{"created":"2025-01-19T01:45:13.007957+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240813","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240813","title":["標的型攻撃演習システムのクラウド基盤での構築"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"ee875db8-2f12-4406-94f4-f8de14ba9310"},"_deposit":{"id":"240813","pid":{"type":"depid","value":"240813","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"標的型攻撃演習システムのクラウド基盤での構築","author_link":["661482","661483","661484","661485","661486","661487","661488","661489","661490","661491","661492","661493"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"標的型攻撃演習システムのクラウド基盤での構築","subitem_title_language":"ja"},{"subitem_title":"Designing Targeted Attack Exercise System on Cloud Infrastructure Platform","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"APT 攻撃,ランサムウェア,OpenStack,Active Directory,メールサービス","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪公立大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"神戸大学"},{"subitem_text_value":"近畿大学"},{"subitem_text_value":"大阪公立大学"},{"subitem_text_value":"神戸大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Osaka Metropolitan University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Kindai University","subitem_text_language":"en"},{"subitem_text_value":"Osaka Metropolitan University","subitem_text_language":"en"},{"subitem_text_value":"Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240813/files/IPSJ-CSS2024067.pdf","label":"IPSJ-CSS2024067.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024067.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"39bc8008-581e-47d2-a9c1-55566d04ebf9","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"谷瀬, 博紀"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"瀧田, 愼"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"葛野, 弘樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"毛利, 公美"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tran, Thi Hong"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"白石, 善明"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hironori, Tanise","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Makoto, Takita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroki, Kuzuno","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masami, Mohri","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tran, Thi Hong","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshiaki, Shiraishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"標的型攻撃は企業にとって重大な脅威となっており,その対策は喫緊の課題である.サイバー演習は,ランサムウェア被害に対する理解やセキュリティ意識の向上を目的とした効果的な手段の一つである.攻撃メールを受信し,誤って開封した後に何が起こるのかを実際に体験することは,セキュリティ対策をより現実的なものとし,訓練の効果を高めるために重要である.演習をするユーザが提供されたシナリオに沿ってシステムを操作することで,ランサムウェアを用いた標的型攻撃を体験し,攻撃経路について理解を深めることができる現実的な訓練環境の提供を目的として,本論文ではOpenStackをベースにした標的型攻撃演習システムを提案している.提案システムでは,Active Directoryやドメインコントローラー,メールサービスを実装したWindows Serverを含む組織ネットワークを模倣した環境上での演習を提供する.そして,メール経由での攻撃・侵入からLockBit 3.0によるファイルの暗号化などの演習シナリオの例を示している.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Targeted attacks pose a significant threat to businesses, making countermeasures an urgent priority. Cyber exercises are one of the most effective means to enhance understanding of ransomware threats and improve security awareness. Experiencing firsthand what happens after mistakenly opening a malicious email is crucial for making security measures more realistic and increasing the effectiveness of training. This paper proposes a targeted attack training system based on OpenStack, designed to provide a realistic training environment where users can interact with systems according to predefined scenarios. By doing so, users can experience a targeted attack using ransomware, deepening their understanding of attack vectors. The proposed system offers exercises within an environment that mimics an organizational network, including a Windows Server configured with Active Directory, domain controllers, and email services. An example training scenario involving an email-based attack and intrusion leading to file encryption by LockBit 3.0 is also presented.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"493","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"487","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240813,"updated":"2025-03-06T05:32:37.484978+00:00","links":{}}