{"created":"2025-01-19T01:11:22.999633+00:00","updated":"2025-01-19T18:15:58.282697+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00210116","sets":["1164:3925:10503:10504"]},"path":["10504"],"owner":"44499","recid":"210116","title":["複数組織の接続傾向を用いた自律進化型防御システムの提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-03-08"},"_buckets":{"deposit":"5b26b635-94cf-45af-ad9f-bd62ae42a800"},"_deposit":{"id":"210116","pid":{"type":"depid","value":"210116","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"複数組織の接続傾向を用いた自律進化型防御システムの提案","author_link":["531256","531252","531253","531255","531249","531251","531246","531254","531250","531247","531248","531245"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"複数組織の接続傾向を用いた自律進化型防御システムの提案"},{"subitem_title":"Proposal of Automated Defense System Using Access Trend in Multiple Organizations","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"攻撃検知・防御","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2021-03-08","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社日立製作所研究開発グループ"},{"subitem_text_value":"株式会社日立製作所研究開発グループ"},{"subitem_text_value":"株式会社日立製作所研究開発グループ"},{"subitem_text_value":"株式会社日立製作所研究開発グループ"},{"subitem_text_value":"慶應義塾情報セキュリティインシデント対応チーム"},{"subitem_text_value":"慶應義塾大学環境情報学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hitachi, Ltd. R&D Group","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd. R&D Group","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd. R&D Group","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd. R&D Group","subitem_text_language":"en"},{"subitem_text_value":"Computer Security Incident Response Team, Keio University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Environment and Information Study, Keio University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/210116/files/IPSJ-CSEC21092019.pdf","label":"IPSJ-CSEC21092019.pdf"},"date":[{"dateType":"Available","dateValue":"2023-03-08"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC21092019.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"70294a14-8399-4ced-a08f-9856482e968f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"西嶋, 克哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"川口, 信隆"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"植木, 優輝"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"重本, 倫宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"近藤, 賢郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中村, 修"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Katsuya, Nishijima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Nobutaka, Kawaguchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuki, Ueki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomohiro, Shigemoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takao, Kondo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Osamu, Nakamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"サイバー攻撃の激化にともない,悪性サイトへの接続を防止する技術が求められている.既存手法としては,ブラックリストやホワイトリストを用いたものがある.しかし,インターネット上に無数にあるサイトを全て,ブラックリストやホワイトリストに分類することは不可能である.従って,これらリストに存在しないサイトが良性か悪性かを判断できないという課題がある.本稿ではこの課題を解決する手法を提案する.提案手法では組織が保有する,サイトへの接続ログを元に接続傾向を分析し,その傾向との乖離度を利用してサイトの良性,悪性を判定する.また,自組織の接続傾向だけでなく,他組織の接続傾向を利用することで判定の精度向上を狙う.更に,判定で誤って悪性と判断した良性サイトへの接続を即時遮断するのではなく,機械には突破困難な追加認証を課し,突破できなかった場合のみ接続を遮断する.提案システムにより,業務遂行に必要なサイトを誤って悪性と判定した際の業務阻害を緩和しつつ,悪性サイトへの接続を遮断できることが期待される.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-03-08","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"19","bibliographicVolumeNumber":"2021-CSEC-92"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":210116,"links":{}}