{"created":"2025-01-18T23:40:25.533371+00:00","updated":"2025-01-21T15:44:19.070190+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00091053","sets":["1164:3925:7119:7120"]},"path":["7120"],"owner":"11","recid":"91053","title":["イベントツリー分析法に基づく標的型攻撃の分析評価ツールの開発と適用"],"pubdate":{"attribute_name":"公開日","attribute_value":"2013-03-07"},"_buckets":{"deposit":"d432c8b1-6ef3-45fb-90e7-14710ec15c63"},"_deposit":{"id":"91053","pid":{"type":"depid","value":"91053","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"イベントツリー分析法に基づく標的型攻撃の分析評価ツールの開発と適用","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"イベントツリー分析法に基づく標的型攻撃の分析評価ツールの開発と適用"},{"subitem_title":"Development of evaluation tool based on the event tree analysis and its application to the cyber attacks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"サイバー攻撃への対応","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2013-03-07","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokyo Denki University.","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/91053/files/IPSJ-CSEC13060020.pdf"},"date":[{"dateType":"Available","dateValue":"2015-03-07"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC13060020.pdf","filesize":[{"value":"554.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"30005155-61a1-4026-9c22-450b186136ff","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2013 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"金子, 紀之"},{"creatorName":"佐々木, 良一"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Noriyuki, Kaneko","creatorNameLang":"en"},{"creatorName":"Ryoichi, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,国や企業を狙った標的攻撃が増加してきており,大きな脅威となっている.標的型攻撃とはコンピュータシステムやインターネットを利用し,標的のコンピュータやネットワークへ侵入,そこからデータの詐取や破壊,改ざんを行い,システムを機能不全に陥らせる行為である.それらについて対策を検討することの必要性が高まっているが,対策を無闇に講じたところで,それらが生み出す効果が有用であるとは言い難い.また,リスク対策が新たなリスクを生み出す派生リスクの問題などが存在してしまう.そのため,対策コストと効果を考慮した上で最適な対策の組み合わせを求めることのできるツールの確立が必要であると考える.本研究は,イベントツリー分析法に基づく手法ならびにツールの開発を行うとともに,2011 年に起きた衆議院への標的型攻撃事件への適用を行ったものである.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, target attacks aiming at the countries and companies have become a major threat. The target attack has behaviors that invade the Internet or computer systems and bring fraud, corruption of data or system down. Although the necessity of the measures against such attack is increased, it is very difficult to determine optimal measures, because not only the effectiveness of the measures but the cost and the derivation risk. Therefore we developed the method and the related tool to obtain the optimal combination of measures considering the cost and the derivation risk are necessary. This paper deals with the support tool based on the Event Tree Analysis and the application to the target attack to the House of Representatives in 2011.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2013-03-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"20","bibliographicVolumeNumber":"2013-CSEC-60"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":91053,"links":{}}