{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201533","sets":["581:9633:9645"]},"path":["9645"],"owner":"33195","recid":"201533","title":["サイバーセキュリティ対策のための研究用データセット「動的活動観測2014~2017」"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-12-15"},"_buckets":{"deposit":"5ec3b6f9-3706-4cee-b901-09bd8058d875"},"_deposit":{"id":"201533","pid":{"type":"depid","value":"201533","revision_id":0},"owners":[33195],"status":"published","created_by":33195},"item_title":"サイバーセキュリティ対策のための研究用データセット「動的活動観測2014~2017」","author_link":["493310","493300","493312","493303","493305","493313","493314","493306","493315","493308","493301","493304","493309","493302","493307","493311"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"サイバーセキュリティ対策のための研究用データセット「動的活動観測2014~2017」"},{"subitem_title":"Research Data Set “Behavior Observable System 2014-2017” for Cyber Security Countermeasure","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:ユーザブルセキュリティ] 動的活動観測システム,マルウェア,C2サーバ","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2019-12-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社日立製作所"},{"subitem_text_value":"株式会社日立製作所"},{"subitem_text_value":"株式会社日立製作所"},{"subitem_text_value":"株式会社日立製作所"},{"subitem_text_value":"トレンドマイクロ株式会社"},{"subitem_text_value":"トレンドマイクロ株式会社"},{"subitem_text_value":"トレンドマイクロ株式会社"},{"subitem_text_value":"トレンドマイクロ株式会社"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Trend Micro Incorporated","subitem_text_language":"en"},{"subitem_text_value":"Trend Micro Incorporated","subitem_text_language":"en"},{"subitem_text_value":"Trend Micro Incorporated","subitem_text_language":"en"},{"subitem_text_value":"Trend Micro Incorporated","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201533/files/IPSJ-JNL6012016.pdf","label":"IPSJ-JNL6012016.pdf"},"date":[{"dateType":"Available","dateValue":"2021-12-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6012016.pdf","filesize":[{"value":"5.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"adc841ed-f071-4b1b-9d19-2b162b8b6c36","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"寺田, 真敏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐藤, 隆行"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"青木, 翔"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"重本, 倫宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉野, 龍平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"亀川, 慧"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"清水, 努"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"萩原, 健太"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masato, Terada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takayuki, Sato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sho, Aoki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomohiro, Shigemoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryohei, Yoshino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Kamekawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsutomu, Shimizu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenta, Hagihara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"マルウェア検体の解析では,指令サーバ接続,情報窃取,バックドアなどの機能の存在や挙動把握に重点が置かれ,攻撃者の行動という視点で把握や解析することはなかった.しかし,組織内ネットワークへの侵害活動においては,攻撃者の存在,攻撃者のアトリビューションを意識する必要がある.本論文では,電子メールと遠隔操作ツールとを組合せた組織内ネットワークへの侵害活動を想定した動的活動観測を提案する.さらに,構築した動的活動観測環境を用いて得られた観測結果から提案する手法の有効性を示すとともに,情報共有を目的として作成した研究用データセット「動的活動観測2014~2017」について述べる.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Under the analysis of malware, mainly it focuses on the functions and behaviors of malware itself such as C2 server connection, information leak and backdoor. The analysis of malware does not include the viewpoint of actions of threat actors. But under the targeted attack such as APT, we should focus on the actions of threat actor and attribution, too. In this paper, firstly we will describe the overview of BOS (Behavior Observable System) and our research data set “BOS_2014-BOS_2017” for the countermeasures of targeted attack age. Secondly, we will introduce the typical case of targeted attack in BOS_2014-BOS_2017.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2222","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"2211","bibliographicIssueDates":{"bibliographicIssueDate":"2019-12-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"60"}]},"relation_version_is_last":true,"weko_creator_id":"33195"},"id":201533,"updated":"2025-01-19T20:59:23.103460+00:00","links":{},"created":"2025-01-19T01:04:47.633296+00:00"}