{"updated":"2025-01-20T05:52:09.826238+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00176436","sets":["581:8417:8430"]},"path":["8430"],"owner":"11","recid":"176436","title":["企業グループに送られた標的型攻撃メールのソーシャルエンジニアリング視点からの分析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-12-15"},"_buckets":{"deposit":"2668cb9f-70c5-4e81-bc85-511ec2dab9e2"},"_deposit":{"id":"176436","pid":{"type":"depid","value":"176436","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"企業グループに送られた標的型攻撃メールのソーシャルエンジニアリング視点からの分析","author_link":["371344","371339","371342","371345","371338","371341","371346","371340","371337","371343"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"企業グループに送られた標的型攻撃メールのソーシャルエンジニアリング視点からの分析"},{"subitem_title":"Analysis of Targeted Attack Mail Sent to an Enterprise Group from Social Engineering Point of View","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:ヒトとモノを中心としたセキュアで信頼できる社会に向けて(特選論文)] 標的型攻撃メール,ソーシャルエンジニアリング,統計分析,サイバーセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2016-12-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"日本電気株式会社セキュリティ研究所/横浜国立大学先端科学高等研究院"},{"subitem_text_value":"日本電気株式会社セキュリティ研究所/横浜国立大学先端科学高等研究院"},{"subitem_text_value":"株式会社NEC情報システムズプラットフォームサービス事業部"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/横浜国立大学先端科学高等研究院"},{"subitem_text_value":"東京大学大学院医学系研究科"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Security Research Laboratories, NEC Corporation / Institute of Advanced Science, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Security Research Laboratories, NEC Corporation / Institute of Advanced Science, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Platform Services Division, NEC Informatec Systems, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Science, Yokohama National University / Institute of Advanced Science, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Medicine, The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/176436/files/IPSJ-JNL5712024.pdf","label":"IPSJ-JNL5712024.pdf"},"date":[{"dateType":"Available","dateValue":"2018-12-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5712024.pdf","filesize":[{"value":"810.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"65ea87a3-f13d-493b-b460-e464044566e6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"渡部, 正文"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"島, 成佳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"今橋, 泰則"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 克成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高木, 大資"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masafumi, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shigeyoshi, Shima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasunori, Imahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Katsunari, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Takagi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"標的型攻撃メールには,受信者を巧みに操るソーシャルエンジニアリングが悪用されることが多く,受信者が騙しの細工に引っ掛かり端末が感染することが,情報流出などの被害に至る最初の原因である.組織の情報セキュリティ部門では,標的型攻撃メールを発見し感染を防ぐためにメールを監視しているが,騙しの細工に着目した監視は人の経験に依存しており,監視者への負担が重いことが課題となっている.筆者らは,この課題を解決するため,件名の単語を対象に,標的型攻撃メールの弁別に有効な単語や指標を明らかにする分析手法を創出する.実在する企業の協力によりメールデータセットを分析し,分析手法が標的型攻撃メールの弁別に有効であることを示す.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In targeted attack mail, social engineering is often used to manipulate recipients psychologically. The first cause of information leakage is that the recipients are tricked by word and phrase and the recipients' PCs are infected. Information security divisions in organizations monitor email in order to find targeted attack mail and stop infections. However, there are some problems that the burden to the operators is heavy because the monitoring based on words is depending on operators' experience. In order to solve the problems, the authors of this paper create analysis methods to find effective words and indices to discriminate targeted attack mail based on words appeared in subjects. Analyzing dataset with a real enterprise's cooperation, this paper shows that the analysis methods are effective to discriminate targeted attack mail.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2742","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"2731","bibliographicIssueDates":{"bibliographicIssueDate":"2016-12-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"57"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:46:05.021503+00:00","id":176436,"links":{}}