{"updated":"2025-01-20T02:40:36.842203+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00186267","sets":["1164:4088:9383:9384"]},"path":["9384"],"owner":"11","recid":"186267","title":["On Automation and Orchestration of an Initial Computer Security Incident Response"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-02-26"},"_buckets":{"deposit":"992b2149-fba3-462f-bd27-9267c0caf8b4"},"_deposit":{"id":"186267","pid":{"type":"depid","value":"186267","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"On Automation and Orchestration of an Initial Computer Security Incident Response","author_link":["417061","417055","417057","417059","417060","417054","417058","417056","417063","417062"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"On Automation and Orchestration of an Initial Computer Security Incident Response"},{"subitem_title":"On Automation and Orchestration of an Initial Computer Security Incident Response","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"インシデントレスポンスとダークネット","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-02-26","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"},{"subitem_text_value":"Tottori University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/186267/files/IPSJ-IOT18040029.pdf","label":"IPSJ-IOT18040029.pdf"},"date":[{"dateType":"Available","dateValue":"2020-02-26"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT18040029.pdf","filesize":[{"value":"816.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"daf7ded0-ffcd-4f05-bd22-34c3c5b59c83","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masayuki, Higashino"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshiya, Kawato"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Fujio"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takao, Kawamura"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masayuki, Higashino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshiya, Kawato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Fujio","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takao, Kawamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Computer security has been getting more attentions because a critical computer security incident may cause great damage on an organization such as confidential data breach or malware pandemic. A quick and accurate response against a security incident have been then getting more important. A quick response can reduce not only risk of data breach but also investigating operations. In addition, quickness may enable to contain an incident and prevent malware pandemic. On the other hand, accuracy can avoid unnecessary, excessive and/or wrong operations such as data forensic, re-installing an OS, and isolating an unsuspicious host. In order to realize these quickness and accuracy, this paper discuss to automate and orchestrate an initial incident response against a security incident.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Computer security has been getting more attentions because a critical computer security incident may cause great damage on an organization such as confidential data breach or malware pandemic. A quick and accurate response against a security incident have been then getting more important. A quick response can reduce not only risk of data breach but also investigating operations. In addition, quickness may enable to contain an incident and prevent malware pandemic. On the other hand, accuracy can avoid unnecessary, excessive and/or wrong operations such as data forensic, re-installing an OS, and isolating an unsuspicious host. In order to realize these quickness and accuracy, this paper discuss to automate and orchestrate an initial incident response against a security incident.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-02-26","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"29","bibliographicVolumeNumber":"2018-IOT-40"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:53:14.328983+00:00","id":186267,"links":{}}