{"created":"2025-01-19T00:58:50.061712+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00193619","sets":["6164:6165:6640:9657"]},"path":["9657"],"owner":"44499","recid":"193619","title":["攻撃者のメール送信状態推定による不審メール検知技術の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-06-27"},"_buckets":{"deposit":"90a7d590-338c-4abc-976a-ae35aa015f29"},"_deposit":{"id":"193619","pid":{"type":"depid","value":"193619","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"攻撃者のメール送信状態推定による不審メール検知技術の提案","author_link":["454099","454100","454102","454101"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"攻撃者のメール送信状態推定による不審メール検知技術の提案"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"サイバーセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2018-06-27","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"三菱電機 情報技術総合研究所/静岡大学 創造科学技術大学院"},{"subitem_text_value":"三菱電機 情報技術総合研究所"},{"subitem_text_value":"三菱電機 情報技術総合研究所"},{"subitem_text_value":"静岡大学 創造科学技術大学院"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/193619/files/IPSJ-DICOMO2018192.pdf","label":"IPSJ-DICOMO2018192.pdf"},"date":[{"dateType":"Available","dateValue":"2020-06-27"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DICOMO2018192.pdf","filesize":[{"value":"895.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"fa4137c9-c80e-4b47-b352-d28d7d46df84","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"西川, 弘毅"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山本, 匠"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"河内, 清人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"企業の担当者等と複数回のやり取りを通して信頼を得て,その後に添付ファイルのクリックや指定口座への送金を行わせるような攻撃が存在する.特に,昨今では企業の決済担当者に対して,その企業の重役や,取引相手に成りすまし,攻撃者の口座へ金銭を振り込ませるビジネスメール詐欺(BEC: Business E-mail Compromise)が,重大な脅威となっている.しかし,既存の技術では,巧妙な攻撃者によるやり取りを通じた攻撃メールを検知することができない.そこで本稿では,メールを受信した際に,そのメール送信者とのやり取りを抽出し,攻撃が行われる状態が来た場合に不審なメールであると検知することで,巧妙な攻撃の検知を行う技術を提案する.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1302","bibliographic_titles":[{"bibliographic_title":"マルチメディア,分散協調とモバイルシンポジウム2018論文集"}],"bibliographicPageStart":"1298","bibliographicIssueDates":{"bibliographicIssueDate":"2018-06-27","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2018"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"links":{},"id":193619,"updated":"2025-01-19T23:51:45.928710+00:00"}