°ðÅÄ¡¡½¤°ì M2 | ¿ùËÜ¡¡¸¬Æó | ¾®³Þ¸¶¡¡»Ê | |
ȯɽÂêÌÜ¡§Î¥»¶»þ´ÖÊä½þÆþÎϤòÍѤ¤¤¿¥í¥Ü¥Ã¥È¥¢¡¼¥à¤Î¥ª¥Õ¥é¥¤¥óµ°Æ»·×²è ȯɽ³µÍ×:¥í¥Ü¥Ã¥È¥¢¡¼¥à¤ÎPTPÀ©¸æ¤Ë¤ª¤±¤ëµ°Æ»·×²è¤ÎÂåɽŪ¼êË¡¤Î°ì¤Ä¤Ç¤¢¤ë¥¹¥×¥é¥¤¥óË¡¤Ç¤Ï¡¢¥¢¡¼¥à¤Î¼êÀ褬Ä̤ëÃæ´ÖÅÀ¤Î°ÌÃÖ¤ä¼êÀè®ÅÙ¤òÀß·×¼Ô¤¬·è¤á¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤¡£°ìÊý¡¢Äó°Æ¼êË¡¤Ç¤Ï¼êÀè¤Î°ÜÆ°²ÄǽÎΰè¤òÍ¿¤¨µ°Æ»·×²è¤òÆÌ2¼¡·×²èÌäÂê¤Ëµ¢Ã夵¤»¤ë¤³¤È¤Ë¤è¤ê¡¢Å¬Åö¤Êµ°Æ»¤ò°ì°Õ¤Ë·èÄꤹ¤ë¤³¤È¤¬¤Ç¤¤ë¡£ËܼêË¡¤Ï¥í¥Ü¥Ã¥È¥¢¡¼¥à¤ÎÀþ·Á²½¥À¥¤¥Ê¥ß¥¯¥¹¤ÎÆðۥ٥¯¥È¥ë¤òÍѤ¤¤Æ²¾ÁÛŪÌÜɸµ°Æ»¤ò¥ª¥Õ¥é¥¤¥ó¤ÇÀ߷פ¹¤ë¡£ | |||
°ì¿§¡¡¾¼¼÷ M2 | À¾Ã«¡¡¹É°ì | ¾®³Þ¸¶¡¡»Ê | ÌîÅÄ¡¡¸ |
ȯɽÂêÌÜ¡§Êâ¹Ô¤ËŬ¤·¤¿¥í¥Ü¥Ã¥Èµ¡¹½¤Î²òÀÏ È¯É½³µÍס§¸½ºß¸¦µæ¤µ¤ì¤Æ¤¤¤ëÆóÂÊâ¹Ô¥í¥Ü¥Ã¥È¤Î¿¤¯¤Ï¡¢ZMP¤òÍѤ¤¤¿¤â¤Î¤ä¥Ý¥¢¥ó¥«¥ì¥Þ¥Ã¥×¤òÍѤ¤¤¿¤â¤Î¤Î¤è¤¦¤Ë¿¤¯¤Î·×»»¤È¡¢Æñ²ò¤ÊÀ©¸æ¨¤òɬÍפȤ·¤Æ¤¤¤ë¡£¤·¤«¤·¡¢Ãæ¤Ë¤Ï¼õÆ°Êâ¹Ô¤Î¤è¤¦¤Ë¤¦¤Þ¤¯¥í¥Ü¥Ã¥È¤Îµ¡¹½¤òÍøÍѤ·¤ÆÀ©¸æ¤Ê¤·¤Ç¡¢¤¢¤ë¤¤¤Ï¤´¤¯´Êñ¤ÊÀ©¸æ§¤ÇÊâ¹Ô¤ò¼Â¸½¤·¤Æ¤¤¤ëÎã¤â¤¢¤ë¡£¤½¤³¤ÇËܸ¦µæ¤Ç¤Ï¡¢¥í¥Ü¥Ã¥È¤Îµ¡¹½¤ÈÊâ¹ÔÆ°ºî¤Î´Ö¤Ë¤É¤Î¤è¤¦¤Ê´ØÏ¢¤¬¤¢¤ë¤Î¤«¤ò²òÌÀ¤¹¤ë¡£¤µ¤é¤Ë¡¢Êâ¹Ô¤ËŬ¤·¤¿µ¡¹½¤òÁªÄꤷ¤¿¾ì¹ç¡¢´Êñ¤ÊPDÀ©¸æ¤Ë¤è¤êÊâ¹Ô¤ò¼Â¸½¤Ç¤¤ë¤È¤¤¤¦¤³¤È¤òÌÀ¤é¤«¤Ë¤¹¤ë¡£ | |||
»³¸ý¡¡¹¬µ± M2 | À¾Ã«¡¡¹É°ì | ¾®³Þ¸¶¡¡»Ê | ÌîÅÄ¡¡¸ |
ȯɽÂêÌÜ¡§¥³¥ó¥Ñ¥¹·¿ÆóÂ¥í¥Ü¥Ã¥È¥â¥Ç¥ë¤ÎưŪ°ÂÄêÀ»Øɸ¤Î¸¡¾Ú ȯɽ³µÍס§Ëܸ¦µæ¼¼¤Ç¡¤¥³¥ó¥Ñ¥¹·¿ÆóÂ¥í¥Ü¥Ã¥È¥â¥Ç¥ë¤¬½é´ü¾õÂÖ¤«¤é¤Î»ÑÀª°ÂÄêÀ¤òȽÊ̤¹¤ë»ö¤¬¤Ç¤¤ë»ØɸPSC(Postural Stability Criterion)¤òÄó°Æ¤·¡¤¤½¤Î͸úÀ¤ò¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤Ç³Îǧ¤·¤¿¡¥¤·¤«¤·¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤Î¤ß¤Ç¤ÏÉÔ½½Ê¬¤Ç¤¢¤ê¡¤¼Âµ¡¤Ë¤è¤ë¸¡¾Ú¤¬É¬ÍפǤ¢¤ë¡¥¤½¤³¤ÇËܸ¦µæ¤Ç¤Ï¡¤¼Âµ¡¤òÍѤ¤¤ÆPSC¤Î͸úÀ¤ò¸¡¾Ú¤¹¤ë¡¥È¯É½¤Ç¤ÏÀ߷פ·¤¿¥³¥ó¥Ñ¥¹·¿¥í¥Ü¥Ã¥È¤È¡¤¼Â¸³·ë²Ì¤È¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤È¤òÈæ³Ó¤·¤¿¥Ç¡¼¥¿¤Ë¤Ä¤¤¤ÆÀâÌÀ¤¹¤ë¡¥ | |||
KHAMPHAO SISAAT M2 | »³¸ý¡¡±Ñ | º½¸¶¡¡½¨¼ù | ÌçÎÓ¡¡Íº´ð |
ȯɽÂêÌÜ¡§ Evidencing the existence of an end node to detect spoofing attacks ȯɽ³µÍס§ Distributed-Denial-of-Service (DDoS) attack is one of the major security issue on the Internet. DDoS attack employs some source address spoofing techniques to hide the source nodes of the attack. Unfortunately, there is no efficient method to evidence that the node, which is indicated by source addresses of a packet, really sent the packet. Therefore, attackers can send attack packets without worrying about detecting attacker nodes by network administrators. In order to achieve a countermeasure against DDoS attacks, we propose a solution. The key idea of our approach is evidencing the existence of an end node at the just time when a packet, which is sent from the end node, is transferred through the administrative network that is nearest to the end node. Our system checks whether or not a node really exists by a probe which is based on an ARP request about the source IP address of a packet to the node whose MAC address is same as the source MAC address of the packet. Also our system verifies the consistency among the result of ARP probing, the entries of ARP table and the source MAC / IP address of the packet. If there is some inconsistency, the inconsistency shows that some spoofing has occurred. Furthermore, our system keeps the traceability of all end nodes by watching changes of entries on the Forwarding Data Base of the nearest L2 Switch and logging that information with the result of the consistency check on the ARP table. By keeping the traceability in such manner, a network operator can easily find out where the packet came from. By using our system, an attacker no more can hide the locations of attacker nodes by any spoofing techniques. In this presentation, I will talk about the detail of my approach and show the current status of my study. | |||
¾®»³¡¡Âö¸Ê M2 | »³ËÜ¡¡Ê¿°ì | º½¸¶¡¡½¨¼ù | ²¬ÅÄ¡¡¼Â |
ȯɽÂêÌÜ¡§ÈÖÁÈϢư·¿¾ðÊ󥵡¼¥Ó¥¹¤Ë¤ª¤±¤ë¥³¥ó¥Æ¥ó¥Ä¥Ç¡¼¥¿´ÉÍýµ¡¹½¤Î¸¦µæ ȯɽ³µÍס§¥Ç¥¸¥¿¥ëÊüÁ÷¤ÎÆÃħ¤Î¤Ò¤È¤Ä¤Ë¡¢ÈÖÁÈϢư·¿¥Ç¡¼¥¿ÊüÁ÷¤¬¤¢¤ë¡£¤³¤ì¤ÏÈÖÁȤ˴ØÏ¢¤·¤¿¾ðÊó¤òÈÖÁȤοʹԤÈϢư¤µ¤»¤Æɽ¼¨¤·¤Æ¤¤¤¯¤â¤Î¤Ç¤¢¤ë¡£¤·¤«¤·¡¢¸½ºß¤Î¤È¤³¤í¸Â¤é¤ì¤¿¥³¥ó¥Æ¥ó¥Ä¤ÎÃæ¤Ç¤Î¥µ¡¼¥Ó¥¹¤Î¤¿¤áÌ¥ÎÏŪ¤Ê¥µ¡¼¥Ó¥¹¤È¤Ï¸À¤¤Æñ¤¤¡£¤½¤³¤Ç¡¢Ëܸ¦µæ¤Ç¤ÏÈÖÁȤËϢư¤·¤¿¾ðÊó¤ò¥¤¥ó¥¿¡¼¥Í¥Ã¥È¾å¤ÇÄ󶡤¹¤ë¥µ¡¼¥Ó¥¹¤òÄó°Æ¤·¡¢¤½¤ÎÃæ¤Ç¤âÄ󶡤¹¤ë¥³¥ó¥Æ¥ó¥Ä¤ò´ÉÍý¤¹¤ë¼êË¡¤Ë¾ÇÅÀ¤ò¤¢¤Æ¤ë¡£¥³¥ó¥Æ¥ó¥Ä¤ÎÀ¸À®¤Ç¤Ï°ìÈ̤ËÊüÁ÷¤µ¤ì¤ë¤Û¤È¤ó¤É¤ÎÈÖÁȤˤϥ·¥Ê¥ê¥ª¤¬Â¸ºß¤¹¤ë¤³¤È¤«¤é¡¢¤½¤Î¥·¥Ê¥ê¥ª¤ò´ð¤Ë¥³¥ó¥Æ¥ó¥Ä¤òºîÀ®¤¹¤ë¡£¤·¤«¤·À¸ÊüÁ÷¤Ê¤É¤Î¾ì¹çɬ¤º¤·¤â¥·¥Ê¥ê¥ª¤É¤ª¤ê¤ËÈÖÁȤ¬¿Ê¤à¤È¤Ï¸Â¤é¤Ê¤¤¤¿¤á¥³¥ó¥Æ¥ó¥Ä¤òÄ󶡤¹¤ë¥¿¥¤¥ß¥ó¥°¤òÈùÄ´À°¤¹¤ëɬÍפ¬À¸¤¸¤Æ¤¯¤ë¡£¤³¤Î¤è¤¦¤Ê¾ì¹ç¤Ç¤¢¤Ã¤Æ¤âÊüÁ÷¶É¦¤¬¿×®¤ËÂбþ¤·¡¢¥³¥ó¥Æ¥ó¥Ä¤ò½Ð¤¹¤Ù¤»þ´Ö¤Ë¥µ¡¼¥Ó¥¹¤òÀµ¤·¤¯Ä󶡤Ǥ¤ë¤è¤¦¤Ë¤¹¤ë¤¿¤á¡¢É½¼¨¥³¥ó¥Æ¥ó¥Ä¤ò£³¤Ä¤Î¥ê¥¢¥ë¥¿¥¤¥àÀ¤Ëʬ¤±¡¢¤½¤ì¤¾¤ì¤Î»ö¾Ý¤Ç¤É¤Î¤è¤¦¤Ë¥³¥ó¥Æ¥ó¥Ä¤ò´ÉÍý¤·¤Æ¤¤¤¯¤«¤ò½Ò¤Ù¤ë¡£ | |||
¼Äùõ¡¡Î´»Ö M2¡¡ | »³ËÜ¡¡Ê¿°ì | º½¸¶¡¡½¨¼ù | ²¬ÅÄ¡¡¼Â |
ȯɽÂêÌÜ¡§Web¥µ¡¼¥Ð¤Ë¤ª¤±¤ë¥µ¡¼¥Ó¥¹¥¹¥±¡¼¥é¥Ó¥ê¥Æ¥£¸þ¾å¼êË¡¤Ë´Ø¤¹¤ë¸¦µæ ȯɽ³µÍס§¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î¹ÂÓ°è²½¤È¤½¤ÎÍøÍѼԤÎÇúȯŪ¤ÊÁý²Ã¤Ë¤è¤ê¡¤¥µ¡¼¥Ð¤ÎÉé²Ù¤¬ÌäÂê¤È¤Ê ¤Ã¤Æ¤¤¤ë¡¥Ëܸ¦µæ¤Ç¤Ï¡¤¤³¤¦¤·¤¿¥µ¡¼¥Ð¤Î¥¹¥ë¡¼¥×¥Ã¥È¤ò¸þ¾å¤¹¤ë¥·¥¹¥Æ¥àµ»½Ñ¤Î³«È¯¤ò ÌÜŪ¤È¤¹¤ë¡¥¤³¤ì¤Þ¤Ç¤Ë¡¤Æ±¤¸ÌÜŪ¤ò»ý¤Ä´ØÏ¢µ»½Ñ¤¬¿ô¿¤¯Äó°Æ¤µ¤ì¤Æ¤ª¤ê¡¤ËÜȯɽ¤Ç¤Ï ¤Þ¤º¤½¤ì¤é¤Ë¤Ä¤¤¤Æ³µ´Ñ¤¹¤ë¡¥¼¡¤Ë¡¤¥Í¥Ã¥È¥ï¡¼¥¯ÃÙ±ä¤ä¥Ñ¥±¥Ã¥È¥í¥¹Î¨¤ÎÁàºî¤Ë¤è¤ë¥¨ ¥ß¥å¥ì¡¼¥È¤µ¤ì¤¿WAN´Ä¶¤Ë¤ª¤±¤ëWeb¥µ¡¼¥Ð¤Î¥·¥¹¥Æ¥à¥×¥í¥Õ¥¡¥¤¥ê¥ó¥°·ë²Ì¤òÄ󼨤·¡¤ ½¾Í踦µæ¤ÇÆÀ¤é¤ì¤¿·ë²Ì¤È¤Îº¹°Û¤ä¡¤¥·¥¹¥Æ¥à¤Î¹¹¤Ê¤ë²þÎɤβÄǽÀ¤Ë¤Ä¤¤¤ÆµÄÏÀ¤¹¤ë¡¥ | |||
ÅÄÃæ¡¡µ×É× M2 | »³ËÜ¡¡Ê¿°ì | º½¸¶¡¡½¨¼ù | ²¬ÅÄ¡¡¼Â |
ȯɽÂêÌÜ¡§ ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ëÈÖÁÈϢư·¿¾ðÊ󥵡¼¥Ó¥¹¤ò¼Â¸½¤¹¤ë¥×¥Ã¥·¥å·¿¾ðÊóÇÛ¿®µ¡¹½¤ÎÄó°Æ ȯɽ³µÍס§ ÈÖÁÈϢư·¿¾ðÊ󥵡¼¥Ó¥¹¤Î¤è¤¦¤Ê¡¢Â¿¿ô¤Î¥æ¡¼¥¶¤ËÂФ¹¤ëƱÊóÀ¤Î¹â¤¤¥µ¡¼¥Ó¥¹¤ò¥¤¥ó¥¿¡¼¥Í¥Ã¥È¾å¤Ç¼Â¸½¤¹¤ë¤¿¤á¤Ë¤Ï¡¢¥¹¥±¡¼¥é¥Ó¥ê¥Æ¥£¤ÎÌäÂê¤ò²ò·è¤·¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤¡£Ëܸ¦µæ¤Ç¤Ï¡¢¤½¤ÎÌÜŪ¤Î¤¿¤á¤Ë¡¢¥×¥Ã¥·¥å·¿¤È¥×¥ë·¿¤Î¤½¤ì¤¾¤ì¤Î¾ðÊóÇÛ¿®µ¡¹½¤òÊ»ÍѤ·¤¿¡¢¹â¤¤¥¹¥±¡¼¥é¥Ó¥ê¥Æ¥£¤òͤ¹¤ë¥µ¡¼¥Ó¥¹¥·¥¹¥Æ¥à¤òÄó°Æ¤¹¤ë¡£¥×¥Ã¥·¥å·¿¤ÇÇÛ¿®¤¹¤ë¥Ç¡¼¥¿¤Ï¡¢¥ê¥¢¥ë¥¿¥¤¥àÀ¤ÎÍ׵᤬¶¯¤¤¤â¤Î¡ÊÎ㤨¤Ð¡¢À¸ÊüÁ÷ÈÖÁȤËϢư¤¹¤ëÆÃÄê¤Î¥³¥ó¥Æ¥ó¥Ä¤ËÂФ¹¤ëɽ¼¨Ì¿Îá¡Ë¤Ë¸ÂÄꤹ¤ë¡£¤Þ¤¿¡¢Â¿¤¯¤Î¥³¥ó¥Æ¥ó¥Ä¤ÏËÜÊüÁ÷¤¬³«»Ï¤¹¤ëÁ°¤ËÍÑ°Õ²Äǽ¤Ç¤¢¤ë¤³¤È¤«¤é¡¢½¾Íè¤ÎHTTP¤Ë¤è¤ë¥×¥ë·¿ÇÛ¿®¤ò¹Ô¤¤¡¢¤½¤Î¥µ¡¼¥Ó¥¹Í×µá¤Ë±þ¤¸¤ÆCDN¤äP2Pµ»½Ñ¤È¤¤¤Ã¤¿¥³¥ó¥Æ¥ó¥ÄÇÛ¿®µ»½Ñ¤òÊ»ÍѤ¹¤ë¤³¤È¤ò²Äǽ¤Ë¤¹¤ë¡£ËÜȯɽ¤Ç¤ÏÄó°ÆÇÛ¿®µ¡¹½¤ÎÁ´ÂÎÀ߷ס¢ÄÌ¿®Êý¼°¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡£ | |||
ÌÚ²¼¡¡Î´Àµ M2 | °ËÆ£¡¡¼Â | ¿¢Â¼¡¡½Óμ | °ÂËÜ¡¡·Ä°ì |
ȯɽÂêÌÜ¡§ ¥Ñ¡¼¥½¥Ê¥ë¥Ê¥Ó¥²¡¼¥·¥ç¥ó¥·¥¹¥Æ¥àP-Tour¤Ë¤ª¤±¤ëÊ£¿ôÆüÄø¤Î´Ñ¸÷¥¹¥±¥¸¥å¡¼¥ëºîÀ®»Ù±çµ¡Ç½¤ÎÄó°Æ ȯɽ³µÍס§ ¶áǯ¤Î¥Ñ¡¼¥½¥Ê¥ë¥Ê¥Ó¥²¡¼¥·¥ç¥ó¥·¥¹¥Æ¥à¤Îȯã¤Ë¤è¤ê¡¤·ÈÂÓüËö¤òÍøÍѤ·¤¿ ÍÍ¡¹¤Ê·ÐÏ©°ÆÆ⥵¡¼¥Ó¥¹¤¬¼ÂÍѲ½¤µ¤ì¤Æ¤¤¤ë¡¥ Ëܸ¦µæ¤Ç¤Ï¡¤Ê£¿ôÆüÄø¤Ë¤ï¤¿¤ë´Ñ¸÷¤Î¤¿¤á¤Î¥¹¥±¥¸¥å¡¼¥ëºîÀ®µ¡Ç½¤òÄó°Æ¤¹¤ë¡¥ ¤³¤Î¤è¤¦¤Ê¥¹¥±¥¸¥å¡¼¥ë¤Ï¡¤½ÉÇñÃϤΤ褦¤Ë¡Öɬ¤º¤É¤ì¤«¤òÍøÍѤ·¤Ê¤±¤ì¤Ðº¤¤ë¡× ¤è¤¦¤ÊÃÏÅÀ¤ò´Þ¤Þ¤Í¤Ð¤Ê¤é¤Ê¤¤¡¥ ¤Þ¤¿¥¹¥±¥¸¥å¡¼¥ë¤½¤Î¤â¤Î¤âŤ¯¤Ê¤ë·¹¸þ¤¬¤¢¤ë¤¿¤á¡¤ Áȹ礻¤Î¿ô¤¬Áý¤¨¤Æ·×»»¤¬º¤Æñ¤È¤Ê¤ë¡¥ Äó°Æ¼êË¡¤Ç¤Ï¡¤´Ñ¸÷ÃϤò¥¨¥ê¥¢¤Ëʬ³ä¤¹¤ë¡¥ ÆüÄø¤Ë¤ª¤±¤ë¤½¤ì¤¾¤ì¤ÎÆü¤Î½ÉÇñÃϤò¥¨¥ê¥¢Ã±°Ì¤Ç¥æ¡¼¥¶¤¬»ØÄꤹ¤ë¤è¤¦¤Ë¤·¡¤ ´Ñ¸÷¤Î·ÐÏ©¤Ë¤ª¤±¤ë¥¨¥ê¥¢¤Î±Û¶¤òÀ©¸Â¤¹¤ë¤³¤È¤Ç¡¤·×»»Î̤òºï¸º¤¹¤ë¡¥ ¤Þ¤¿¡¤·ÐÏ©¤òõº÷¤¹¤ë¤¿¤á¤Î°äÅÁŪ¥¢¥ë¥´¥ê¥º¥à¤Ë¤ª¤¤¤Æ¡¤ À÷¿§ÂÎÃæ¤ËÂÐΩ°äÅÁ»Ò¤ò½ÉÇñÃϤ˸ÂÄꤷ¤¿°äÅÁ»ÒºÂ¤ò»ý¤¿¤»¤ë¡¥ Äó°Æ¼êË¡¤òɾ²Á¤¹¤ë¤¿¤á¤Ë¡¤ÆàÎÉ¡¤Âçºå¡¤µþÅÔÆâ¤Î39¤ÎÌÜŪÃϤòÆþÎϤȤ¹¤ë ¥¤¥ó¥¹¥¿¥ó¥¹¤òÍ¿¤¨¡¤2Çñ3Æü¤Î´Ñ¸÷¥¹¥±¥¸¥å¡¼¥ë¤ò»»½Ð¤·¤¿¡¥ ¤½¤Î·ë²Ì¡¤Ìó19ÉäÇ19ÃÏÅÀ¤ÎÌÜŪÃϤò½ä²ó¤¹¤ë¥¹¥±¥¸¥å¡¼¥ë¤¬ÆÀ¤é¤ì¤¿¡¥ | |||
±ÊÅÄ¡¡½¡¿ M2 | °ËÆ£¡¡¼Â | ¿¢Â¼¡¡½Óμ | °ÂËÜ¡¡·Ä°ì |
ȯɽÂêÌÜ¡§¥°¥ë¡¼¥×´Ñ¸÷¤Ë¤ª¤±¤ëʬΥ¡¦½¸¹ç¤ò´Þ¤à¥¹¥±¥¸¥å¡¼¥ëºîÀ®µ¡Ç½¤ÎÄó°Æ ȯɽ³µÍס§ ¶áǯ¤Ï¸Ä¿Í´Ñ¸÷¤¬À¹¤ó¤Ç¤¢¤ë¤¬¡¤¥°¥ë¡¼¥×´Ñ¸÷¤âͽ»»¤Ê¤É¤ÎÅÀ¤Ë¤ª¤¤¤Æ ¥á¥ê¥Ã¥È¤¬¤¢¤ê¡¤°ÍÁ³¤È¤·¤Æ¼ûÍפ¬Â礤¤¡¥¤·¤«¤·¡¤º£Æü¤Î¥°¥ë¡¼¥×´Ñ¸÷¤Ï ι¹Ô²ñ¼Ò¤¬Ê罸¤¹¤ë¥Ä¥¢¡¼¤Ë¥æ¡¼¥¶¤¬»²²Ã¤¹¤ë¤â¤Î¤¬ÂçȾ¤Ç¡¤ ¥æ¡¼¥¶¤ÎºÙ¤«¤ÊÓϹ¥¤äÀ©Ìó¤òÈ¿±Ç¤¹¤ë¤È¤¤¤Ã¤¿½ÀÆðÀ¤Ï¤Ê¤¤¡¥ ËÜȯɽ¤Ç¤Ï¡¤Ê£¿ô¥æ¡¼¥¶¤ÎÓϹ¥¡¤À©Ì󤫤顤ÅÓÃæ·ÐÏ©¤ò¶¦Í¤¹¤ë¥¹ ¥±¥¸¥å¡¼¥ë¤ò»»½Ð¤¹¤ëÌäÂê¤ÎÄê¼°²½¤È¡¤¤³¤ÎÌäÂê¤òGA¤òÍѤ¤¤Æ²ò¤¯¥¢¥ë¥´¥ê¥º¥à ¤ÎÀ߷פȼÂÁõ¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤ë¡¥ ¤Þ¤¿¡¤¤½¤ì¤òɾ²Á¤¹¤ë¤¿¤á¤Ë¼Â¸³¤ò¹Ô¤¤¡¤ ¥á¥ó¥Ð¤¬¹çή¡¦Ê¬Î¥¤¹¤ë¥¹¥±¥¸¥å¡¼¥ë¤òÆÀ¤é¤ì¤ë¤³¤È¤ò³Îǧ¤·¤¿¡¥ | |||
Àî¸ý¡¡¹°¾¼ M2 | ¾¾ËÜ¡¡Íµ¼£ | ¿¢Â¼¡¡½Óμ | ´¥¡¡·òÂÀϺ |
ȯɽÂêÌÜ¡§¼ÁÌä±þÅú¥·¥¹¥Æ¥à¤Î¸¦µæÆ°¸þ (²ÝÂ긦µæ¤ÎÃæ´ÖÊó¹ð) ȯɽ³µÍס§¶áǯ¡¤Web¤òÃæ¿´¤È¤·¤¿Â絬ÌϾðÊ󸻤«¤é¤Î¾ðÊ󸡺÷¤¬¡¤¸¦µæ¼Ô¤Î¤ß¤Ê¤é¤º¹¤¯°ìÈ̤ˤâÉáµÚ¤·¤Ä¤Ä¤¢¤ë¡¥¤·¤«¤·¸½¾õ¤Î¾ðÊ󸡺÷µ»½Ñ¤Ç¤ÏÃΤꤿ¤¤¾ðÊó¤ò´Þ¤à¤â¤Î¤Î,ÃΤꤿ¤¤¾ðÊ󤽤Τâ¤Î¤Ëé¤êÃ失¤Ê¤¤¾õ¶·¤¬µ¯¤³¤êÆÀ¤ë¡¥¤³¤Î¤è¤¦¤Ê¾õ¶·²¼¤Ç¤Ï¡¤É¬ÍפʾðÊó¤òŪ³Î¤ËÊÖ¤¹¼ÁÌä±þÅú¥·¥¹¥Æ¥à¤¬É¬Í×ÉԲķç¤Ë¤Ê¤ë¤È»×¤ï¤ì¤ë¡¥ ËÜȯɽ¤Ç¤Ï¼ÁÌä±þÅú¥·¥¹¥Æ¥à¤Îɾ²Á·¿¥ï¡¼¥¯¥·¥ç¥Ã¥×¤Ç¤¢¤ë TREC Question Answering treck ¤Î¾Ò²ð¤È¥ï¡¼¥¯¥·¥ç¥Ã¥×¤Ë»²²Ã¤·¤¿¥·¥¹¥Æ¥à¤Ë¤Ä¤¤¤Æ¾Ò²ð¤¹¤ë¡¥TREC Question Answering treck ¤Ë¤Ä¤¤¤Æ¤Ï¥¿¥¹¥¯¤ÎÆâÍƤÈÊÑÁ«¤Ë¤Ä¤¤¤ÆÀâÌÀ¤·¡¤¼ÁÌä±þÅú¥·¥¹¥Æ¥à¤Ë¤Ä¤¤¤Æ¤Ï°ìÈÌŪ¤Ê¼êË¡¤È TREC 2004 ¤Ë¤ª¤¤¤ÆºÇ¤âÀ®ÀÓ¤ÎÎɤ«¤Ã¤¿¥Á¡¼¥à¤Î¥·¥¹¥Æ¥à¤Ë¤Ä¤¤¤Æ¾Ò²ð¤·¡¤Â¾¤ÎÀ®ÀÓ¾å°Ì¥Á¡¼¥à¤ÎÆÃħŪ¤ÊÉôʬ¤Ë¤Ä¤¤¤Æ¤â¿¨¤ì¤ë¡¥¤½¤·¤Æ¤½¤ì¤é¤«¤é¹Í¤¨¤é¤ì¤ë¼ÁÌä±þÅú¥·¥¹¥Æ¥à¤Îº£¸å¤Ë¤Ä¤¤¤Æ,¼«¿È¤Î¸«²ò¤ò½Ò¤Ù¤ë¡¥ | |||