{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240767","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240767","title":["アクティブ・ディフェンス実現に向けたサイバー抑止のモデル化および実装についての一考察"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"fa569324-456e-4f07-93bb-a2d43434139c"},"_deposit":{"id":"240767","pid":{"type":"depid","value":"240767","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"アクティブ・ディフェンス実現に向けたサイバー抑止のモデル化および実装についての一考察","author_link":["661154","661155","661156","661157","661158","661159","661160","661161"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アクティブ・ディフェンス実現に向けたサイバー抑止のモデル化および実装についての一考察","subitem_title_language":"ja"},{"subitem_title":"Considerations on Modeling and Implementing Cyber Deterrence for the Active Defense Approach","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"アクティブ・ディフェンス,能動的サイバー防御,サイバー抑止","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"株式会社 日立製作所"},{"subitem_text_value":"株式会社 日立製作所"},{"subitem_text_value":"東京電機大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240767/files/IPSJ-CSS2024021.pdf","label":"IPSJ-CSS2024021.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024021.pdf","filesize":[{"value":"1.5 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"b7ee8fe5-b889-481b-a334-fbb47fe09ee7","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"戸川, 來星"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"青木, 翔"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐藤, 隆行"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"寺田, 真敏"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Raiki, Togawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sho, Aoki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takayuki, Sato","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Terada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"サイバー攻撃対策のひとつに,偽装環境を使って攻撃者を惑わしたり,攻撃者の情報を収集して先んじて対処したりするなど,攻撃者に対して能動的に対処するアクティブ・ディフェンスというアプローチがある.本研究は,アクティブ・ディフェンスをサイバー攻撃対策に活用していくことを目的としている.本稿では,アクティブ・ディフェンスが取り扱う攻撃者との対峙・対処戦術の領域と,それに関連する取り組みを整理した.さらに,整理した領域のなかの抑止の分野において,サイバー空間における抑止の関係性や在り方のモデル化,モデルに基づいた抑止アプローチの実現,および試行運用を通して考察した結果について報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Active Defense is one of the cyber attack countermeasures that deceives cyber actors by using decoy environments or acts in advance by gathering cyber intelligence. This research is aiming for utilizing Active Defense for cyber attack countermeasures. In this paper, we have organized Active Defense tactics that engage against cyber actors and related initiatives. In addition, we show the results of considerations through which we have modeled the interaction on cyber deterrence, have implemented the cyber deterrence based on the model, and have conducted the trial operation.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"160","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"153","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240767,"updated":"2025-03-06T05:09:57.394546+00:00","links":{},"created":"2025-01-19T01:45:08.611432+00:00"}