ࣐໐ӈ੿ࢴȂTakeshi and Yoshiteru (2002ܗ(੿ࢴ(Virusesޠክᆔၿ ಜ(Ԅᔭ਱ፓᇨȂᔭ਱༉ᒰقң޲ᐈձٻಜࡤȂϛᎭقࠍᇰ࣐໐ӈ੿ࢴ൸࢑Ӷ੿ࢴད࢘ Ⴌޠ༉ክ൭ϮȄӱԫ໐ӈ੿ࢴ൸࢑ϛᆔӉեᆎ᜹ڐයክ੿ࢴȂՅпႬφ໐ӈձ࣐ٿ(๊ ༉ክڐಜࡤȂпႬφ໐ӈձ࣐ق߮Τܗဟ੿ࢴȂԄ੬ࣅӁФ଼ȃជᙬȃ੿ࢴ๊Ȃད࢘ улᐡයክяџȄڐ൭ϮȂ஡੿ࢴҐٙӪᆪၰޠ ޠಜҐٙق໐ӈ੿ࢴЩၷ൑હȂւңޠࡿяȂԟ෉فःޠ(Kienzle and Elder (2003 Ӽঐ໐ӈ՞ܗ൑Κژ੿ࢴጇ஛ଛޠፓᇨשโԓȂ஡Սޠ Ѫஉ՘໐ӈ APIڴܗ໐ӈ೻ᡞ ໐ӈโޠಜقᎭٸSMTP โԓȂϛӕѬ ޠ໐ӈ੿ࢴࠍഃᅛᅌᡑԚ᐀ԥՍϐޠࡤڐȄ֮ ಭᄜȂޠϑစ໡ۗւң΢উᙾ஛Ⴌφ໐ӈ؂Ȃ໐ӈ੿ࢴٿȂߗԒޠҭޠයክڐژႁٿԓ ֆ੿ࢴයոȄڟޠң޲α࿌ȂໍΚؐٻЖᇷٿКࢳޠ෣ᝀٳߤђΚ ȞΚȟ໐ӈ੿ࢴད࢘ޠРԓ ഌϸȂӱԫޠঐഌϸȂΚ࢑໐ӈҐНȂΡ࢑ߤӈַழᔭڎႬφ໐ӈл्Ѡпϸ࣐ ᆎȈڎРԓл्ԥޠད࢘ڐයክ༉࢘Ȃٿ໐ӈ੿ࢴ्ഇႇႬφ໐ӈ ˬȃഇႇߤђᔭ਱ ᔭ਱Κକ஛ଛȂӱԫႬဟޠԓםң޲ѠпַழӉեٻ஛ึႬφ໐ӈਣȂ ᆪၰϟژழᔭ਱ϟϜ߰Ѡпᙥ຀Ⴌφ໐ӈՅයክַٳ੿ࢴѬ्૗ᗵୢӶ೼ ϜȂ೼ᆎРԓη࢑Κૢၷ࣐༉ಜޠРԓȂҦࠊख़Ⴌဟ੿ࢴޠ੬ܓϜτഌϸޠ Ⴌဟ੿ࢴഎѠпᗵୢӶᔭ਱ϟϜȄ ˭ȃഇႇ໐ӈҐН ໐ӈҐНޠੀԓл्Ѡпϸ࣐હНԆੀԓᇅ HTML ੀԓȂӶહНԆੀԓ Ⴌဟ੿ࢴޠ౿՘ȂུᆎޠࡅૐȄҦܼᆪርᆪၰޠ዗Ӷڏ໐ӈҐНЩၷϛޠί ໐ӈҐНϜၷৡཽܿԥႬဟޠ૗ΩȂӱԫ HTML ੀԓޠറᙡୢܼᆪॳϟϜڏ пৡܿӶܛ໐ӈԞ߭೻ᡞཽՍ୞ᘳ៕໐ӈҐНȂٳϜȂӕђαԥڐ੿ࢴᗵୢ ׭೛ആԚαख़ޠϛՍញϟϜដึΠႬဟ੿ࢴՅആԚད࢘Ȅ໐ӈ੿ࢴ௵ңϛӤ ᅔࢿȃJava applet ๊׭ޠᆎ༉ክዂԓȂւң SCRIPT ᇮݳȃMIME ੀԓαڎ ༉ክȄٿᔭ਱ੀԓޠ೛ϲ൹ܼ໐ӈҐНϜȂւңߤђඍཏ ȞΡȟ໐ӈ੿ࢴޠୄ၇Рԓ ޲्෣ᑏܗң޲α࿌ٻ࠻≊ී (2003)ᢏᄇࡿя໐ӈ੿ࢴ࣐ΠᗵୢՍϐҐٙȃЖᇷ ϮಞȄޠРݳ྆౲ٳРݳȂпί஡ଭᄈ೼ޠңөᆎୄ၇ٻЗȂޠר७մឍڐٻң޲ٻ ׾ᡑޠȃ໐ӈዀᚡᇅϲৡˬ Ϥࣻཧܗዀᚡᇅϲৡ׾ᡑޠ৶ᘉȂ஡໐ӈܗ܉ᢏޠ΢᜹З౪αٳւңΚ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 6

Сφ(ဒ፜ޠ࢑੬րڐЗȂЏۊԂޠЖึԞӈ޲ܗЗרឍޠପȂп७մԞӈ޲ உ՘ߤђᔭܗӈ(911ȃᖃ ಜ τ ᒶ )ȂᡲԞӈ޲໡ః߭ӈٲޠ੬րܗ(௒΢࿾ܗ࿾ Ԟӈ޲ϜࢴȄٻ਱Ȃ ˭ȃฺң஛ӈ޲ӫᆏ ௵ூ໐ӈखᓄڦܗӫ൑ޠ໐ӈ೾ଊᓄϜڐ໐ӈ੿ࢴད࢘ႬဟࡤȂཽߤՎ ௒ݸίȂޠ߭ȂӶరณ٪റޠٿዤ΢஛ܗРԓȂഎᡲԞӈ޲п࣐࢑݊ЅޠӲ߭ ಜϜࢴȄقᏳय ˮȃ׾ᡑַழᔭ୚ᔭӫ ୚ᔭӫޠࣻᜱٳᔗңโԓȂ࢛ޠಜ਴ᐄ୚ᔭӫః୞໡ఃஉ՘ق windows ୚ᔭޠԥஉ՘โԓ૗Ωڏஉ՘Ȃӱԫ஡ܛ࢑ೞӤΚᔗң೻ᡞܗ௦உ՘ޣѠೞ ؂ϜࢴȄկڐٻឍញЗȂໍՅޠң޲ٻᔭ਱ੀԓȂп७մޠӫ׾ᡑԚϛளُ ಣӬԄίȈXLS Іޠᔭ਱᜹࠯Ϙ૗ҢਞȂளُޠ׾୚ᔭӫሰପӬࣻӤ᜹࠯ ᔭ਱ੀԓȂл्࢑ւң OfficeޠٽDOCȈ೼Ρᆎᔭ਱ੀԓഎ࢑឵ܼMSOfficeණ ᆎᔭ਱ੀԓα୉ᙾඳȄڎூ੿ࢴѠпӶ೼ٻȂܓӔ೾ޠѽ໲ ˯ȃୄ၇୚ᔭӫ ޠң޲ٻ७մٿߤᔭӫȂޠң޲Ȃ໐ӈ੿ࢴཽୄ၇ߤђᔭ਱ٻ࣐Π෣ᝀ ܗ РԓȂԄ readme.txt.exeޠңᚗ२୚ᔭӫٻ੿ࢴཽޠឍញЗȂτഌϸ ᄃ࢑ EXE Ѡஉ՘ڐң޲п࣐೼࢑ঐહНԆᔭȂٻޠgoldfish.doc.pifȂᡲಘЗ ᔭȂ຀ӫޠ ੿ࢴη࢑௵ң೼ᆎРԓȄ ˰ȃᗵୢӶߤђᔭ਱Ϝ ໐ӈዀᚡᇅϲৡࣻପӬȂԞӈ޲Ӷஉ՘ߤђᔭ਱ڸ೼ᆎ෣ᝀРԓ೾ளཽ ԥӉեݏ๗ޠձ௬ႻȂࢉԞӈ޲ϛཽᄈஉ՘ݏஉ՘ਞޠуโԓڐࡤȂҦܼԥ (ЅȂԄဒ፜࿾੿ࢴ(WORM_MALDAL.C݊ޠՅᙾ஛๞Սϐໍ؂དញȄޠ౵ள ֊п Flash ୞ฬձ௬ႻȄ Ȟήȟ໐ӈ੿ࢴ༉ክ૗Ω ᆎȂΚᆎ࣐τ໕༉ክ࠯Ȃڎ༉ክ૗ΩѠϸ࣐ޠࡿя໐ӈ੿ࢴفःޠ(ቔ໸኉ (2001 ѫΚᆎ࣐ߩτ໕༉ክ࠯Ȃϸրវख़ԄίȈ ˬȃτ໕༉ክ࠯ޠ໐ӈ੿ࢴ ίΚۢ؛ٿ೾ଊᓄӫ൑ȂޠҭዀᐡᏣϜޠӫ൑Ȉഇႇೞད࢘ޠ೾ଊᓄٸ Ȅޠঐ༉ክҭዀȄ೼ᆎРԓ࢑ഷளُ ˭ȃߩτ໕༉ክ࠯ޠ໐ӈ੿ࢴ ޠϛӶܼ༉ክᘉኅȂՅӶܼ༉ክٯޠҭڐ໐ӈ੿ࢴၷࠊ޲ᆡѾȂޠ೼᜹ Ԅ W32.Navidad ֊࣐پϛӼȂٯޠ໐ӈ੿ࢴп೼ᆎРԓ༉ክޠȄ౫ԥܓᗵஞ ໐ӈ՘࣐ޠ໐ӈ՘࣐ȂւңҔளޠད࢘Ⴌဟڨ໐ӈ੿ࢴཽᆀຝޠȄ೼᜹پΚ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 7

ಜϜق КݳȂ࢑ഇႇ෈ඳ windowsޠழ໐ӈ੿ࢴՎίΚঐ༉ክᘉȄளַُٿ ֊ Happy99.Worm ޠȄ຀ӫޠҭޠᆀຝᇅঔ׾໐ӈژႁٿwinsock.dll ᔭȂ ޠ Ȅپ࣐Κ

РݳϮಞޠΡȃ੿ࢴ୏ข

1987 ԒȂႬဟ੿ࢴޠୱᚡॷԪೞ२ຝȂՍԫϟࡤႬဟࣩึ৥Π኶ᆎႬဟ੿ࢴޠ୏ ੿ࢴ୏ขРݳτޠขРԓȂ਴ᐄᗎ༗ऌ׭ȃᗊߟ២ࡋȃ࿆࢒ऌ׭٪ࢴϜЗߓұȂҭࠊ ङԥίӗංᆎȈ੿ࢴጇЩᄈݳ(matching virus definition patterns)ȃђᖃЩᄈݳ(check sum)ȃ֊ ਣ I/O ௮ඣݳ(real time I/O scan)ȃ՘࣐ϸݚݳ(Behavior-Based virus detection)ȃ ੿ࢴ୏ขРԓٳහኌх౪޲୏ขݳ(Agent-Based virus detection)๊Ȃпί஡Ϯಞ೼Κ (Zenkin, 2001ȇLee et al., 1997)Ȅ ȞΚȟ੿ࢴጇЩᄈݳ ੿ࢴ੬ޠᒞܛโԓጇȂη൸࢑ޠ࢑ၷ࣐੬ੇܗԥ੬Քڏ੿ࢴጇ࢑ࡿ੿ࢴϜΚࢳ २्ޠࡿવᇅ DNA ΚኻȂ࢑ᒲրႬဟ੿ࢴޠউؑঐ΢എԥ੬ۢשኊȂ੿ࢴጇ൸჌࢑ ੿ࢴጇၦਠ৳Ȃؑ࿌உ՘୏ข௮ඣโޠᐄȂ੿ࢴጇ௮ඣݳ൸࢑࡛Ҵକؑ଺Ⴌဟ੿ࢴٸ ੿ࢴጇᇅโԓᔭ਱ձЩᄈȂᔯข࢑֐ԥႬဟ੿ࢴԇӶޠԓਣȂ൸ཽ਴ᐄ੿ࢴၦਠ৳Ϝ ጃȂѬ्࢑ϑԇӶྦݏȂ୏ข๗ٺᓻᘉ࢑உ՘ਞ૗ޠᔭ਱ϟϜȄ੿ࢴጇ௮ඣݳഷτܼ ࢴ೻ᡞְ௵ң೼ᆎ୏ข٪ޠȂҭࠊҀ८ατӼ኶ٿ੿ࢴΚཽۢೞ୏ขяޠ৳੿ࢴၦਠ Ⴌဟ੿ࢴ(Phillippo, 1990; Cohen, 1991)Ȃ࿌ޠޤᘉ࢑Ѭ૗୏ขяϑુڐ௮ඣРԓȂկ ,੿ࢴ(Zenkinޠ੿ࢴІᡑᆎུޠޤґژԥ၏੿ࢴၦਠਣࠍณݳ୏ขء৳੿ࢴጇၦਠ 2001)Ȅ ȞΡȟђᖃЩᄈݳ ߤٸ੿ࢴཽޠȂӱ࣐τӼ኶ܓ׈ᐍޠᅌᆘݳᔯᡜᔭ਱ޠ೼ঐРݳл्࢑ւң੬ۢ ࢑ᔭ਱С෉ܗݸ౱Ңޒޠโԓཽԥᔭ਱τϊቩђޠпೞད࢘ܛโԓȂޠуڐ஛Ңܼܗ ӫᆏȃτϊȃਣ໣ȃС෉ІϲৡȂђᖃ࣐ΚޠȄӱԫ਴ᐄؑঐโԓᔭ਱ם௒ޠೞঔ׾ ঐᔯࢦጇȂӕ஡ᔯࢦጇߤܼโԓޠࡤ८Ȃܗ࢑஡ܛԥᔯࢦጇܺӶӤΚঐၦਠ৳ϜȂӕ ׾Ȃпցᘟ࢑֐ϜࢴȄ؂ᔯࢦጇ࢑֐᎐ޠଅᓄؑঐโԓٯಜȂଢᙺق ւңԫ Check-sum ᘉ൸࢑ᇳցାȂйณݳጃᇰ࢑঻ᆎ੿ࢴདુޠ੿ࢴȂկഷτޠөԓژ೼ᆎ׭೛Ѡ୏ข ȂЇՅᡑூϛϹᄃር(Luke andܓኇޠಜҐٙقΠձཿښ୏ขРݳη४ޠȂՅ೼ኻޠ࢘ Harris, 1999)Ȅ Ȟήȟ֊ਣᒰя/ᒰΤ௮ඣݳ ၦਠࢻٳйᄈ೼ٯᒰΤ/ᒰя୞ձȂޠРݳл्࢑֊ਣӵ᝞ᄡၦਠޠI/O ௮ඣ ޠਣ֊ хΠ༉ڦȄ೼ᆎРݳٿగ૗஋Ӷ੿ࢴۧґೞஉ՘ϟࠊȂ൸૗஋٪ஈίו୉੿ࢴጇ௮ඣȂ Ȃޠᇅ੿ࢴጇ௮ඣݳ࢑ࣻӤښ੿ࢴ௮ඣᐡޠᘉȂկᐍᡞુޠಜ੿ࢴጇ௮ඣ੬ۢਣ໣௮ࢴ /ԥᒰяܛಜقៗ૗ΩȂՅй೼ኻ᝞ᄡ٪ޠԥਞڏႬဟ੿ࢴϛޠޤӱԫ೼ঐРݳΚኻᄈґ ኈ៫ԇӶ(Phillippo, 1990)Ȅޠၦਠ༉ᒰਞ౦ԥΚۢโ࡚ޠಜقձ֊ਣ௮ඣȂཽᄈٯΤ୞ձ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 8

Ȟѳȟ՘࣐ϸݚݳ ՘࣐ІࡿޠϛҔளٳ୏ขႬဟϜΚܗ՘࣐੬ኊޠ੬ԥޠ՘࣐ϸݚݳ࢑ւң੿ࢴ ӔӤ՘࣐Ȃޠ՘࣐࢑੿ࢴٳȂԥΚفᢏᄇȃःޠРݳȄ೾ႇᄈ੿ࢴӼԒޠᆀข੿ࢴٿц ՘࣐ȂԄڐȄ࿌โԓၽ՘ਣȂᆀຝُك՘࣐ЩၷٳՅйЩၷ੬ੇȄӶҔளโԓϜȂ೼ ձٿ୞ձޠϛҔளٳࢴ೻ᡞւңϸݚᔭ਱ϜΚ٪ٳ౫Π੿ࢴ՘࣐ȂҴ֊ൣឍȄΚึݏ ಜၦਠַϜق࢑փଷܗੀԓϾᆅᆆȃӤਣஉ՘೩Ӽஉ՘ᆲȃޠԄณႲឍپ੿ࢴ୏ขȂ Ӽ኶੿ࢴȄկѻޠޤ੿ࢴȃѠࣻ࿌ྦጃӵႲൣґޤᔭ਱๊๊Ȅ՘࣐ϸݚݳѠึ౫ґޠ ࡚Ȅᜳޠϛ૗ᜌր੿ࢴӫᆏȂՅйӶ೻ᡞᄃ౫ਣԥΚۢ РݳȂཽӒϸݚя੿ࢴѠ૗ӶโԓϜޠ׭೛׾ໍΠαख़ޠ Bloodhound ޠᗊߟ២ջ โԓᡓᒯ(program logic)ցᘟ၏ޠ(ӵРȂ௦຀ϸݚ೼ࢳโԓୣ໣(program regionޠᙡٙ ٯಜആԚ཭ড়Ȃقโԓୣ໣࢑֐ཽᄈޠ୞ձցᘟ೼ࢳٳ୞ձȂစҦ೼ޠโԓѠ૗౱Ң ScriptTrap ௮ᆁ׭೛ཽ਑ਕ੿ࢴད࢘ ޠ࢑֐्ึяឍଊȄᗎ༗ऌ׭ۢ؛ٿݏցᘟ๗ٸ ൹ΤโԓጇՎܗѠᜌખ JavaScript ᇅ VBScript ੿ࢴᡑᆎٯࡿцȂޠяึܛᔭ਱ਣ Щᄈ೼ٿ৳੿ࢴࣁ୞ၦਠޠޤHTMLȃXML ๊Ӊեୄ၇КݳȂւң੿ࢴዂԓᔭ਱Ϝϑ ᑀҴϰષȂसึ౫֜ӬȂ၏โԓጇ஡ೞࡈ࣐֚ᡑᆎȂ௮ᆁЖᔞᓎ֊ᔯขя၏੿ࢴȄٳ ୏ٿᐚᇅ Naive BayesȃSOM ᇅ K-Medoids ๊ၦਠ௥ଢ଼Рԓ๋؛ңٻفԫѵȂ೩Ӽः ขґޤ੿ࢴ(Shih et al, 2004ȇ2005)Ȅ ୏ขݳޠȞϥȟпх౪΢โԓ࣐ஆᙄ ੿ࢴ(intelligent virus)ȄҦܼ੿ܓ੿ࢴІහኌޠޤ࢑Ӷ୏ขґޠҭޠ೼ঐРݳл् ޠ੿ࢴژڨ௦ޣпх౪΢โԓ(agent)Ґٙ࡟Ўܛಜ࣐лȂقҭዀ೾ளпձཿޠࢴખᚾ ೩ӼٿпߗԒܛӵР೪ဋȂޠѠпӶᆪၰαሰ्ܓ੬ޠ(ࡅૐȂйх౪޲ᐡ୞(Mobile ȄСҐ T. Okamoto ๊Ᏹ޲ࠍ࢑ණяѫΚᆎفኆ୧Ԅ IBM η්೼ঐስ஀౐Τःޠӫޤ ౵፵лᐡ࢑စҦٳРݳȂ೼ޠ(೪ॏӼ२౵፵лᐡх౪΢(heterogeneous agentsڐձݳȂ ֊ད࢘ȞҼژᔭ਱࢑֐᎐ޠӶлᐡܛх౪΢Ϥࣻᔯࢦܓ౵፵ٳȂഇႇ೼ٿᆪၰഀ๗କ ஡੿ࢴڐлᐡ஡ᔭ਱ඉ঩ȂඳѰၘᇴȂޠೞད࢘ءуڐȂࠍཽ௄ၘޠঔ׾ȟȂस࢑ژ᎐ ୞ձȄҦܼх౪΢โԓϬ࢑ᙥҦϸݚᔭޠᡑԚΚঐᔭ਱റӌᇅᗚ঩ښᐡޠ୏ขᇅ٪ࢴ پਞңΠȂڐ੿ࢴ൸ณݳึදޠ੬ੇٳΚژп೼ᆎРݳႅܛցᘟ࢑֐ԇӶ੿ࢴȂٿ਱ ੿ࢴȄޠץԄ༉ክഁ࡚ ၷ໕Ҙሊηϛཽ୅ޠ׭೛ϟ໣ޠȂႬဟ੿ࢴᇅЇ੿ࢴؐໍޠᓎ຀Ⴌဟ׭೛ϛᘟ ЦȂ౫ϭޠႬဟ੿ࢴϑϛӕ჌௄ࠊΚኻޠ൑હȂ೾ளഎ࢑ፓӬӼᆎ੿ࢴܗជᙬޠ੬ܓȂ Рޠ୏ขȂӱԫ٪ࢴ׭೛ϛᔗӕࠂ४ܼ൑Κޠ଱ᗘ٪ࢴ೻ᡞٿРԓޠпөᆎୄ၇ᗵୢ ੿ࢴጇ୏ขȃ௮ඣݳȂࣦՎఃึԓϸݚݳ๊٪ࢴ׭೛എႇܼݨ२ᓘᄙ੬ኊޠݳȂ༉ಜ ՘࣐ȂޠȂйច֥ፓᚖܓ੬ޠഁᇅՍ՘ᡑᆎץറፓӬȃ༉ክڏ୏ขȂՅ౫ϭ໐ӈ੿ࢴޠ ޠᇳց౦ηᓎϟණЁȄᄈܼ౫ϭ੿ࢴޠூႇџРݳٻୄ၇ᇅ෣ᝀКݳȂޠཧପϛӤٯ ಜၦྜȄقޠࣻ࿌τޠ୏ขРݳԚਞԥ४Ȃйխңޠᇅึ৥Ȃႇџܓ੬ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 9

੬ኊ຀КȂ࣐ᄈ׫੿ࢴፓӬᇅޠ؂୏ข׭೛ϑ්੿ࢴϛѠᡑޠ੿ࢴޤҭࠊଭᄈґ ւңҐᡞ፤(Ontology)૗ԥਞفȂ੿ࢴ՘࣐੬ኊ୏ขϑ࢑ҭࠊлࢻȄࢉҐःܓ੬ޠӼᡑ ߓұȂၽңዂጚࣃᆶᆪၰޠȂ஡໐ӈ੿ࢴ՘࣐ࢻโᇅၽձᎍ࿌ܓ੬ޠᜌҐᡞޤ౫֖ Ԛዂጚם՘࣐੬ኊȂޠѓңȂዂᔤя໐ӈ੿ࢴӼᡑޠᄙᙾඳޒFuzzy Petri Net)૗ඣᛳ) ௱፤Ȅ८ᄈ౫ϭ໐ӈ੿ࢴޠ೤ࠍ(Fuzzy Rule)ȂଭᄈөᆎϛӤ௒ݸᇅ՘࣐Ȃձяഷᎍ࿌ ᜱ߾ȂՅዂጚࣃᆶᆪޠፓᚖڐᡞ֖౫ڏȂҐᡞ፤૗ܓፓᚖ੬ޠഁץӼᡑȃፓӬᇅ༉ክ ७ٯ୏ขя੿ࢴȂޠցᘟȂԥਞޠ௒ݸȂഇႇዂጚ௱፤ႇโձᎍ࿌ޠᐄϛӤٸ(ၰ(FPN մᇳցޠѠ૗ܓȄ

ಜقήȃ൹Τԓ

Ꮳȃ߭ဵ೏౪ᏣȃϏཿښȂԄᔗңӶཌྷ೏౪ᐡ௢ހಜᔗңጓ൝ߩளኅقӶ൹Τԓ ൹Τԓ฾ᡞԄ x86 ࢝ᄻȃARM ࢝ᄻȃMIPSޠPDA ๊Ȅளң ڸңႬဟȃၦଊঢ়Ⴌȃ ೏౪Ꮳл्ϸ࣐ήτ᜹Ȉޠࣻৡܼ Linux ׭೛ٯ࢝ᄻ๊Ȅҭࠊளُ Š ARMȈARM7,ARM9,Xscale,StrongARM ᔗңޠހStrongArm CPUȂ౫໧ࢳೞኅ ޠ࢑ Intel ϵѨޠӗ CPU Ϝഷளُق ARM CASIO Cassiopeia E-115ȃ୾ಁ ޠ iPAQȃCASIO ޠ ԄȈCOMPAQپӶ Handheld PCȂ ޠ LEO FreeStyle E300 ๊๊Ȅ Š PowerPC:4xx,7xx,9xx ӗ CPUȂق Motorola ϵѨϟ DragonBall ޠң௵ܛ ӗ CPU Ϝ࿌௱ Palmق PowerPC ӗȂHandspringق ӗȃmق ԄȈPalm VپȂޠࣻৡᐡᆎᔗ၏࢑τঢ়ഷՇዤ૗ၐޠ Palm ӗ PDAȄق Sony CLIE PEG ޠӗȂц΢ᡚᢪق Visor ޠ ಜҭࠊη࡟඾Іق൹Τԓޠx86:x86 ࢝ᄻ Š ޠಜ࣐лȂԄज୾୾ঢ়љᏳᡞ(NS)ϵѨقӗ CPU ࢑ଭᄈ൹Τԓق x86 ޠ೼ᜟࡿ ӗ CPUȄق Geod ৰ౵Ӷܼ ARM ഻ആΠմԚҐІմޠഷτޠуཌྷ೏౪ᏣڐARM ཌྷ೏౪ᏣᇅҀൠα ᔗޠཌྷ೏౪Ꮳ.п ARM ࣐ਰЗޠ૗ܓ࢝ᄻࠍ຀२ܼණାޠуڐRISC ࢝ᄻȂՅ ޠ૊Ⴌ ңශбȂ౱ࠣᆎ᜹ႈІ PDAȂ኶՞ࣻᐡȂᙣ߄ȂVoIP(Voice over IP)ᆪၰ೏౪Ꮳ ࢑ Smart Phone)๊өԓөڐnetworking processor)Ȃᐡα౾(Set-Top Box)Ȃ՘୞Ⴌၘ(Џ) ಜ(RealقႬφІ೾ଊ౱ࠣȄԫѵȂARM ηᕖூ೩Ӽ֊ਣձཿܓႬဟ໋ᜟȂ੒ຳޠኻ Time Operating System, RTOS)ޠМනȂЩၷޤӫޠԥ Windows CE, Linux, pSOS, ϛւȄ܂࢑ณ؂ᔗңስ஀ޠVxWorks, EPOC, uCOS, BeOS ๊ȂӶ൹Τԓ౱ࠣ Ԅ೩ӼႫৣӠߓپ཮ӵዻȂލ൹ΤԓҀൠޠߩᇅ঩ԥٯx86 ၯໍ൹Τስ஀ᔗңȂ ᆅᆆଳӗܗң MIPS ਰЗ೏౪ᏣȂٻ޲೩ӼᆪၰһඳᏣܗң AMD 29000 ೏౪ᏣȂٻᐡ ࢌԥስ஀Ϝ x86 ೏౪ᏣࣲณϹΤᓻ༗Ȃx86 ೏ٳI/O ೏౪ᏣȂӶ೼ ޠ ң Intel i960ٻћ ౪Ꮳޠ൹ΤԓᔗңӼљ࢑ӶུᙾϾ࠯ᄙޠ฾ᡞαԥܛึදȄӶ൹Τԓ CPU ስ஀ϜȂජ Ϝ ARMȃ ڐMIPS ๊Ȅ ڸ ϵѨԥ Transmetaȃࡅ ౿ (VIA)ȃARMޠඬ൹Τԓ CPU ਰЗ׭೛ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 10

஠ւ׭ڐڨಜη஡ق຀೻ᡞکϵѨӬձȂཏޠ࢝ᄻȂᇅ೼᜹ޠCPU ௵ңӓུ ޠ MIPS ࢝ᄻȂѠп࡟Р߰ӵւޠࣻৡܗ ࢑ x86ޠCPU ௵ң ޠ ȄՅࡅ౿ȃTransmetaښ४ޠ೛ ࡏሬȄޠᔗң೻ᡞȂӶ׭೛ЎΠΚၿึ৥ڸಜقձཿޠң౫Ԛࢻ՘ NET-Start-IXP!Ȅ၏ึ৥ݗϜѶ೏౪ ޠಜ҂ѯ࣐ශኌϵѨҢ౱قϟ൹ΤԓفҐः RISC ೏౪ ޠңାਞ૗ٻᏣਰЗ࣐ 32-bit Intel XScale–IXP420ȂIPX420 ӶᔗңР८࢑ ԄȈپPCI Ϯ८Ȃ ޠᘘщϮ८ІዀྦޠΠ೩ӼٽйණٯᔗңӶᆪၰαȂހᏣȂѻೞኅ 8MB Flashȃ32MB SDRAMȃLAN port*4ȃWAN portȃ16MB NAND-FlashȃUSB ๊Ȅ ಜقLinux ҂ѯȂձཿ ޠ࢑໡ܺ঩ۗጇޠңٻউשಜϜȂقձཿޠ೻ᡞР८ȂӶಁӼ ೻ᡞ–Apache+PHP Server ୉࣐໐ӈ੿ࢴޠйԋ၇αӤኻ࢑໡ܺ঩ۗጇٯ࣐ BusyBoxȂ ႇᘯᏣϟժ݉ᏣȄ

Рݳف୥ȃः

ᜌҐᡞȂඣᛳᇅఅޤޠᔤ௵ңҐᡞ፤(Ontology)Ȃߓұᇅ֖౫໐ӈ੿ࢴ՘࣐فҐः ख़ө՘࣐Ґᡞϲഌ᜹ր(Class)ᇅኻԓ(Individual)ޠ྆܉ȂпІϟ໣ࣻପӬޠ឵ܓ ᜌޤ૗ΩȂ஡໐ӈ੿ࢴޠ༮ዂםProperty)ᜱ߾Ȃၽңዂጚࣃᆶᆪၰ(Fuzzy Petri Net)შ) Ȃۢဏө՘ܓ੬ޠցᘟ೤ࠍ৳Ȃӕւңዂጚ౪፤ٺҐᡞᙾඳԚ՘࣐ᆪၰȂ෉గ࡛Ҵഷ ඊ՘࣐੬ኊᆪၰցᘟٸ኶(Membership Function)Ȃഇႇዂጚ௱፤Рݳړᗶ឵ޠ࣐੬ኊ Ⴌφ໐ӈ࢑֐ᘫ឵ܼ໐ӈ੿ࢴȄ

ΚȃҐᡞ፤(Ontology)

ስ஀ϜϑစԇӶ࡟εȂӶᏱ޲ Bunge (1977)ᄈԫۢဏ࢑ȈȶᜱޠOntology ӶলᏱ ܼ઎ᄃзࣩޠஆҐ੬ܓȷȂկ࢑౫Ӷԥ೩ӼᏱ޲ւңԫ੬ܓȂ஡ԫᔗңӶႬဟऌᏱስ ᜌߓႁȞknowledge representationȟȃޤᜌϏโȞknowledge engineeringȟȃޤԄپ஀αȂ ༮ዂȞqualitative modelingȟȃᇮ ّ Ϗ โȞlanguage engineeringȟȃၦਠ৳೪ॏȞdatabaseܓۢ designȟȃၦଊ༮ዂȞinformation modelingȟȃၦଊᐍӬȞinformation integrationȟȃ Ȟinformation retrieval andڦӈᏳӪϸݚȞobject-orient analysisȟȃၦଊᔯસᇅԇޑ extractionȟпІޤᜌᆔ౪ᇅಣᙒȞknowledge management and organizationȟ๊ (Guarino, 1998)Ȅ ȞΚȟOntology ϟۢဏ ȂՅ೼ঐܓஆҐ੬ޠཏဏ࢑၍ម౫ᄃԇӶڐȂٿOntology ೼ঐԆഷԟ࢑௄লᏱՅ ဏȂᇰ࣐ ontology ࢑ۢۢܛ(ᜌϏโР८Ȃഷԟ࢑Ҧ Neches et al. (1991ޤԆᅛᅛೞңܼ ಣԚȂԫܛ(Ԇཋ(vocabularyޠйҦл्ስ஀ٯဏஆҐມཋ(terms)пІᜱ߾(relations)Ȃ ԆཋȄSwarout et al. (1997)ᇴ݃ޠހѠۢဏኅ؂೤ࠍȂޠѵȂւң๗Ӭມཋᇅᜱ߾ йೞңٯᜌȂޤມཋ࢑Ѡпඣख़ስ஀ٳOntology ࢑Κᆎԥ໧ቺ࢝ᄻϟມཋ໲ӬȂՅ೼ й೪ॏٯ໲ӬȂޠஆᙄ࢝ᄻȄGuarino (1998)ۢဏ Ontology ࢑ᡓᒯ঩౪ޠᜌ৳ϜޤӶ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 11

౐ቺోဏȄޠᇴ݃ԆཋٿԚѠң ೤ޠϾ܉ᜌᙾඳԚ྆ޤޠဏȂontology ࢑ւңᡓᒯ౪፤Ȃ஡ስ஀Ϝۢޠᖃ๗αख़ ᇮّ֖౫Ȃпޠйւң໧ቺ࢝ᄻпІҔԓϾٯᜌ࢑є֥ມཋᇅϟ໣ᜱ߾ȂޤϜڐࠍȂ ࢑ӕւңȄܗٵӔޠᜌޤ୉ٽණ ȞΡȟOntology ϟ੬ܓ τ᜹ȂΚᆎ࢑ᐡఢ౪፤ڎԥ౪፤Ѡпϸ࣐ܛChandrasekaran et al. (1999)ߓұ (Mechanism Theories)ȂѫΚᆎ࢑ϲৡ౪፤(Content Theories)ȄՅ Ontology ࢑Κᆎϲৡ ٯᜱ߾Ȃޠӈϟ໣Ѡ૗ޑȃܓӈ឵ޑӈȃޑᜌϟϜȂ֖౫ޤ౪፤Ȃ࢑ѠпӶ੬ੇስ஀ йԥίӗ੬ܓȈ Š Ontology ࢑ΚᆎԆཋ(Ontology as vocabulary) ޠଡ଼ϟ໣ٲঐڎȂՅӶ΢Ϗහኌα࢑௥ଇޑٲޠOntology ӶলᏱϜл्௥ଇԇӶ ፤ᚡܗ୉੬ੇስ஀ٿԆཋȂഷள࣐΢ңޠࣻᜱཏဏȄಒΚȂOntology Ѡຝ࣐Κᆎߓႁ ΠΚٽᜌȂඳّϟȂOntology ණޤޠඣख़࢛ስ஀ٿ ௥સȄಒΡȂ೾ளւң Ontologyޠ ৉ඣख़ስ஀઎ຬޠख़ᇮȄ Š Ontology ࢑ϲৡ౪፤(Ontology as content theories) ءȂϛ૗ښȂ᜹ઢစᆪၰȃዂጚᡓᒯ๊ᐡښᐡޠထϜȂΚঐԂަفӶ΢Ϗහኌः ᇮّȄՅ Ontology ࢑Κঐϲৡ౪ޠМනȂпІሰ्֖౫ٿስ஀ϲৡ౪፤ޠԥΚঐԂ ᜱ߾Ȅ༂஥ઊ (2002)ᐍ౪яޠ೤ੀ࠯ᄙϟ໣ޠӈޑя׳л्ଔᝧӶޠ፤Ȃӱ࣐ѻ ȞSyntacticܓϤ೾ޠᇮݳژȇಒΡȃႁޑٲԥܛȂಒΚȂѠඣख़΢з໣ܓήঐ੬ޠ ontology ȞSemantic InteroperabilityȟȄܓϤ೾ޠᇮཏژInteroperabilityȟȂಒήȃႁ Ґ፵ȂՅйѠпၐಡඣޠᜌޤѠпΠ၍Ȃontology ϛկѠп֖౫ስ஀ܓҦпα੬ ख़ޤᜌϲৡޠ྆܉ȃ឵ܓȂпІ྆܉ϟ໣ޠᜱ߾ȄӱԫȂѠпഇႇ ontology ޠ౪፤ஆ ᜌϲৡȄޤᜌ๗ᄻȂпѠ׈ᐍйఽྀඣख़ስ஀ޤ౫֖ٿᙄȂ ȞήȟOntology ϟ࡛ҴРݳᇅРݳ፤ ontology ࡛ဋРݳᇅРݳ፤Ȃϟࡤഛ ޠUschold and King (1995)࢑ಒΚঐණя݃ጃ ៊ԥ TOVE (Gruninger and Fox, 1995) ȃ KACTUS (Bernaras et al., 1996) ȃ METHONOLOGY (Gomez-Perez et al., 1996)ȃ SENSUS(Swarout et al., 1997)пІ ᜌޤᔗңӶϛӤስ஀ٯ੬ՔڐOn-To-Knowledge(Staab et al., 2001)ȄՅϛӤРݳ፤എԥ Рݳ፤Ȃޠ ӗ 8 ໷ᒌ໕ࡿዀϸݚ ontologyܛ(αȂӱԫւң Fernandez-Lopez et al. (1997 ᒶᐆഷᎍܓᜌ੬ޤޠስ஀ᑀ੬ྲٸ࢑֐ಓӬዀྦȄϛӤስ஀ѠпܓРݳ፤ϟ੬ڐϸݚ Ϝ๗ӬϾᏱϰષ(єڐԄȂւң METHONOLOGY ࡛ҴϾᏱ ontologyȂپРݳ፤ȂޠӬ (ঐ classes пІ 103 ঐ instances)ᇅϾᏱශᡞ(є֥ 19 ঐ classes пІ 66 ঐ instances 16 ֥ ᜌ࢝ᄻпІᜱ߾(Fernandez-Lpoez et al., 1999)Ȅޤޠᆎ ontologyȂ֖౫ϾᏱስ஀ڎ ᜌߓұᇅ֖౫૗ΩȂඣᛳᇅఅख़໐ӈ੿ࢴޤޠᔤ௵ңҐᡞ፤(Ontology)஽τفҐः Ґᡞޠөᆎ՘࣐ȂпІϟ໣ࣻପӬޠ՘࣐឵ܓᜱ߾Ȃп࡛ᄻ໐ӈ੿ࢴ՘࣐ޠޤᜌҐᡞȂ ᐄȄٸᜌޤஆᙄޠ(Ԛ࣐࡛ᄻዂጚࣃᆶᆪၰ(Fuzzy Petri Net ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 12

ΡȃዂጚࣃᆶᆪၰȞFuzzy Petri netȟ

Petri net ౪፤Ȃᙐᆏ PNȂܼ 1962 ԒҦ኉୾኶Ᏹঢ় Carl Adam Petris ණяȂ࢑Κঐ ಜ(Murata, 1989)ȄՅ PNقၦଊࢻโفȂѠпඣख़ᇅःڏዂಣϏޠϾᇅ኶Ᏹዂԓםშ റᎍңܼߓڏȂ࢑឵ܼ୞ᄙዂಣ(Dynamic modeling)ȂଷΠڏ༮ዂϏםშޠԥրܼΚૢ قٽ኶Ᏹ౪፤пٽშұРݳȂҼණޠಜϟ୞ᄙ՘࣐Ȃᙐ൑й໧ቺԓق౫҂՘ᇅϸයԓ ѠໍΚؐӵึ৥Ӷ੬ੇࢻโα८ȄዂጚࣃᆶᆪၰȂᙐᆏ؂ϸݚȂޠ໕ۢܗܓಜձۢ FPNȂ࢑஡ዂጚ௱፤ႇโᒋΤࣃᆶᆪၰϟϜޠΚᆎା໧ࣃᆶᆪၰ๗ᄻȂѠ࢝ᄻӶ঩ԥ ௱፤ႇโȂᙥҦዂጚࣃᆶڐѠඣख़ٯᜌ೤ࠍޤዂጚޠಜϜȂңп౱Ңུق৳ᜌޤ೤ࠍ ੬ԥϟᙾಌ࿾ᘉ௱ڐ౱Ңϟዂጚ౱Ң೤ࠍ(Fuzzy production rule, FPR)Ȃ஡ഇႇܛᆪၰ ᜱ߾Ȅߓ 2 ࣐ዂጚࣃᆶᆪၰዂಣಓဵۢݏᄙ࿾ᘉ໣ϟӱޒȂ௱፤яᒰΤ/ᒰяښ፤ᐡ ᇴ݃өپშٯᄙ࿾ᘉϟஆҐዂጚࣃᆶᆪၰዂಣȂޒঐڎဏȂშ 2 ࣐є֥Κᙾಌ࿾ᘉІ ಣԚϰષϟߓұݳȈ

ߓ 2ȈFuzzy Petri net ϟۢဏ

Κঐ FPN ԥΥঐᡑ኶অȂFPN = (PȃTȃDȃIȃOȃfȃĮȃȕ)Ȉ P = { p1, p2, … , pm }࣐ޒᄙ࿾ᘉܛᄻԚޠԥ४໲ӬȂm ߓұӶዂጚࣃᆶᆪၰϜޒᄙ࿾ ᘉޠঐ኶Ȃm Њ 1Ȅ T = { t1, t2, … , tn }࣐ᙾಌ࿾ᘉܛᄻԚޠԥ४໲ӬȂn ߓұӶዂጚࣃᆶᆪၰዂಣϜᙾಌ ࿾ᘉޠঐ኶Ȃn Њ 1Ȅ D = { d1, d2, … ,dm }࣐ޒᄙ࿾ᘉϜϟޒᄙඣख़(propositions)ܛᄻԚޠԥ४໲ӬȂm ߓұ ӶዂጚࣃᆶᆪၰϜޒᄙඣख़ޠঐ኶Ȃm Њ 1Ȅ ᙾಌ࿾ᘉ໣ϟጤࢳȄژᄙ࿾ᘉޒ኶ȂߓړIȈPĺT ࣐ᒰΤ ᄙ࿾ᘉ໣ϟጤࢳȄޒژ኶Ȃߓᙾಌ࿾ᘉړOȈTĺP ࣐ᒰя ኶(association function)ȂঅϮܼ 0ʂ1 ϟᄃ኶ȄړfȈT ĺ[0, 1]࣐ᙾಌ࿾ᘉϜ኶অϟᜱᖓ ኶(association function)ȂঅϮܼ 0ʂ1 ϟᄃ኶Ȅړᄙ࿾ᘉϜ኶অϟᜱᖓޒĮȈP ĺ[0, 1]࣐ ኶(association function)Ȅړᄙ࿾ᘉϜНԆඣख़ϟᜱᖓޒȕȈPĺD ࣐

Ȅ(2)ᙾಌ࿾ᘉ(transition)Ȃםᄙ࿾ᘉ(place)Ȃ࣐༬ޒ(FPN ԥήঐஆҐಣԚ൑՞Ȉ(1 ᄙ࿾ᘉᇅᙾಌ࿾ᘉȄFPN ౪፤ഷл्ޒarcs)Ȃ࣐጑ဵȂ࢑ഀ௦)܀Ȅ(3)РӪם࣐ߞ఩ ૗Ω(enable)ᇅᙾᡑដึᘉޠஉ՘೤ࠍ࢑Ӷ஽።ᙾᡑڐ࢑Ӷܼ୞ᄙࢻโϟ௥ଇȂӱԫ (fire)Ȃη൸࢑ដึ(fire)ԥ૗Ω(enable)ޠᙾಌ࿾ᘉ(transition)ȂՅӶޒᄙᙾᡑਣȂ਴ᐄ ኈ៫ᇅޠᄙޒᄙᄈࡤޒኈ៫ࠊف૗ΩȂໍΚؐ௥ޠᄙដึՅђΤዂጚ௱፤ޒϛӤ఩ӈ ᄙ(initialޒȂϲ֥Κঐߒۗ௒ݸȂѠпᆏ࣐ߒۗם௦შޣޠᜱ߾โ࡚ȄFPN ࢑ᆎ੬ੇ marking)ȂM0Ȅ୆೪ N ࣐Κঐ FPNȂࠍ N ཽԥޒᄙ࿾ᘉ(place)ᇅᙾಌ࿾ᘉ(transition) ܗ(Κঐᙾಌ࿾ᘉ(transitionژᄙ࿾ᘉ(place)ᜱ߾ޒarcs)࢑௄Κঐ)܀ᆎ࿾ᘉȂՅРӪڎ arcs)ཽ๞ϡ)܀йРӪٯᄙ࿾ᘉ(place)ȂޒΚঐژ޲࢑௄Κঐᙾಌ࿾ᘉ(transition)ᜱ߾ ᄙኈޒ኶ fȂ஡ϛӤࠊړΚঐ᠍२(Ҕᐍ኶)ȂՅᙾಌ࿾ᘉ(transition)є֥Κঐዂጚᜱᖓ ៫ࡤޒᄙޠᜱ߾ᙾඳԚᎍ࿌ޠߓұঅȄޒᄙ(marking)࢑ࡿࣃΚঐߩ॓ᐍ኶ȂҼߓዀᇭ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 13

ᄙޒژ ᄙ(marking)࢑ࡿࣃΚঐߩ॓ᐍ኶ yޒᄙ࿾ᘉ(place)Ȃ୆ԄޒΚঐؑژtoken)Ȃ) ࿾ᘉ(place) pȂߓұ p ԥ y ঐዀᇭ(token) (Chen et al, 1990ȇMurata, 1989)Ȅ

di dk

Pi Pk tik FPN = (P, T, D, I, O, f, Į, ȕ) P={Pi, Pk}, D={di, dk}, T={tik} I(tik)={Pi}, O(tik)={Pk} Į(Pi), Į(Pk) = [0~1] ȕ(Pi)=di , ȕ(Pk)=dk

შ 2Ȉዂጚࣃᆶᆪၰۢဏߓұშ

ᄙ࿾ޒ࢑ᙥҦϛӤ࠯ᄙϟዂጚ౱Ң೤ࠍ(FPR)Ȃ਴ᐄϛӤښዂጚࣃᆶᆪၰϟ௱፤ᐡ ዂጚ௱፤РԓȂ௱፤ޠ኶Ȃഇႇ੬ԥړᄙ࿾ᘉᇅᙾಌ࿾ᘉ໣ዂጚᜱᖓޒᘉᒰΤȂՄኍ ίΚޒᄙ࿾ᘉޠѠ૗ޒᄙȄშ 3a Іშ 3b ϸրߓ൑ΚᒰΤޒᄙ࿾ᘉដึࠊࡤϟዂጚҢ

ұȄܛ(ᒰя࿾ᘉϟዂጚ኶অॏᆘȂԄϵԓ(1ڐ౱೤ࠍȂ࿌ᙾಌ࿾ᘉ t1 ដึࡤȂ

µ Attachment ? µ=0.8 File is “exe” Attachment ? =0.8 File is “exe”

Į(P1)=1 Į(P )=0 Į(P1)=1 Į(P2)=0.8 t1 2 t1 (a)ដึࠊ (b)ដึࡤ

შ 3ȈType 1 ដึࠊࡤϟዂጚҢ౱೤ࠍ

ϜȂᙾಌ࿾ᘉ t1 ೞដึࠊȂP = { p1, p2 }ȇT = { t1 }ȇD = { Attachment ?, File isڐ exe}ȇI(t1) = { p1 }ȇO(t1) = { p2 }ȇf(t1) = µ1 = 0.8ȇĮ(p1) = 0.9ȇĮ(p2) = 0ȇȕ(p1) = { d1 }

=“Attachment ?”ȇȕ(p2) = { d2 } =“File is exe”Ȃᙾಌ࿾ᘉ t1 ೞដึࡤȂĮ(p2) = 0.8Ȃх

ߓ ȕ(p1) = { d1 } =“Attachment ?”ࠊޒᄙ࿾ᘉᄈ ȕ(p2) = { d2 } =“File is exe”ࡤޒᄙ࿾ᘉ ആԚኈ៫ޠѠ૗โ࡚࣐অ 0.8Ȅ ȞΚȟዂጚ౱Ң೤ࠍ(Fuzzy production rule) РݳђΤܓϛጃۢӱષȂ஡ዂጚᡓᒯ೏౪ϛጃۢޠዂጚࣃᆶᆪၰϜՄኍ௱፤ႇโ ԓዂጚҢ౱೤ࠍםȄ஡ዂጚঅђΤࣃᆶᆪၰϟࡤȂ౱ҢϥᆎϛӤښ௱፤ᐡޠࣃᆶᆪၰ ख़(Chen et al., 1990)Ȉܛ௱፤ႇโȂԄίڐFuzzy production ruleȇFPR)Ȃ)

௱౪ႇโѠпഇႇϵڐዂጚҢ౱೤ࠍޠԓםType 1: IF dj THEN dk (CF= µ). ೼ᆎ ඣख़ٿԓםޠ( ԓ( 1 α()= α( ) µ Pk Pj * (1) ڐዂጚҢ౱೤ࠍޠԓםType 2: IF dj1 and dj2 and….and djn THEN dk (CF= µ). ೼ᆎ ඣख़ٿԓםޠ( ௱౪ႇโѠпഇႇϵԓ( 2 ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 14

α()= {α( ) α( ) α( )} µ Pk min Pj1 , Pj2 ,.... Pjn * (2) ڐዂጚҢ౱೤ࠍޠԓםType 3: IF dj THEN dk1 and dk2 and….and dkn (CF=µ). ೼ᆎ ඣख़ٿԓםޠ( ௱౪ႇโѠпഇႇϵԓ( 3 α()=α( ) µ α()= α( ) µ α()= α( ) µ Pk1 Pj * , Pk 2 Pj * ,…. Pkn Pj * (3) ௱౪ڐዂጚҢ౱೤ࠍޠԓםType 4: IF dj1 or dj2 or….or djn THEN dk (CF= µi). ೼ᆎ ඣख़ٿԓםޠ( ႇโѠпഇႇϵԓ( 4 α ()= {α ( ) µ α ( ) µ α ( ) µ } = Pk max Pj1 * i , Pj 2 * i ,.... Pjn * i ,i 1,2,...n (4) ௱౪ڐዂጚҢ౱೤ࠍޠԓםType 5: IF dj THEN dk1 or dk2 or….or dkn (CF= µi). ೼ᆎ ඣख़ٿԓםޠ( ႇโѠпഇႇϵԓ( 5 α ()= α ( ) µ α ()= α ( ) µ α ()= α ( ) = Pk1 Pj * i , Pk 2 Pj * i ,..... Pkn Pj * µi ,i 1,2,...n (5) შ 4a Іშ 4b ϸրߓដึࠊࡤϟ Type 2 ޠዂጚҢ౱೤ࠍȂ࿌ᙾಌ࿾ᘉ t ដึࡤȂ ұȄܛ(ᒰя࿾ᘉϟዂጚঅॏᆘȂԄϵԓ(2ڐ

dj1 dj1 Į(pj1)

pj1 pj1 t t dk dk dj2 dj2 Į(p ) j2 . . Į(pk) . . pj2 . p . . p . j2 . k . pk . djn . djn

Į(pjn) pjn pjn Į(pk)=Min{Į(pj1), Į(pj2),.. Į(pjn)}*µ (a) (b) (a)ដึࠊ (B)ដึࡤ

შ 4ȈType 2 ដึࠊࡤϟዂጚҢ౱೤ࠍ

შ 5a Іშ 5b ϸրߓដึࠊࡤϟ Type 3 ޠዂጚҢ౱೤ࠍȂ࿌ᙾಌ࿾ᘉ t ដึࡤȂ ұȄܛ(ᒰя࿾ᘉϟዂጚঅॏᆘȂԄϵԓ(3ڐ

dk1 dk1 Į(pk1 )

pk1 pk1 t dj t dj dk2 dk2

Į(pj) . . Į(pk2 ) . . . pk2 . pk2 . p . pj . j . dkn . dkn .

Į(pkn) pkn Į(pk1,2,.... n)=Į(pj)*µ pkn (a)ដึࠊ (b)ដึࡤ

შ 5ȈType 3 ដึࠊࡤϟዂጚҢ౱೤ࠍ

შ 6a Іშ 6b ϸրߓដึࠊࡤϟ Type 4 ޠዂጚҢ౱೤ࠍȂ࿌ᙾಌ࿾ᘉ t1, t2,…,tn ដ ұȄܛ(ᒰя࿾ᘉϟዂጚঅॏᆘȂԄϵԓ(4ڐࡤȂึ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 15

t t1 1 d dj1 j1 Į(pj1) p pj1 j1

t2 dk t2 d dj2 j2 Į(pk) Į(pj2) . . . . pj2 pj2 . . . . p . . k . . tn tn d djn jn Į(pjn ) (p )=Max{ (p )*µ ), p Į k Į j1 1 pjn jn Į(pj2)*µ2),..Į(pjn)*µn} (a)ដึࠊ (b)ដึࡤ

შ 6ȈType 4 ដึࠊࡤϟዂጚҢ౱೤ࠍ

შ 7a Іშ 7b ϸրߓដึࠊࡤϟ Type 5 ޠዂጚҢ౱೤ࠍȂ࿌ᙾಌ࿾ᘉ t1, t2,…,tn ұȄܛ(ᒰя࿾ᘉϟዂጚঅॏᆘȂԄϵԓ(5ڐដึࡤȂ

Į(pk1)=Į(pj)*µ1 t1 t1 dk1 dk1 Į(pk1) p pk1 k1 Į(pk2)=Į(pj)*µ2 dj dj t2 t2 dk2 dk2 . Į(pk2) Į(pj) . . . . pk2 . pk2 . pj p . . j . tn . tn . dkn dkn Į(pkn) pkn pkn Į(pkn)=Į(pj)*µn (a)ដึࠊ (b)ដึࡤ

შ 7ȈType 5 ដึࠊࡤϟዂጚҢ౱೤ࠍ

௱፤ᅌᆘݳޠȞΡȟዂጚࣃᆶᆪၰ ޒޠᄙ࿾ᘉՎҭޒȂ௄କۗܓ՘೏౪੬ٯዂጚࣃᆶᆪၰϟ௱፤߾ւңࣃᆶᆪၰϟ ȂӱԫȂܓၰ৸ȂпණЁ௱፤ϟഁ౦ІྦጃٺӼᆎϛӤၰ৸ϜȂᒶᐆΚ఩ഷޠᄙ࿾ᘉ ᄙޒڎ(start \ gaol)ޠዂጚࣃᆶᆪၰዂ࠯ϟߒۗ఩ӈȂଷߒۗዀଅѵȂҼє֥କۗȃҭ ,ႁ໲Ӭ(reachable setژႁ໲Ӭ(immediately reachable set, IRS)ІѠژ௦Ѡޣ࿾ᘉᒶۢȄ

ᄻԚϟஆҐዂጚࣃᆶᆪၰܛ ᄙ࿾ᘉ p1, p2, p3ޒঐᙾಌ࿾ᘉ t1, t2 ІήঐڎRS)Ԅშ 8 ࣐

ᄙ࿾ᘉ p2Ȃᆏޒ௦ᙾಌՎޣᄙޒڐᄙ࿾ᘉ p1 ഇႇᙾಌ࿾ᘉ t1 ϟᐮึȂѠ஡ޒዂ࠯Ȃࠍ

Ӽঐᙾಌ࿾ᘉܗঐڎᄙ࿾ᘉ໹ഇႇޒႁ p2ȂҼѠቹԚ IRS(p1) = { p2 }Ȅसژ௦ޣ ࣐ p1

ᄙ࿾ᘉ p1 ഇႇޒႁȂԄژᄙ࿾ᘉȂࠍᆏ࣐Ѡޒ௦ᙾಌՎҭዀޣᄙޒڐϟᐮึȂРѠ஡

ႁ p2 ҼѠژ௦ޣ ᄙ࿾ᘉ p3Ȃᆏ࣐ p1ޒ௦ᙾಌՎޣᄙޒڐᙾಌ࿾ᘉ t1, t2 ϟᐮึȂѠ஡

(ႁ໲Ӭ(RSژႁ p3 ҼѠቹԚ IRS(p2) = { p3 }ȄՅ p1 ϟѠژ௦ޣ ቹԚ IRS(p1) = { p2 }ȇp2

ࠍ࣐ RS(p1) = { p2, p3 }(Chen et al, 1990)Ȅ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 16

p1 p2 p3

t1 t2

შ 8Ȉዂጚࣃᆶᆪၰ IRS І RS ߓұშ

ᄙ࿾ᘉϜϟዂጚ኶অτϊՅޒٸᄙ࿾ᘉ࢑֐᐀ԥዀଅȂ߾ޒዂጚࣃᆶᆪၰϟө

೪ۢϟକᘉ኶অ(threshold value) ȜȂ֊ Į(pi) Њ ȜȂܛ๊ܼܗȂसዂጚ኶অ Į(pi)τܼۢ

ூዀଅȄዂጚࣃᆶᆪၰϟ௱፤߾ւңࣃᆶڦூዀଅȂЇϟࠍ pi ณݳڦ ᄙ࿾ᘉ piޒࠍᆏ ӼᆎϛӤၰ৸ϜȂᒶᐆΚ఩ޠᄙ࿾ᘉޒޠᄙ࿾ᘉՎҭޒȂ௄କۗܓ՘೏౪੬ٯᆪၰϟ ௱፤ᅌᆘݳϸख़ԄίȈڐၰ৸Ȃٺഷ INPUT: (a)କۗ࿾ᘉᇅө࿾ᘉϟዂጚโ࡚অ Į(p)ȂĮ(p) ∈ [ 0, 1 ]Ȅ ᄙ ȕ(p)= dȄޒb)କۗ࿾ᘉᇅө࿾ᘉᄈᔗϟ) c)କۗ࿾ᘉᇅө࿾ᘉϟߟᘥঅ ȜȂȜ ∈ [ 0, 1 ]Ȅ) ኶ CFȄړd)өᙾಌ࿾ᘉϟጃۢӱષᜱᖓ) e)өᙾಌ࿾ᘉϟጃۢӱષঅ CF = µȂµ ∈ [ 0, 1 ]Ȅ)

OUTPUT:ಥᆓ࿾ᘉߓႁޒᄙϟዂጚโ࡚অȂȕ(pg)= djȄ a. ߒۗ఩ӈᒰΤ

ݸ ȕ(ps)࣐઎ȄޒНԆඣख़ٻᄙ࿾ᘉ ps ҇໹᐀ԥዀଅȂ֊ Į(ps) Њ ȜȂޒକۗ b. ޒᄙၦਠ༉ሏ

ᄙ࿾ᘉ pg ϟҢߞᐚޒޠᄙ࿾ᘉ ps Վҭޒίӗѳؐ᡾֊Ѡ׈ԚҦକۗྲٸ ᐄȄٸၰ৸ᒶᐆ௱፤ϟٺSprouting tree)࡛ҴȂձ࣐ഷ) ᡾ΚȈؐ (a)҇໹᐀ԥዀଅȄ

खᓄԚ(ps, Į(ps), IRS(ps))Ȃձ࣐ҢߞᐚϟକᘉȄٯ b)҇໹ϛ࢑ಥᆓ࿾ᘉȂ)

IRS(ps)ϟ ڐᄙ༉ሏՎ IRS(ps)Ȃޒᄙ࿾ᘉ ps ϟޒc)ഇႇᙾಌ࿾ᘉ ts ஡କۗ)

,(खᓄ࣐(IRS(psٯȂޤዂጚ኶অѠစҦ Į(IRS(ps)) =Į(ps) * f(ts)ॏᆘூ

Į(IRS(ps)), IRS(IRS(ps)))Ȅ ᡾ΡȈҢߞᐚϟ࡛Ҵఅख़ԄίȈؐ

ᄙ࿾ᘉ pe І pyȂޒႁ࿾ᘉ࣐ޫ໲ӬȂژ௦ޣᄙ࿾ᘉϟޒa)ಥᆓ࿾ᘉȈस࢛Κ)

ѠቹԚ IRS(pe) = {φ}ܗ IRS(py) = {φ}Ȃࠍᆏ၏ޒᄙ࿾ᘉ࣐ಥᆓ࿾ᘉȄಥ ᆓ࿾ᘉ஡ϛೞӗΤҢߞᐚϜȄ (b)ߩಥᆓ࿾ᘉйณࣻ᎒ϟޒᄙ࿾ᘉȈ

ᄙ࿾ᘉ pj ∈ IRS(pi)Ȃй Į(pi) Њ ȜȂйᙾಌ࿾ᘉ tij ϟጃۢӱષ CFijޒҭዀ

ϜȂµ ∈ [ 0, 1 ]ȂࠍѠҦࢌԥϟҢߞᐚ࿾ᘉ(pi, Į(pi), IRS(pi))пڐµȂ =

ጤࢳਡዀұ µȂйܼܼٯ࡛Ҵ࿾ᘉ(pj, Į(pj), IRS(pj))ȂུژΚ఩ጤࢳഀ௦ pj ϟၰ৸׈ԚȄ ژ ࡛Ҵϟ࿾ᘉਡዀұȶႁԚ࿾ᘉȷȂ֊ߓұ၏఩Ҧ piུ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 17

(c)ߩಥᆓ࿾ᘉй᐀ԥΚঐпαϟࣻ᎒ޒᄙ࿾ᘉȈ

सޒᄙ࿾ᘉ pu ᇅ paȃpbȃ…ȃpn ܼᙾಌ࿾ᘉ tuv α࣐ࣻ᎒Ȃйҭዀޒᄙ

࿾ᘉ pv ∈ IRS(pu)Ȃй Į(pu) Њ ȜȂйᙾಌ࿾ᘉ tuv ϟጃۢӱષ CFuv = µȂ

ϜȂµ ∈ [ 0, 1 ]ȂࠍѠҦࢌԥϟҢߞᐚ࿾ᘉ(pu, Į(pu), IRS(pu))пΚ఩ڐ

ጤࢳਡዀұ µȂйུܼ࡛ܼٯ࡛Ҵ࿾ᘉ(pv, Į(pv), IRS(pv))Ȃུژጤࢳഀ௦ pv ϟၰ৸׈ԚȄ ژ Ҵϟ࿾ᘉਡዀұȶႁԚ࿾ᘉȷȂ֊ߓұ၏఩Ҧ pu ᡾ήȈसณߩಥᆓ࿾ᘉԇӶȂஉ՘ؐ᡾ѳȂ֐ࠍၱՎؐ᡾ΡȄؐ ϛژޣ᡾Ρʂή࡛ҴѫΚ఩Ҧକۗ࿾ᘉՎႁԚ࿾ᘉϟҢߞᐚȂؐٸ᡾ѳȈ᝸៊ؐ ӕԇԥӉեႁԚ࿾ᘉਣϘ୅ЦҢߞᐚϟ࡛ҴȄ ࡛ҴϟؑΚ఩ၰ৸ȂࣲѠᆏ࣐ܛ᡾ΚʂѳȂҦକۗ࿾ᘉՎႁԚ࿾ᘉؐٸ᡾ϥȈؐ ࡛ٺႁԚ࿾ᘉዂጚ኶অഷτ޲Ȃ࣐ഷڐၰ৸Ϝᒶᐆٳ௱፤ၰ৸ȂӕҦ೼

ឋၰ৸ȄQ ߓܛԥ௱፤ၰ৸ϟ໲ӬȂS1ʂSn ߓܛԥၰ৸ϟႁԚ࿾ᘉዂጚ ޒұȂߓұܛ(࡛ឋၰ৸ϟዂጚҢ౱೤ࠍ(FPR)Ԅϵԓ(4ٺഷڐ኶অȂй

ᄙ࿾ᘉ pg ᄈᔗϟޒᄙ ȕ(pg)= dgȂѠ߭Ӊޠโ࡚অ࣐ zȄ

Q = {(pg, S1, IRS(pg)), (pg, S2, IRS(pg)), …… ,(pg, Sn, IRS(pg))}

Set z = max {S1, S2, …….., Sn}

ݏနȃၦਠϸݚᇅ๗

ಜ೪ॏ࢝ᄻȃଌጜၦਠІขၑၦਠقᄃᡜؐ᡾ȃޠفӶԫത࿾Ϝ஡ഃΚϮಞҐः ᇴ݃Ȅྜٿޠ

ΚȃၦਠኻҐ

ϟ੿ࢴኻҐп໐ӈ੿ࢴ࣐лȂ੿ࢴኻҐԞ໲ਣ໣௄ 1999 Ԓ 04 УՎ 2004فҐः ӫРԓ)ȄӶ೼ঐਣ໣ϲȂδ࢑пႬڽԒ 6 У(੿ࢴӫᆏ਴ᐄᗊߟ២ջᇅᗎ༗ऌ׭ᆪય ᄈຬȂఅख़Ԅߓޠউϸݚש࢑ᆪᙬ(Worm)എ࢑ܗ(੿ࢴ(Virusesޠφ໐ӈձ࣐༉ክ൭Ϯ 3 ܛұȄ

ߓ 3Ȉ໐ӈ੿ࢴኻҐ

Type Name (by Trend Corp.) Macro .AΔGORUM.A ZAUSHKA.A-OΔJERM.AΔCOBBES.AΔMAGISTR.BΔKAMIL.BΔ Executable File BRID.AΔBAGLE.PΔBAGLE.QΔDUMARU.AΔZAFI.BΔYOUGDOS.A PTWEAK.A Δ TROODON.A Δ HYBRIS.C Δ SIRCAM.A Δ GIFT.B Δ Trojan FEVER.AΔXTC.A ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 18

JavaScriptΚ GERMINAL.AΔ EXITW.AΔ SEEKER.A6Δ ACTPA.AΔ EXCEPTION.GENΔVBScriptΚREPAH.AΔLOVELETTERΔHARD.AΔ NOONER.A Δ INFO.A Δ LIFELESS.A Δ NEWLOVE.A Δ CHU.A Δ Script KALAMAR.A Δ CHICK.C Δ CHICK.B Δ CHICK.E Δ HAPTIME.B Δ E D NAV. BΔGOOFFY.AΔHEATH.AΔHORTY.AΔARIC.AΔVIERKA.BΔ GORUM.BΔZIRKO.A NIMDA.A-OΔALIZΔPETIK.CΔPETIK.AΔBADTRANS.BΔGIZER.AΔ ENVIAR.BΔGOKAR.AΔRADIX.AΔUPDATR.AΔKLEZ.EΔKLEZ.HΔ LASTWORD.AΔLOHACK.AΔZAFI.DΔMERKUR.AΔMYLIFE.EΔ PLAGE.AΔ PROLIN.AΔ SOLVINA.BΔ SHOHO.GENΔ DESOR.AΔ PET.TICK.Q Δ PETIK.E Δ ZHANGPO.A Δ ZOHER.A Δ .A Δ Worm YAHA.E Δ BUGBEAR.AΔ BLEBLA.CΔ GAGGLE.CΔ SIRCAM.AΔ YAHA.GΔLOVGATE.AΔLOVGATE.BΔLOVGATE.CΔLOVGATE.GΔ CODΔBAGLE.AΔBAGLE.CΔBAGLE.JΔBAGLE.UΔBAGLE.XΔ .ZΔ .CΔ NETSKY.DΔ MYDOOM.AΔ MIMAIL.AΔ SWEN.AΔSOBER.A

Ρȃ໐ӈ੿ࢴ՘࣐ޤᜌҐᡞ፤(Ontology)ϟ࡛Ҵ

ف౫ᇅߓұȂҐः֖ޠᜌ୉ᎍ࿌ޤȂҐᡞ፤ Ontology ૗஡ޤစҦࣻᜱНᝧ௥ଇѠ ڏOWL ᇮّпІ Ontology Ϗ ޠϸݚȂഇႇ W3C ۢဏޠ਴ᐄαΚ࿾ᄈ໐ӈ੿ࢴ՘࣐ л्஽።௄೤ੀϾفҐᡞ፤Ԅშ 9 ȄҐःޠProtégé 2000)Ȃ࡛Ҵ໐ӈ੿ࢴ՘࣐) గ૗пҐᡞ፤ᄈ໐ӈ੿ࢴ՘࣐ձוዂԓȂޠ(Ͼ(conceptualize܉྆ژspecification)ᙾඳ) ๗ᄻȂႇᘯޠᜌޤ՘࣐ዂԓᇅ੬ኊȂໍՅԥਞၽңҐᡞ፤ڐ௥ଇᇅϸݚȂΠ၍ޠ౐Τ (Protégé 2000)ڏࣻᜱ OWL ᇮݳᇅ Ontology ᐈձϏޠւң W3C ۢဏف໐ӈ੿ࢴȄҐः ໲ӬȂԫ܉྆ޠ໲Ӭ܉అख़ԄίȈ(1) Class:᜹ր࢑Κঐє֥೩Ӽφ྆܉྆ޠϜࣻᜱڐ ٿ࢑ኻԓܗφ໲Ӭٳ໲ӬȂഇႇ೼܉Ԇ྆ޠȂច֥೩Ӽࣻᜱހስ஀ోဏኅޠ໲Ӭ܉྆ ᜱ߾ȂѠпఅख़ޠ࢑ኻԓϟ໣ܗ܉అख़ᇅ֖౫྆ٿ࢑ңܓఅख़ᇅ֖౫Ȅ(2) Property:឵ ֖ޠᜱ߾Ȅ(3) Individual :ኻԓ࢑Κঐᡞޠ᜹րᇅ᜹րȃ᜹րᇅኻԓȃኻԓᇅኻԓϟ໣ উᐍ౪ 12 ᆎ՘࣐੬ኊȂשȄ܉྆ޠє֥ܛφȂңпఅख़၏᜹րپޠ౫Ȃѻ࢑࢛Κ᜹ր ᐄȂԄߓ 4Ȅٸޠ੿ࢴ໐ӈܗձ࣐୏ขႬφ໐ӈ࣐Ҕள໐ӈ

ߓ 4Ȉ໐ӈ੿ࢴ੬ኊ

ᡑ኶ NO. ੬ኊ ϲৡᇴ݃

๊…ԓ Exe, vbs, scr, pif, bat, chm, comםX1 ߤђᔭ਱ X2 ߤђᔭ਱τϊ ߤђᔭ਱኶໕ X3 ߤђᔭ਱኶໕ ߤђᔭ਱኶໕ X4 ϲ֥ Script โԓ JavaScript and VBScript

X5 ϲ֥ URL ՞֮ ActiveX controls URL X6 ߤђᔭ਱ пߤђᔭ਱РԓΤ߮ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 19

X7 ౵ளޠ MIME ੀԓ ౵ள MIME ޠᔭ਱ੀԓΤ߮

X8 Embedded пᢒ൹РԓΤ߮

Зרң޲ឍٻX9 ᡑϾߤᔭϟ୚ᔭӫ ׾ᡑ୚ᔭӫȂ७մ

ӫᆏȃኺᆏ๊ޠң޲߭ӉٻX10 ୄ၇༉ଛ޲ӫԆ ௵ң ң޲ٻX11 ୄ၇лᚡᇅ߭ӈϲৡ плᚡཧପϲৡ෣ᝀ

X12 ൑ΚԞӈ޲ ൑ΚԞӈ޲ܗӼ՞Ԟӈ޲ ȞΚȟOntology ϟ࡛Ҵ ң௵ٯᜌໍ՘Ґᡞ፤ϟϏโϸݚȂޤޠȂଭᄈ໐ӈ੿ࢴ܉྆ ң Ontology௵فҐः Protégé 2000 ձ࣐࡛ဋ ޠःึܛفѭϞդτᏱ SMIȞStandford medical informaticsȟः ໐ޠ࡛ဋ໐ӈ੿ࢴ՘࣐ٿРݳ፤ޠ(਴ᐄ Uschold and King(1995ٯȂڏᜌҐᡞ໡ึϏޤ ᜌҐᡞȂؐ᡾ԄίȈޤӈ੿ࢴ ܛя໐ӈϟ׳йٯϸݚ໐ӈҐНٿРԓȂޠউഇႇϟࠊϸݚשӶ໐ӈ੿ࢴϜȂ .1 ᘫા࣐܉྆ٳȂԄߤᔭȃᔭ਱ੀԓȃߤᔭτϊȃ෣ᑏ๊РԓȂӕ஡೼Κ܉ԥ྆ ဏԄߓ 4Ȅۢ܉Ȃ྆܉྆ٳߓұ೼ΚٿНԆޠңԥဏཏٻйٯȂܓ឵ܗ᜹ր ᜹րІφ᜹ޠϜۢဏ੬ۢ܉࡛ဋ ontologyȂӒҦ྆ٿ౲๋ޠί܂উ௵ңҦαש .2 Я᜹րӫᆏȂޠӔӤᘉ๞ϡΚঐΚૢϾޠ܉྆ٸᜱ߾Ȃӕޠϟ໣܉րȂпІ྆ General concept)Ȅ)܉྆ܓΚૢޠထಣӶΚକȂ౱Ңԫስ஀ޠ܉ࣻӤ྆ױйٯ 3. OWL(Web Ontology Language)л्࢑пା໧ቺޠඣख़ȂໍՅ஡ၦྜȃၦਠᓾԇȃ ߓұ໐ӈ੿ٿң OWL ᇮّٻউשȷᜱഀӶΚକȂӱԫޠᇅ೏౪ࢻโȂȶᇮཏϾ ᜌȄޤࣻᜱٳΚޠࢴ שࣻᜱ੬ኊϟࡤȂޠйഇႇ OWL ඣख़໐ӈ੿ࢴٯࣻᜱ੬ኊȂޠя໐ӈ੿ࢴ׳ .4 Ԅშ 9Ȅݏ੬ኊϟᜱᖓȂᜱᖓ๗ޠ࡛ആ໐ӈ੿ࢴϟ໣ٿ ң Protégé-2000ٻউ

შ 9Ȉ໐ӈ੿ࢴ՘࣐Ґᡞ፤ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 20

ȞΡȟ໐ӈ੿ࢴ௱፤Жᔞϟ࡛ဋ ᜌҐᡞȄޤޠ໐ӈ੿ࢴژউѠூשҐᡞ፤࡛ᄻؐ᡾Ȃޠ(King(1995 ڸ စҦ Uschold ԚዂጚҢ౱೤ࠍ(FPR)ȂՅםܛܓᜱ߾឵ޠϟ໣܉ᇅ྆܉ᜌҐᡞϜ྆ޤҐ࿾஡ഇႇᙾඳ అख़௱፤ЖᔞԄեցᘟႬφ໐ӈ࢑֐࣐੿ࢴ໐ٯ໐ӈ੿ࢴϟ௱፤ࣃᆶᆪၰ๗ᄻȂژூ ዂጚҢ౱೤ࠍ(FPR)Ȃڸ(ᙾඳϟዂጚࣃᆶᆪၰ๗ᄻ(FPNܛᜌҐᡞޤӈȄ਴ᐄ໐ӈ੿ࢴ

Ԛ௱ם[ᆎ໐ӈ੬ኊ[x1,x2,…,x12]ጢጇԚ[0,1,…,1 12 ޠউ஡Ⴌφ໐ӈשშ 11Ȅڸ Ԅშ 10 ௱፤ႇڐጢጇԄ[1,1,1,0,0,1,0,0,0,0,1,1]ȂޠᒰΤ࠯ԓȂ୆೪࢛ΚࡍႬφ໐ӈޠ፤Жᔞ โԄίȈ ጢጇಓӬ R1ȃR2ȃR3ȃޠ᡾ 1Ȉ ਴ᐄዂጚࣃᆶᆪၰ๗ᄻ(FPN)Ȃ၏ࡍႬφ߭ӈؐ

R6ȃR11ȃR12 ϟ೤ࠍȂՅକᘉ࣐ X1ȃX2ȃX3Ȅ

௱ขঅ࣐ 0.949Ȃ௱፤ޠ௱፤ȂX6 ࿾ᘉޠ(ԓ(4ם(᡾ 2Ȉ ਴ᐄዂጚҢ౱೤ࠍ(FPRؐ ႇโԄίȈ

X6=MAX(X1ĺX6ȂX2ĺX6ȂX3ĺX6)=MAX(1*0.898Ȃ1*0.924Ȃ1*0.949) =0.949

ጢጇܓ឵ޠ௱፤ȂҦܼ X9 ᇅ X10 ࿾ᘉޠ(ԓ(5ם(᡾ 3Ȉ ਴ᐄዂጚҢ౱೤ࠍ(FPRؐ

࣐ 0ȂѬԥ࿾ᘉ X11 ᅗ٘఩ӈՅೞដึȂӱԫ X9 ᇅ X10 ࣲณ௱ขঅȂX11 ޠ௱ขঅ࣐Ȃ௱፤ႇโԄίȈ

X11 = 0.949*0.898 =0.836

௱፤ȂX12 ϟ௱፤অ࣐ 0.836Ȃ௱፤ႇޠ(ԓ(1ם(᡾ 4Ȉ ਴ᐄዂጚҢ౱೤ࠍ(FPRؐ โԄίȈ

X12=0836*1=0.836

௱፤ႇโᇅ࿾ᘉ X12 ࣻӤȂࢉ௱፤অҼ࣐ 0.836ޠ᡾ 5Ȉ࿾ᘉ X13Ȉؐ

੿ࢴ߭ӈȂԥޠ೼࢑ΚࡍାॴᓏޤউѠпூש௱፤অȂޠ ௄࿾ᘉ X13 ң޲Ȃ೼ࡍ߭ӈᅹծ੿ࢴ߭ӈȂٻޤ೾ٯ࣐੿ࢴ໐ӈȂܓѠ૗ޠ83.6% ң޲ᒶᐆᄈԫ߭ӈ೏౪୞ձȄٻ፝

R1: IF d l or d2 or d3 THEN d 6 R9: IF d 7 THEN d 12

R2: IF d 4 or d5 THEN d8 R10: IF d 8 THEN d 10

R3: IF d6 THEN d 9 R11 :IF d 8 THEN d 11

R4: IF d 6 THEN d 10 R12: IF d 8 THEN d 12

R5: IF d 6 THEN d 11 R13: IF d 9 THEN d 12

R6: IF d 6 THEN d 12 R14: IF d11 THEN d 12

R7: IF d 7 THEN d 10 R15: IF d 10 THEN d 12

R8: IF d 7 THEN d 11 R16: IF d 12 THEN d 13

შ 10ȈዂጚҢ౱೤ࠍ(FPR) пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 21

c16=0.898 X1 c69=1.0 X9 c9-12=1.0 c26=0.924 c6-12=1.0 X2 X6 c6-10=0.761 c6-11=0.898 c36=0.949 c X3 c7-10=0.40 10-12=1.0 X10 c c7-12=1.0 12-13=1.0 X12 X13 X7 c 7-11=1.0 c11-12=1.0 X11

c48=0.714 c8-10=1.0

X4 c8-11=1.0

X8 c8-12=1.0 c58=0.285 X5

შ 11Ȉ໐ӈ੿ࢴ՘࣐੬ኊϟዂጚࣃᆶᆪၰ

ήȃ໐ӈ੿ࢴႇᘯຠզ

੿ࢴኻҐ୉࣐ଌጜၦਠȂଌጜяޠԒ 2004 ژң 1999 Ԓٻಜϟ੿ࢴႇᘯዂಣقҐ п 1859 ࡍҔள໐ف୏ข૗ΩȂҐःޠ໐ӈ੿ࢴ௱፤ዂಣȄ࣐ຠզԫΚ FPN ௱፤ዂಣ уၦਠ௥ଢ଼РݳȇSOMȃNaïve Bayesڐ଺໐ӈ੿ࢴ୉࣐ขၑኻҐȂᇅ 96 ޠӈᇅଌጜၦਠ ژུ؂Norton2007(੿ࢴጇ ڸ ࢴ೻ᡞ Pccllin2007٪ޠDecision tree пІҀ८α୧ཿ ڸ 2007 ѳУ)୉ЩၷȂЩၷ๗ݏԄߓ 5Ȅ ໐ӈ੿ࢴޠউଭᄈ 2004 Ԓ 12 Уϟࡤש୏ข૗ΩȂޠȃུ੿ࢴޤ࣐Πขၑᄈܼґ ҭ؛੿ࢴȂԥਞ၍ޠޤȂґޠུژϸݚዂಣѠп୏ขޠউשᡘұȂݏ୉ขၑȂၦਠ๗ ੿ࢴȄߓ 6 ᡘұژ੿ࢴۢဏᔭ൸୏ขϛུ؂ԥءୱᚡȈޠࠊ୧ཿ٪ࢴ೻ᡞഷц΢ၝ੿ ੿ޠޤDecision tree ᄈґ ڸ уၦਠ௥ଢ଼РݳȇSOMȃNaïve BayesڐРݳᇅޠউණяש ޏউขၑϟ୧ཿ٪ࢴ೻ᡞ࣐ 2007 ԒϟשЩၷ(Shih et al., 2004ȇ2005)Ȅݏ୏ข๗ޠࢴ ݏ๗ޠԥ஡୧ཿ٪ࢴ೻ᡞ୏ขء੿ࢴȂӱԫུޠԒ 4 Уϟࡤ 2007 ژҐȂҦܼґԥԞ໲ ੿ࢴȄޠޤȃґޠȂ٪ࢴ೻ᡞ࢑ԇӶϛ૗୏ขུفःޠ୉֖౫Ȃկ਴ᐄ೩ӼᏱ޲

ߓ 5Ȉ୏ขРݳϟ୏ข૗ΩЩၷߓ

TP TN FP FN Detection Rate False Positive Rate Overall Accuracy Naïve Baye 89 1842 17 7 92.708% 0.914% 98.772% Decision 89 1854 5 7 92.708% 0.269% 99.642% Tree SOM 87 1855 4 9 90.625% 0.215% 99.335% Pccllin2007 95 1859 0 1 98.958% 0% 99.949% Norton2007 93 1859 0 3 96.875% 0% 99.847% FPN 95 1855 4 1 98.958% 0.161% 99.795% (Detection RateȈTP/ TP + FN, False Positive RateȈFP/ TN + FP, Overall AccuracyȈTP + TN/ TP + TN + FN + FN) ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 22

ߓ 6Ȉґޤ੿ࢴขၑЩၷߓ (“¥”= detected)

Virus Profile FPN SOM Naive Bayes Decision tree WORM_NETSKY.P ¥¥¥¥ WORM_MYTOB.A ¥¥¥¥ WORM_MYTOB.K ¥ - ¥¥ WORM_MYTOB.R ¥¥¥¥ WORM_MYDOOM.O ¥¥¥¥ WORM_NETSKY.Q ¥¥¥¥ WORM_SOBER.U ¥ - - - WORM_MYTOB.KQ ¥¥¥¥ WORM_MYTOB.LL ¥¥¥ WORM_LOOKSKY.A ¥¥¥¥ WORM_RONTOKBRO.C ¥¥¥¥ WORM_RONTOKBRO.J ¥¥¥¥ TROJ_YABE.A ¥¥¥¥ TROJ_YABE.B ¥¥¥¥ TROJ_BAGLE.CZ ¥ - ¥¥ WORM_AHKER.J ¥ - ¥¥ VBS_SOBER.AA ¥¥¥¥ JS_WONKA.A ¥ - - -

ಜ࢝ᄻقӃȃ

Ӷܼ٪Ц໐ӈ੿ࢴΤޠಜϜȂҭقණяΚ໐ӈ੿ࢴ௱፤ЖᔞȂဋܼ൹ΤԓفҐः ߭ӈਣȂ஡Ҕڦң޲ԞٻұȂ࿌ܛ ಜȄ൹Τԓ໐ӈ੿ࢴႇᘯᏣ࢝ᄻԄშ 12قң޲ٻ߮ ցᘟ࢑֐࣐੿ٿ৳ഇႇԫ೤ࠍٯԚ೤ࠍ৳ȂםႬφ໐ӈစҦᏱಭዂಣᏱಭޠளᇅ౵ள ՘࣐ȂसึޠցᘟႬφ໐ӈ࢑֐ԥ౵ளٿ৳೤ࠍޠࢴ߭ӈȄ੿ࢴႇᘯዂಣ਴ᐄᏱಭԂ ࡛ឋȂޠၦਠַུژѫԇܗ๞փଷٯң޲Ȃٻ՘࣐ਣȂཽឍ֚ޠԥ౵ளڏ౫Ⴌφ໐ӈ ң޲ᘳ៕໐ӈȄٻ௦ҦޣसႬφ໐ӈցᘟ࣐Ҕள՘࣐Ȃࠍ

੅ࡉྤ੅ॾٙڶ

IBM M51 ႖࿇ఐ੅ॾٙ OS: Windows XP

ၡٙఐ੅መៀᕴ Mail serverڤխ੅ሽᆰ ༊Ե OS: Linux IBM eServer X346 OS: Linux

ൄॾٙإ࠷گ IBM M51 OS: Windows XP

ൄሽᆰإ

შ 12Ȉ൹Τԓ໐ӈ੿ࢴႇᘯᏣ࢝ᄻ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 23

ಜ໡ึᕘძقΚȃ

ಜ໡ึαȂNET-Start-IXP420 ࢑п Intel Xscale ൹Τԓ౱ࠣϜȂ஠࣐ᆪقӶ൹Τԓ ၰࣻᜱ౱ࠣ໡ึϟ IXP 420 CPU ࣐฾ᡞਰЗȂIPX420 ࢑Κঐାਞ૗ޠ RISC ᆪၰᔗң Ґ EmbeddedޏഷུޠೞңӶᆪၰ೪റϜȂђαҦශኌၦଊՍ՘ঔ׾ހ೏౪ᏣȂѻೞኅ ೻฾ᡞ೪റᐍ౪Ԅߓ 7ȂԄ WebMailޠңٻܛᄃርαفLinux ࣐೻ᡞਰЗȂԄშ 13ȄҐः ޠԋӓᆔ౪ժ݉ᏣȃԞึ߭ӈޠңٻܛಜȃ੿ࢴ஠ঢ়Іཿଡ଼စ౪ق൹Τԓޠңٻܛ Ⴌဟ๊Ȅޠңٻң޲ٻMail Server ІΚૢ

ಜϟ໡ึݗقშ 13Ȉ൹Τԓ

ߓ 7Ȉ೻฾ᡞሰؒߓ

฾ᡞ ңഋ ೻ᡞሰؒ Linux–BusyBox ಜقಜ(EEVF) ൹Τԓ໐ӈ੿ࢴႇᘯᏣϟق൹Τԓ Apache+PHP+IMAP Linux–Fedora4 ဵ౱ҢזSecurity Server ᆔ౪ຶРၦਠІ Apache+PHP+MySql+SSL Linux-Fedora4 Mail Server ໐ӈժ݉Ꮳ Sendmail+IMAP Windows–WinXP ߭ӈІᆔ౪޲೪ۢڦң޲ԞٻPC(3 ѯ) Κૢ Browser

ಜѓ૗ϮಞقΡȃ

ᆪၰᕘძίᄃޠϑӶҐᄃᡜࡊٯಜϑ࡛ဋ׈ԚȂقϟ൹Τԓ໐ӈ੿ࢴႇᘯفҐः ಜ೪ۢᇅᐈձႇقಜஉ՘ϟᕘძ೪ۢȃقȄҐ࿾஡అख़Ґښᐡޠርஉ՘໐ӈ੿ࢴႇᘯ ՘ᇴ݃ᇅᄃձȄშ 14 ࣐ᄃໍٿң޲ᡜᜍዂಣٻউॷӒଭᄈພьዂಣᇅשโᇴ݃Ȅпί ң޲ᡜᜍዂಣϟฬ८ȂಒΚঐؐ᡾࢑ᆔ౪޲ีΤ೪ۢฬ८Ȃ्ཽؒᆔٻձພьዂಣᇅ ூஞጇȄಒڦພьॳ८ژ౪޲ᒰΤவဵІஞጇȂस࢑ಒΚԪีΤȂཽණұᆔ౪޲҇ሰ ४Ȅ᠍ུ؂ޠ᐀ԥ੿ࢴ೤ࠍٯসȂཽޠউשΡؐ᡾Ȃᆔ౪޲ሰ༳Τঐ΢ၦਠпԚ࣐ ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 24

შ 14Ȉᆔ౪ພьዂಣϟᄃձฬ८შ

উӕଭᄈಒΡঐ२्ዂಣȇ੿ࢴ໐ӈႇᘯዂಣໍ՘ᇴ݃ᇅᄃձȂԄშ 15ש௦຀ ڐցᘟٯႬφ߭ӈਣȂ੿ࢴ໐ӈႇᘯዂಣཽ௮ඣؑࡍႬφ໐ӈȂڦң޲ԞٻұȄ࿌ܛ Ԛ࣐੿ࢴ໐ӈޠѠ૗ܓȂस࢛ࡍႬφ߭ӈೞ୏ขяᅹծ੿ࢴ໐ӈȂࠍཽ࣐я౫ණұฬ ௵्ܛң޲ᒶᐆٻᆎѓ૗ᒶ໷ᡲ 3 ٽණٯң޲Ȃԫࡍ໐ӈᅹծ࣐੿ࢴ໐ӈȂٻޤ८֚ ϲৡȄޠ޲࢑ᘳ៕၏ࡍ߭ӈܗѻၦਠַȃփଷڐژᒶᐆԥಌޠٽউණש୞ձȂޠڦ

შ 15Ȉ੿ࢴ໐ӈႇᘯዂಣϟᄃձฬ८შ

੿ࢴ໐ӈႇᘯዂಣޠউשዂಣȂԄშ 16Ȃུ؂२्ዂಣ࣐੿ࢴ೤ࠍޠഷࡤ्Ϯಞ ੿ࢴུ؂ң޲Ӷґٻ໐ӈ੿ࢴȂߴሬޠޤȃґޠ੿ࢴ೤ࠍȂ߰૗୏ขུུ؂ณ໹ᓝᖆ ಜԋӓȄկस࿌ԥུ੿ࢴ೤ࠍ౱ҢȂߓұ੿ࢴϑစोҢяུقݸίȂϬ૗ߴሬޒޠጇ ੿ࢴ೤ࠍȂᗷดϬԥ୏ข੿ࢴϟ૗ΩȂկ੿ࢴ୏ข૗ΩϬུ؂ԥء՘࣐ዂԓȂस࢑ޠ ϟفȄկҐःܓಜԋӓقѓ૗Ȃпࡼ៊ᆱࡼޠུ؂੿ࢴ೤ࠍٽࡤเ৶Ȃӱԫණུ؂ၷ ң޲ٻ੿ࢴጇȂϛܿആԚུ؂ޠϛᓝᖆȂࣻၷΚૢ୧ཿ٪ࢴ೻ᡞᓝᖆٯུ؂੿ࢴ೤ࠍ ᘚȄ֩ пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 25

ዂಣϟᄃձฬ८შུ؂შ 16Ȉ੿ࢴ೤ࠍ

ഛȃ๗፤

౱ҢȂ੿ࢴᇅ٪ࢴ׭ޠ໐ӈ੿ࢴϛᘟޠུژউѠпΠ၍ש਴ᐄНᝧ௥ଇᇅᐍ౪Ȃ ੿ࢴጇ౱ҢϬሰ्Κࢳਣ໣Ȃࢉ૗஋୏ขޠᄈᔗژϤࣻၷࠑȂ௄ུ੿ࢴ౱Ңޠ೛ϛᘟ ೪ॏΚ৉൹Τԓ໐ӈ੿ࢴف२ᘉȄҐःޠفयΩःܛ࢑٪ࢴყ໦ޣ׭೛Κޠ੿ࢴޤґ я໐ӈ׳ϸݚȂޠ໐ӈ੿ࢴȂഇႇᄈ໐ӈ੿ࢴ՘࣐ޠޤᇅґޤႇᘯᏣȂ૗஋୏ขяϑ ᜌޤ՘࣐੬ኊȂ௵ңҐᡞ፤(ontology)࡛ᄻ໐ӈ੿ࢴϟޠҐ፵Іณݳ׾ᡑޠ੿ࢴഷ਴Ґ Τ߮ȄޠҐᡞȃၽңዂጚࣃᆶᆪၰ(FPN)ໍ՘௱፤Ȃԥਞ٪ஈ໐ӈ੿ࢴ ಜȃقң޲ٻӶܼ٪Ц໐ӈ੿ࢴΤ߮ޠණяϟ൹Τԓ໐ӈ੿ࢴႇᘯᏣȂҭفҐः й؈๙੿ࢴ߭ӈȄ਴ᐄٯȂښ೪ۢ٪ៗᐡޠഁץϛ୉߮Τԓԋ၇Ȃഇႇԫ೻ᡞȂѠп ԥίӗᓻᘉȈڏفαख़ȂҐः ಜၦྜխңقϛ୉߮Τԓԋ၇Ȉҭࠊཿࣩ٪ࢴ೻ᡞτഎ௵ң߮Τԓԋ၇ȂᏳय .1 ಜձ࣐ႇᘯقңѵ௦ԓഇႇ൹Τԓ௵فϛ߰ȂҐःޠңαٻң޲ٻτȂആԚ྄ ಜϟࠊȂقң޲лᐡϘೞ୏ขႇᘯȂՅ࢑ೞႇᘯӶ໐ӈٻߩໍΤٯϜϮȂ੿ࢴ ಜၦྜȄق໐ӈٵϸܗȂηϛཽխңܓಜԋӓقΚؐණЁໍ Рޠ୏ขȈΚૢ٪ࢴ೻ᡞ୏ข੿ࢴ࢑ഇႇ੿ࢴጇЩᄈޠ੿ࢴޤІґུ؂Ս୞ .2 ȂӱԫژޠԥӶ੿ࢴጇϜȂࠍ࢑ณݳ୏ขء੿ࢴȂस࢑ޠԓȂᄈܼؑЉུя౫ ೤ޠ࡛Ҵܛ୏ขРݳ࢑ഇႇ໐ӈ੿ࢴ੬ኊޠউש੿ࢴጇȄՅུ؂ޠ҇ሰ्ਣள ໐ӈ೤ࠍޠউש੿ࢴȂӱԫޠޤРԓѠп୏ขяґޠࠍ৳Ȃഇႇ੿ࢴ੬ኊЩᄈ Ȅུ؂ޠϛ҇ਣள ڐȈഷԥਞႲ٪໐ӈ੿ࢴ๋౲࣐Ӷ੿ࢴໍΤႬဟϟࠊ൸ණࠊ٪ៗȂϛᡲܓԋӓ .3 ң޲І໐ӈժٻಜȂ૗୉࣐قউ೪ॏϟ൹Τԓ໐ӈ੿ࢴשΤႬဟϲഌȂӱԫໍ ႬဟȄޠң޲ٻژґ૗ໍΤڐٻᏣϟϜϮȂԥਞ᝞ᄡ੿ࢴ໐ӈȂ݉ ޠȂആԚᇳց౦เାښ४ޠขၑႇโϜȂҦܼ՘࣐୏ขРݳޠӶᄃርஉ՘ ցޠ୉ໍΚؐٿң޲ҐٙٻРԓȂഇႇޠң޲ණᒻᇅၛୱٻң௵فୱᚡȂҐः ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 26

(Рԓ(collaborative filteringޠউη஡Մኍ௵ңӬձႇᘯשԫΚୱᚡȄ؛၍ٿᘟȂ ୏ข౦ᇅ७մᇳց౦ȄޠᓻᘉȂໍΚؐණЁ੿ࢴޠ๗ӬӼᆎ୏ขРݳ

ࢯȃयᗃ

Мࡼᇅ᜔ޠفসཽᄈҐःېཏُȂདᗃ୾ঢ়ऌᏱޠস๞ϡ᝙ີېདᗃή՞ቸࢦ ȄݏጢဵȈNSC 95-3113-P-224-004)ϟഌӌԚ)فֆȂҐ፤Н࣐୾ऌཽ၅ֆ஠ᚡः

୥ՄНᝧ

Ȃ୾Ҵ໵ݔऌ׭τᏱၦଊᆔ౪ःف࠻≊ීȃҖ୾ 92 ԒȂႬφ໐ӈ੿ࢴ୏ขϟः .1 ᆉς፤НȂȄܛف 2. ቔ໸኉ȃҖ୾ 90 ԒȂпᐚޒᜱᖓԓ࢝ᄻ୏ขႬφ໐ӈ੿ࢴϟ௥ଇȂ୾ҴϜѶτ ᆉς፤НȂȄܛفᏱၦଊᆔ౪ः п७՗૎ң˕فᜌ৳ϟःޤ༂஥ઊȃҖ୾ 91 ԒȂ࡛ᄻୋߴ᛿ࠣ๞р೤ۢҐᡞ፤ .3 ᆉς፤НȂȄܛفȂؾҴѯіᚃᏱτᏱᚃᏱၦଊःپ᛿࣐ 4. Bunge, M., “Ontology I: The Furniture of the World. Treaties on Basic Philosophy”, Vol. 3, 1977. 5. Bernaras, A., Laresogiti, I. and Corera, J. “Building and reusing ontologies for electrical network applications”, In W. Wahlster (Ed.) European Conference on Aritficial Intelligence, 1996, pp: 298-302. 6. Chandrasekaran, B. Josephson, J. R. and Benjamins, V.R. “What are Ontologies and why do we need them? ” IEEE Intelligent Systems, Vol. 14, No.1, 1999, pp: 20-26. 7. Chen, S., Ke, J. S. and Chang, J. “Knowledge Representation Using Fuzzy Petri Nets,” IEEE Transactions on Knowledge and Data Engineering, Vol. 2, No. 3, 1990, pp: 311-319. 8. Cohen, F. “Current best practice against computer viruses”, Security Technology, 1991. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on, Vol.1-3, 1991, pp: 261-270. 9. Fernandez-Lopez, M., Gomez-Perez A. and Juristo, N. “METHONOLOGY: form ontological art towards ontological engineering,” Spring Symposium on Ontological Engineering of AAAI, 1997, pp: 33-40. 10. Fernandez-Lopez, M., Gomez-Perez, A., Sierra, J.P. and Sierra, A.P. “Building a chemical ontology using Methontology and the Ontology Design Environment”, IEEE Intelligent Systems, Vol.14, No.1, 1999, pp: 37-46. пҐᡞ፤࣐ஆᙄϟඍཏ໐ӈ୏ข 27

11. Gomez-Perez, A., Fernandez, A. and Vicente, M. D. “Towards a method to conceptualize domain ontologies,” European Conference on Aritficial Intelligence, 1996, pp: 41-52. 12. Gruninger, M. and Fox, M.S. “Methodology for the Design and Evaluation of Ontologies,” Workshop on Basic Ontological Issues in Knowledge Sharing, IJCAI-95, Montreal, 1995. 13. Guarino, N. “Formal ontology and information system,” 1998. available at http://www.loa-cnr.it/Papers/FOIS98.pdf 14. International Computer Security Association Lab (ICSA Lab), “ICSA Labs 10th Annual Computer Virus Prevalence Survey,” available at http://www.icsa.net/icsa/! docs/html/library/whitepapers/VPS2004.pdf 15. Kienzle, M. Darrell and Matthew, C. Elder “Recent WormsȈA Survey and Trends”, ACM workshop on Rapid Malcode, Washington, DC, USA, 2003, pp1-10 16. Lee, Jieh-Sheng., Hsiang, J., Tsang, Po-Hao. “A generic virus detection agent on the internet,” System Sciences, Proceedings of the Thirtieth Hawaii International Conference, Vol.4, No.7-10, 1997, pp: 210 -219. 17. Luke, J., and Harris, C.J. “The application of CMAC based intelligent agents in the detection of previously unseen computer viruses”, Information Intelligence and Systems, Vol.31, 1999, pp:662 -666. 18. Murata, T. “Petri nets: Properties, analysis and application,” Proceedings of the IEEE, Vol. 77, No.4, 1989, pp: 541-580. 19. Neches, R., Fikes, R. E., Finin, T., Gruber, T. R., Senator, T. and Swartout, W. R. “Enabling technology for knowledge sharing,” AI Magazine, Vol.12, No.3, 1991, pp: 36-56. 20. OWL Web Ontology Language Overview. Available online at: http://www.w3.org/2001/sw/WebOnt/, 2005 21. Phillippo, S. J. “Practical virus detection and prevention,” Viruses and their Impact on Future Computing Systems, Vol.19, 1990, pp: 2/1-2/2. 22. Shih, D.H. “Detection of New Malicious Emails Based on Self-Organizing Maps And K-Medoids Clustering,” J. of Information Management, Vol. 11, No. 2, 2004, pp: 211-235. 23. Shih D. H., Chiang H. S. and Yen, D. C. “Classification Methods in the Detection of New Malicious Emails,” Information Sciences, Vol.172, No.1-2, 2005, pp: 241-261. 24. Staab, S., Schnurr, H.-P., Studer, R., and Sure, Y. “Knowledge processes and ontologies,” IEEE Intelligent Systems, Special Issue on Knowledge Management, 16(1), 2001. 25. Swarout, B., Ramesh, P. Knight, K. and Russ, T. “Toward distributed use of large-scale ontlolgy,” In A. Farquhar, M. Gruninger, A. Gomez-Perez, M. Uschool & ஠ё !ڣၦଊᆔ౪Ᏹൣ! ಒΫѳ 28

ven der Vet P (Eds.) AAAI’97 Spring Symposium on Ontological Engineering, 1997, pp:138-148. 26. Symantec.com, Security Response. available at http://www.Symantec.com/region/tw/enterprise/article/virus_protect.html 27. Takeshi, Okanmoto and Yoshiteru, Ishida, “An Analysis of a Model of Computer Viruses Spreading via Electronic Mail”, Systems and computers in Japan, Vol. 33, No. 14, 2002, pp:81-90. 28. Trend micro, Virus Encyclopedia Search. available at http://www.trendmicro.com/vinfo/virusencyclo/default.asp 29. Uschold, M. and King, M. “Towards a methodology for building ontologies,” In: IJCAI95 Workshop on Basic Ontological issues in Knowledge Sharing, pp6.1-6.10, Montreal, Canada, 1995. 30. Zenkin Denis, “Fighting Against the Invisible Enemy Methods for detecting an unknown virus,” Computers & Security, Vol.20, No4, 2001, pp: 316-321.