{"created":"2025-01-19T00:58:00.649465+00:00","updated":"2025-01-20T00:13:40.355485+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00192261","sets":["6164:6165:6462:9599"]},"path":["9599"],"owner":"44499","recid":"192261","title":["On Automation and Orchestration of an Initial Computer Security Incident Response Using Centralized Incident Tracking System"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-10-15"},"_buckets":{"deposit":"af125fe4-1363-4d2a-b83f-8517a72599a9"},"_deposit":{"id":"192261","pid":{"type":"depid","value":"192261","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"On Automation and Orchestration of an Initial Computer Security Incident Response Using Centralized Incident Tracking System","author_link":["447555","447561","447563","447556","447565","447560","447562","447558","447559","447554","447557","447564"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"On Automation and Orchestration of an Initial Computer Security Incident Response Using Centralized Incident Tracking System"},{"subitem_title":"On Automation and Orchestration of an Initial Computer Security Incident Response Using Centralized Incident Tracking System","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Computer Security Incident Response,Network Operation,CSIRT,automation and orchestration","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2018-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"鳥取大学"},{"subitem_text_value":"鳥取大学"},{"subitem_text_value":"鳥取大学"},{"subitem_text_value":"鳥取大学"},{"subitem_text_value":"鳥取大学"},{"subitem_text_value":"鳥取大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"},{"subitem_text_value":"Tottori University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/192261/files/IPSJCSS2018166.pdf","label":"IPSJCSS2018166.pdf"},"date":[{"dateType":"Available","dateValue":"2020-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2018166.pdf","filesize":[{"value":"331.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5b2fcea5-5654-44c4-b335-11a1068bfe5a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"大森, 幹之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"東野, 正幸"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"川戸, 聡也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮田, 直輝"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋, 健一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"川村, 尚生"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masayuki, Higashino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshiya, Kawato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoki, Miyata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenichi, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takao, Kawamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"A critical computer security incident may cause great damage on an organization such as confidential data breach or malware pandemic.In order to avoid or mitigate such damage, a quick and accurate response against a computer security incident has been then getting more important.In order to realize these quickness and accuracy, this paper presents the Incident Tracking System (ITS) that orchestrates several information systems and automate an initial incident response.The ITS automatically locates and isolates a suspicious host, and sends a mail notification to a person in charge of handling an incident.The ITS can also identify or suggest a user of the suspicious host by network or other service authentication logs.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"A critical computer security incident may cause great damage on an organization such as confidential data breach or malware pandemic.In order to avoid or mitigate such damage, a quick and accurate response against a computer security incident has been then getting more important.In order to realize these quickness and accuracy, this paper presents the Incident Tracking System (ITS) that orchestrates several information systems and automate an initial incident response.The ITS automatically locates and isolates a suspicious host, and sends a mail notification to a person in charge of handling an incident.The ITS can also identify or suggest a user of the suspicious host by network or other service authentication logs.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1185","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2018論文集"}],"bibliographicPageStart":"1178","bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2018"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":192261,"links":{}}