{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00239369","sets":["581:11492:11502"]},"path":["11502"],"owner":"44499","recid":"239369","title":["内部不正対策に資する欺瞞選定スキームの提案と評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-09-15"},"_buckets":{"deposit":"8d82ed0d-b995-41dd-9b74-379e3c709707"},"_deposit":{"id":"239369","pid":{"type":"depid","value":"239369","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"内部不正対策に資する欺瞞選定スキームの提案と評価","author_link":["656061","656070","656076","656064","656062","656071","656075","656069","656073","656063","656065","656066","656072","656074","656067","656068"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"内部不正対策に資する欺瞞選定スキームの提案と評価"},{"subitem_title":"A Proposal and Evaluation of Scheme for Selection of Deceptions as a Countermeasure for Insider Threats","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:サプライチェーンを安全にするサイバーセキュリティ技術] 内部不正対策,欺瞞,対策選定","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2024-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"三菱電機株式会社"},{"subitem_text_value":"三菱電機株式会社"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corp.","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corp.","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/239369/files/IPSJ-JNL6509015.pdf","label":"IPSJ-JNL6509015.pdf"},"date":[{"dateType":"Available","dateValue":"2026-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6509015.pdf","filesize":[{"value":"7.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7b110109-9274-4e0e-96a8-41d7c7993b38","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"奥村, 紗名"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"天笠, 智哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"榎本, 聖成"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"芝田, 翔"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山本, 匠"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山中, 忠和"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大木, 哲史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Sana, Okumura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tomoya, Amagasa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sena, Enomoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsubasa, Shibata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takumi, Yamamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tadakazu, Yamanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsushi, Ohki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatsu, Nishigaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"内部不正の脅威は年々増加しており,特に悪意を持って不正を行う内部者に対しては心理的なアプローチが求められている.心理的なアプローチは誤認,煩雑化,誘引に分類され,これらのアプローチを同時に達成する技術として欺瞞機構がある.しかし,欺瞞機構は正規ユーザにとっては著しい利便性低下要因となるため,適用に際しては慎重な判断が求められる.しかるに欺瞞型の内部犯対策の設計にあたっては,費用対効果の観点から利便性と安全性をバランスさせることが肝要となる.セキュリティ対策の費用対効果を評価する方法として,「資産」「脅威」「対策案」の三者の関係をモデル化し,対策選定問題を離散最適化問題として定式化する手法が提案されている.しかし,主に外部からの脅威を対象としており,内部不正に対する対策選定を陽に扱っている既存研究は,著者らが調査した限りでは存在しない.そこで本論文では内部不正対策としての欺瞞機構の最適な組合せを論理的に求めるスキームを提案する.既存手法との違いは,「脅威」として内部犯を,「対策案」として欺瞞を陽に含める点にある.また,三者の関係に「業務」を加えることで,悪意のない正規ユーザの利便性を扱えるモデルを構築する.選択された対策が業務の利便性に及ぼす影響を制約条件として既存手法の目的関数を最大化するという定式化を行うことによって,内部犯対策(欺瞞機構)を包含するセキュリティ対策選定手法へと昇華させる.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The risk of insider threats increases every year, rendering it imperative to adopt measures against them. This study focuses on countermeasures against malicious insider threats and a psychological approach must be adopted against them. Psychological approaches can be classified into three categories: deceiving insiders, demoralizing insiders, and luring insiders. The deception is a countermeasure that simultaneously accomplishes them. When designing deception as a countermeasure against insider threats, usability and security must be balanced from the viewpoint of cost-effectiveness. For evaluating the cost-effectiveness of security measures, a method that models the relationship between “assets”, “threats”, and “countermeasures” to formulate the countermeasure selection problem as a discrete optimization problem has been proposed. However, the method assumes an external intruder, and to the best of our knowledge, no existing research explicitly covers the selection of countermeasures against insiders. This paper proposes a scheme to quantitatively evaluate the effectiveness of the deception mechanism against insider threats and determine the optimal deception deployment. In our proposal, the objective function explicitly includes insiders as “threats” and deception as “countermeasures”. And by adding “business operation” to them, out method incorporates the impact of selected countermeasures on the “usability” of business operations into the formulation of existing methods.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1356","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1339","bibliographicIssueDates":{"bibliographicIssueDate":"2024-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"65"}]},"relation_version_is_last":true,"item_2_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.20729/00239249","subitem_identifier_reg_type":"JaLC"}]},"weko_creator_id":"44499"},"id":239369,"updated":"2025-01-19T08:17:35.265671+00:00","links":{},"created":"2025-01-19T01:42:58.658737+00:00"}