• 検索結果がありません。

JAIST Repository

N/A
N/A
Protected

Academic year: 2022

シェア "JAIST Repository"

Copied!
2
0
0

読み込み中.... (全文を見る)

全文

(1)

Japan Advanced Institute of Science and Technology

JAIST Repository

https://dspace.jaist.ac.jp/

Title 状態遷移モデルを活用したサイバー防御演習における振る

舞い解析の高度化に関する研究

Author(s) 梅内, 翼

Citation

Issue Date 2022-03

Type Thesis or Dissertation Text version author

URL http://hdl.handle.net/10119/17626 Rights

Description Supervisor: 篠田 陽一, 先端科学技術研究科, 修士(情 報科学)

(2)

Research on the Advancement of Behavior Analysis in Cyber Defense Exercise using State Transition Model

2010014 Umeuchi Tsubasa In recent years, with the development and spread of information and communication technologies, cyber security measures have become a chal- lenge for many organizations, while a significant shortage of human re- sources with skills in cyber security is considered to be a problem. In response to this situation, the importance of cyber defense exercises con- ducted in a virtual space, which is constructed for the purpose of conduct- ing cyber security exercises, has been recognized as a means of acquiring incident response skills. A cyber defense exercise is an exercise aimed at empirically acquiring incident response skills through detection and re- sponse to attacks on hosts and systems assigned to the participant, and recovery from failures caused by attacks.

The purpose of the cyber defense exercises conducted on the cyber range is to provide participants with knowledge and skills on incident response through the exercise. To achieve this, it is essential to reflect on what kind of behavior led to a successful defense against the attacks executed in the exercise.

In this study, based on the assumption that the changes brought to the cyber range by the behavior of the participants are considered as differences, we propose a method to systematically extract the differences by integrating the progress of the cyber defense exercise with the state transition model and a method for automatically analyzing the differences that led to the successful defense of the attacks executed in the exercise among the extracted differences.

As a result of our experiments, we verified that it is possible to analyze such differences accurately and in a realistic time. On the other hand, we also found concerns about the coverage of the sources where the differ- ences are extracted, the reproducibility of the behavior, the performance of the analysis algorithm, and the existence of differences that cannot be observed on the cyber range.

1

参照

関連したドキュメント

In Chapter 2, the various literatures available on the formal and informal sector are analyzed to study different aspects of municipal waste such as the changing trends in the

By the term “ authentic taste ” in this study, I refer to the taste that originated and is considered popu- lar in Japan; either modern Japanese fast food or traditional

The results indicate that the pollutant load evaluated by the present method are acceptable agreements with observed data, showing the fundamental performance of the present method

Accordingly, it is important to investigate whether those concessionary loan schemes actually provide the required financial assistance to the needy SME segments such as

This article focuses on public opinion and foreign policy toward Japan to provide evidence to this discussion, exhibiting how does the government deal with unexpected

The Central IP&IT Court has the power to issue any request from the police for search warrant in order to make a raid or seize the infringed goods or other tools concerned..

The chapter presented a tracked robot chain system based on wireless relay communication to overcome the challenge of short communication distance brought by the

Based on such research, this study predicts that the existence of a common lender on both sides of the deal and the nature of lending relationships bring benefits and costs to