{"updated":"2025-01-20T04:04:47.597417+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00182461","sets":["1164:4088:9073:9199"]},"path":["9199"],"owner":"11","recid":"182461","title":["On a Computer Security Incident Response System"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-06-17"},"_buckets":{"deposit":"61cc12d0-2b6e-4d06-8382-23e458f34111"},"_deposit":{"id":"182461","pid":{"type":"depid","value":"182461","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"On a Computer Security Incident Response System","author_link":["397524","397521","397531","397528","397523","397527","397520","397522","397525","397533","397532","397529","397526","397530"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"On a Computer Security Incident Response System"},{"subitem_title":"On a Computer Security Incident Response System","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"システム運用","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2017-06-17","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/182461/files/IPSJ-IOT17038011.pdf","label":"IPSJ-IOT17038011.pdf"},"date":[{"dateType":"Available","dateValue":"2019-06-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT17038011.pdf","filesize":[{"value":"596.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c987dce9-2259-4064-9844-e7e455d1e16a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masayuki, Higashino"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shinichi, Kawanari"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Fujio"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kiyoyuki, Nakashima"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoki, Miyata"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shinichi, Motomura"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masayuki, Higashino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shinichi, Kawanari","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Fujio","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kiyoyuki, Nakashima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoki, Miyata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shinichi, Motomura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Computer security has been gathering more attentions, and responses against security incidents have been getting more important. We are now facing difficulties to quickly and properly respond against incidents. For examples, we may be unable to immediately locate a suspicious host when an Intrusion Detection System (IDS), Intrusion Prevention System (IPS) or external organization detects the anomaly, and we cannot immediately isolate the suspicious host. We cannot also properly share information about the security incident, and it is getting difficult to find out what is going on, who is in charge of the incident. In order to solve these issues, we are now trying to establish a computer security incident response system using a bug tracking system. This paper discusses these issues and possible solutions.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Computer security has been gathering more attentions, and responses against security incidents have been getting more important. We are now facing difficulties to quickly and properly respond against incidents. For examples, we may be unable to immediately locate a suspicious host when an Intrusion Detection System (IDS), Intrusion Prevention System (IPS) or external organization detects the anomaly, and we cannot immediately isolate the suspicious host. We cannot also properly share information about the security incident, and it is getting difficult to find out what is going on, who is in charge of the incident. In order to solve these issues, we are now trying to establish a computer security incident response system using a bug tracking system. This paper discusses these issues and possible solutions.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-06-17","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicVolumeNumber":"2017-IOT-38"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:50:04.528819+00:00","id":182461,"links":{}}