{"updated":"2025-01-19T14:09:11.254267+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00221458","sets":["6504:11035:11041"]},"path":["11041"],"owner":"44499","recid":"221458","title":["正常ログ残存を前提とするサイバー攻撃推定手法の性能評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-02-17"},"_buckets":{"deposit":"6968e110-69a4-4364-8414-bcceadee45da"},"_deposit":{"id":"221458","pid":{"type":"depid","value":"221458","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"正常ログ残存を前提とするサイバー攻撃推定手法の性能評価","author_link":["579827","579828","579824","579826","579825"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"正常ログ残存を前提とするサイバー攻撃推定手法の性能評価"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"22","publish_date":"2022-02-17","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_22_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"名大"},{"subitem_text_value":"名大"},{"subitem_text_value":"名大"},{"subitem_text_value":"名大"},{"subitem_text_value":"NII"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/221458/files/IPSJ-Z84-4ZD-04.pdf","label":"IPSJ-Z84-4ZD-04.pdf"},"date":[{"dateType":"Available","dateValue":"2022-10-22"}],"format":"application/pdf","filename":"IPSJ-Z84-4ZD-04.pdf","filesize":[{"value":"690.3 kB"}],"mimetype":"application/pdf","accessrole":"open_date","version_id":"5ab9f193-1a46-40f8-b2d0-dfef740702a2","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_22_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"熊崎, 真仁"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"長谷川, 皓一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山口, 由紀子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"嶋田, 創"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高倉, 弘喜"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_22_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00349328","subitem_source_identifier_type":"NCID"}]},"item_22_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"複数拠点から構成される大規模なネットワークの各拠点にはセキュリティ管理者ではなくネットワーク管理者が配置されることが多く、スキル差によるセキュリティインシデント対応の遅延などの問題が発生することが懸念される。解決策として、スキル差を吸収する細やかな対応支援が必要であり、これまでに組織内のログからサイバー攻撃に関連するログを抽出し、サイバー攻撃の手段や活動時間の推測により攻撃の全貌を俯瞰するシステムを提案した。本稿では、提案システムにおける攻撃関連のログ抽出で要求される正確性を確認するため、正常ログが大量に存在する状態で攻撃手段の推測を行い、攻撃に関連しないログが推測に与える影響の評価を行った。","subitem_description_type":"Other"}]},"item_22_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"582","bibliographic_titles":[{"bibliographic_title":"第84回全国大会講演論文集"}],"bibliographicPageStart":"581","bibliographicIssueDates":{"bibliographicIssueDate":"2022-02-17","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2022"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:21:27.644802+00:00","id":221458,"links":{}}