{"created":"2025-01-19T01:22:55.900150+00:00","updated":"2025-01-19T13:32:02.437442+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00223058","sets":["6164:6165:6462:11124"]},"path":["11124"],"owner":"44499","recid":"223058","title":["脆弱性情報から攻撃アクターを答えるオントロジー"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-10-17"},"_buckets":{"deposit":"f4db1384-73cc-43f7-995f-babe39935a9e"},"_deposit":{"id":"223058","pid":{"type":"depid","value":"223058","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"脆弱性情報から攻撃アクターを答えるオントロジー","author_link":["586634","586631","586627","586633","586630","586626","586629","586635","586628","586632"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"脆弱性情報から攻撃アクターを答えるオントロジー"},{"subitem_title":"Ontology to Answer Attack Actors from Vulnerability Information","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MITRE ATT&CK, オントロジー, 脅威インテリジェンス, リスクアセスメント, 影響分析","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2022-10-17","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"近畿大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Informatics, Kindai University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/223058/files/IPSJ-CSS2022003.pdf","label":"IPSJ-CSS2022003.pdf"},"date":[{"dateType":"Available","dateValue":"2024-10-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2022003.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f42fb4ff-1827-4af6-9b7d-5e0665eb61d2","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"平薮, 将志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"白石, 善明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"毛利, 公美"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"葛野, 弘樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masayuki, Hirayabu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshiki, Shiraishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masami, Mohri","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroki, Kuzuno","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"脆弱性情報に関わる脅威アクターの情報が得られれば,サイバー攻撃の対策を迅速に優先順位をつけやすくなると考えられる.我々は何らかの痕跡情報から脆弱性情報 (CVE) が特定されたとき,脆弱性情報から攻撃アクターの情報を得るためのアプローチとして,脆弱性情報と MITRE ATT&CK を関連付けるオントロジーを構築している.更に,構築したオントロジーを用いた検索システムを実装することで脆弱性情報から ATT&CK Technique に到達し,その Technique を利用する ATT&CK Group を出力できることを確認している.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"If we can obtain information on threat actors related to vulnerability information, it makes easier to quickly prioritize countermeasures against cyber-attacks. When vulnerability information(CVE) is identified from some trace information, we can use the information to identify the attack actors. We have developed an ontology that relates vulnerability information and MITRE ATT&CK as an approach to obtain information on attack actors from vulnerability information when vulnerability information is identified from some traces. In addition, we have confirmed that it is possible to reach the MITRE ATT&CK Techniques from the vulnerability information and output ATT&CK Groups that uses ATT&CK Techniques by implementing a search system using the ontology.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"14","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2022論文集"}],"bibliographicPageStart":"8","bibliographicIssueDates":{"bibliographicIssueDate":"2022-10-17","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":223058,"links":{}}