{"id":2526,"date":"2021-01-11T23:14:14","date_gmt":"2021-01-11T14:14:14","guid":{"rendered":"https:\/\/itresearchart.biz\/?p=2526"},"modified":"2021-01-11T23:29:27","modified_gmt":"2021-01-11T14:29:27","slug":"%e8%84%85%e5%a8%81%e6%83%85%e5%a0%b1%e5%85%b1%e6%9c%89%e3%81%ae%e3%83%97%e3%83%a9%e3%83%83%e3%83%88%e3%83%95%e3%82%a9%e3%83%bc%e3%83%a01","status":"publish","type":"post","link":"https:\/\/itresearchart.biz\/?p=2526","title":{"rendered":"\u8105\u5a01\u60c5\u5831\u5171\u6709\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0(1)"},"content":{"rendered":"<p>WEF\u306eISP\u539f\u5247\u306e<a href=\"https:\/\/itresearchart.biz\/?p=2508\">\u5831\u544a\u66f8\u3092\u307f\u3066\u3044\u305f<\/a>\u3068\u3053\u308d\u3001\u8105\u5a01\u60c5\u5831\u5171\u6709\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e<a href=\"https:\/\/www.misp-project.org\/index.html\">MISP\u306b\u305f\u3069\u308a\u3064\u3044\u305f<\/a>\u306e\u3067\u3001\u3059\u3053\u3057\u304a\u52c9\u5f37\u3057\u3088\u3046\u304b\u3068\u304a\u3082\u3044\u307e\u3059\u3002<\/p>\n<p>\u8abf\u3079\u3066\u3044\u3066\u8208\u5473\u6df1\u304b\u3063\u305f\u8ad6\u6587\u306f\u3001Charles JACQUET &#8220;<a href=\"https:\/\/dial.uclouvain.be\/memoire\/ucl\/en\/object\/thesis%3A10600\/datastream\/PDF_01\/view\">Privacy Aware Sharing of IOCs in MISP<\/a>&#8221; \u3067\u3059\u3002<\/p>\n<p>\u3053\u306eJACQUET\u8ad6\u6587\u306e15\u9801\u306f\u3001\u60c5\u5831\u5171\u6709\u306e\u6b74\u53f2\u3067\u3059\u300215\u9801\u304b\u3089\u3067\u3059\u3002\u30e2\u30ea\u30b9\u30ef\u30fc\u30e0\u304b\u3089\u3001\u60c5\u5831\u5171\u6709\u304c\u59cb\u307e\u3063\u3066\u3044\u308b\u3053\u3068\u30011998\u5e74\u5927\u7d71\u9818\u6c7a\u5b9a63\u9805\u3084\u30012013\u5e74\u5927\u7d71\u9818\u4ee413636\u53f7\u304c\u7d39\u4ecb\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u521d\u306f\u3001\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u306eCISCP\u304c\u3042\u308a\u3001\u304c\u306a\u3055\u308c\u3066\u3001\u7c73\u56fd\u3067\u306f\u3001\u60c5\u5831\u5171\u6709\u5206\u6790\u7d44\u7e54(ISAO)\u304c\u3001\u767a\u5c55\u3057\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u8ad6\u6587\u304b\u3089\u96e2\u308c\u307e\u3059\u304c\u3001\u5177\u4f53\u7684\u306a\u60c5\u5831\u5171\u6709\u7d44\u7e54\u3068\u3057\u3066\u306f\u3001\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\uff08DHS\uff09\u306e<a href=\"https:\/\/www.cisa.gov\/ciscp\">\u30b5\u30a4\u30d0\u30fc\u60c5\u5831\u5171\u6709\u30fb\u5354\u8abf\u30d7\u30ed\u30b0\u30e9\u30e0<\/a>\uff08CYBER INFORMATION SHARING AND COLLABORATION PROGRAM-CISCP)\u3001<a href=\"https:\/\/www.cisa.gov\/critical-infrastructure-and-key-resources-support-annex\">\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u30fb\u30ad\u30fc\u30ea\u30bd\u30fc\u30b9 \u30b5\u30dd\u30fc\u30c8\u30a2\u30cd\u30c3\u30af\u30b9(CIKR)<\/a>\u3001\u56fd\u9632\u7701 (DoD)\u306e<a href=\"https:\/\/www.cisa.gov\/defense-industrial-base-sector\">\u9632\u885b\u7523\u696d\u30d9\u30fc\u30b9 (DIB)<\/a>\u3001\u5354\u8abf\u60c5\u5831\u5171\u6709\u74b0\u5883(DCISE)\u306a\u3069\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u65e5\u672c\u8a9e\u306e\u6587\u732e\u3068\u3057\u3066\u306f\u3001\uff23\uff33\uff2d\uff29 \u83ca\u6c60 \u6d69<a href=\"https:\/\/ssl.bsk-z.or.jp\/kakusyu\/pdf\/26-1jyouhou.pdf\">\u300c\u9632\u885b\u95a2\u9023\u4f01\u696d\u7b49\u306e\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u57fa\u76e4\u78ba\u4fdd\u306e\u305f\u3081\u306e\u60c5\u5831\u5171\u6709\u306b\u3064\u3044\u3066(\u5e73\u6210 25 \u5e74\u5ea6)\u300d<\/a>\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>JACQUET\u8ad6\u6587\u306b\u623b\u308b\u3068\u3001\u8ad6\u6587\u306f\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u306e\u30d9\u30f3\u30c0\u30fc\u306b\u8a71\u304c\u9032\u307f\u307e\u3059\u3002<\/p>\n<p>&#8220;<a href=\"https:\/\/wi2017.ch\/images\/wi2017-0188.pdf\">Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives &#8220;\u3068\u3044\u3046\u8ad6\u6587<\/a>\u306b\u3088\u308b\u3068\u3001\u30d9\u30f3\u30c0\u30fc\u3068\u3057\u3066\u306f\u300122\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u304c\u3042\u308b\u3068\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n22\u3068\u3057\u3066\u3042\u304c\u3093\u3066\u3044\u308b\u3082\u306e\u306f\u3001<\/p>\n<ul>\n<li>Accenture Cyber Intelligence Platform<\/li>\n<li>Anomali ThreatStream,<\/li>\n<li>Anubis Networks Cyberfeed<\/li>\n<li>\u00a0BrightPoint Security Sentinel<\/li>\n<li>Collaborative Research into Threats (CRITs)<\/li>\n<li>\u00a0Comilion<\/li>\n<li>\u00a0Facebook Threat Exchange<\/li>\n<li>Falcon Intelligence Crowdstrike<\/li>\n<li>\u00a0MANTIS Cyber Threat Intelligence Management Framework<\/li>\n<li>\u00a0Malware Information Sharing Platform (MISP)<\/li>\n<li>\u00a0McAfee Threat Intelligence Exchange<\/li>\n<li>\u00a0Microsoft Interflow<\/li>\n<li>\u00a0Open Threat Exchange (OTX)<\/li>\n<li>\u00a0Soltra Edge<\/li>\n<li>\u00a0HP ThreatCentral<\/li>\n<li>\u00a0ThreatCloud IntelliStore<\/li>\n<li>\u00a0ThreatConnect<\/li>\n<li>\u00a0ThreatQ<\/li>\n<li>ThreatTrack ThreatIQ<\/li>\n<li>\u00a0Eclectic IQ<\/li>\n<li>\u00a0IBM X-Force Exchange<\/li>\n<li>\u00a0Collective Intelligence Framework (CIF)<\/li>\n<\/ul>\n<p>\u306a\u3069\u3067\u3059\u3002<\/p>\n<p>\u60c5\u5831\u5171\u6709\u306e\u305f\u3081\u306e\u6a19\u6e96\u306b\u3064\u3044\u3066\u306e\u691c\u8a0e\u304c\u7d9a\u304d\u307e\u3059\u3002\u3053\u306e\u6a19\u6e96\u306f\u3001\u5217\u6319(Enumerations)\u3001\u30b9\u30b3\u30a2\u30ea\u30f3\u30b0\u30b7\u30b9\u30c6\u30e0\u3001\u8a00\u8a9e\u3001\u305d\u3057\u3066\u6700\u5f8c\u306b\u30c8\u30e9\u30f3\u30b9\u30dd\u30fc\u30c8\u56db\u3064\u306b\u5206\u3051\u308b\u3053\u3068\u304c\u3066\u304d\u308b\u3068\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u306eJACQUET\u8ad6\u6587\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u89b3\u6e2c\u53ef\u80fd\u8868\u73fe( Cyber Observable eXpression (CybOX)), \u69cb\u9020\u7684\u8105\u5a01\u60c5\u5831\u8868\u73fe(Structured Threat Information eXpression (STIX) )\u3001 MISP-core format for the languages\u3001\u4fe1\u983c\u3055\u308c\u308b\u81ea\u52d5\u7684\u60c5\u5831\u30a4\u30f3\u30c7\u30a3\u30b1\u30fc\u30bf\u306e\u4ea4\u63db(Trusted Automated eXchange of Indicator of Information (TAXII))\u3092\u3042\u3052\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u307e\u305f\u3001TAXII\u306f\u3001\u30b7\u30a7\u30a2\u306e\u30e2\u30c7\u30eb\u3092\u3042\u3052\u3066\u3044\u3066\u3001\u30cf\u30d6\u30fb\u30b9\u30dd\u30fc\u30af\u30e2\u30c7\u30eb\u3001\u30bd\u30fc\u30b9\/\u8cfc\u8aad\u8005\u30e2\u30c7\u30eb\u3001\u30d4\u30a2\u30fb\u30c8\u30fc\u30fb\u30d4\u30a2\u30e2\u30c7\u30eb\u304c\u3042\u3052\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>JACQUET\u8ad6\u6587\u306f\u3001\u6b21\u306b\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u3064\u3044\u3066\u7d39\u4ecb\u3092\u3057\u3066\u3044\u304d\u307e\u3059\u3002<\/p>\n<p>\u6b27\u5dde\u3067\u306f\u3001EISAS(\u6b27\u5dde\u60c5\u5831\u5171\u6709\u304a\u3088\u3073\u30a2\u30e9\u30fc\u30c8\u30b7\u30b9\u30c6\u30e0)\u304c<a href=\"file:\/\/\/C:\/Users\/Ikuo\/OneDrive\/articles\/Security\/Intelligence\/EU\/EISAS%20Deployment%20feasibility%20study.pdf\">\u63d0\u6848\u3055\u308c<\/a>\u3001ENISA\u304c\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092<a href=\"https:\/\/www.enisa.europa.eu\/publications\/good-practice-guide\">\u516c\u8868\u3057\u307e\u3059<\/a>\u3002\u307e\u305f\u3001NIST\u306f\u30012016\u5e74\u306bSP800-150\u3068\u3057\u3066<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-150.pdf\">&#8220;Guide to Cyber Threat Information Sharing&#8221;<\/a>\u3092\u516c\u8868\u3057\u307e\u3059\u3002\u65e5\u672c\u8a9e\u3067\u306e\u8aac\u660e\u306f\u3053\u3061\u3089\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u3088\u3046\u306a\u60c5\u5831\u5171\u6709\u306e\u57fa\u672c\u7684\u306a\u3053\u3068\u3092\u7d39\u4ecb\u3057\u305f\u3042\u3068\u3067\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d7\u30ea\u30b5\u30fc\u30d3\u30f3\u30b0\u306e\u6280\u8853\u306b\u3064\u3044\u3066\u8ad6\u3058\u3066\u3044\u304d\u307e\u3059\u3002\u3067\u3082\u3063\u3066\u3001\u8ad6\u6587\u306e\u30dd\u30a4\u30f3\u30c8\u306f\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3092\u7dad\u6301\u3057\u306a\u304c\u3089\u306e\u60c5\u5831\u5171\u6709\u3068\u3044\u3046\u554f\u984c\u3092\u8ad6\u3058\u3066\u3044\u304d\u307e\u3059\u3002\u305f\u3060\u3057\u3001\u6cd5\u7684\u306a\u89b3\u70b9\u304b\u3089\u306f\u3001\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u5171\u6709\u306f\u3001\u901a\u5e38\u306e\u5171\u6709\u3068\u306f\u3001\u307e\u305f\u3001\u30ec\u30d9\u30eb\u304c\u7570\u306a\u3063\u3066\u304f\u308b\u306e\u3067\u3059\u304c\u3001\u305d\u306e\u3088\u3046\u306a\u89b3\u70b9\u3068\u306f\u3001\u307e\u305f\u3001\u5225\u306b\u6280\u8853\u7684\u306b\u8ad6\u3058\u3066\u3044\u308b\u306e\u3067\u3001\u305d\u306e\u90e8\u5206\u306f\u3001\u30d1\u30b9\u3059\u308b\u3053\u3068\u306b\u3057\u307e\u3059\u3002<\/p>\n<p>\u3068\u3044\u3046\u3053\u3068\u3067\u3061\u3087\u3063\u3068\u3001\u57fa\u790e\u7684\u306a\u3068\u3053\u308d\u3092\u307e\u3068\u3081\u3066\u307f\u307e\u3057\u305f\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"WEF\u306eISP\u539f\u5247\u306e\u5831\u544a\u66f8\u3092\u307f\u3066\u3044\u305f\u3068\u3053\u308d\u3001\u8105\u5a01\u60c5\u5831\u5171\u6709\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306eMISP\u306b\u305f\u3069\u308a\u3064\u3044\u305f\u306e\u3067\u3001\u3059\u3053\u3057\u304a\u52c9\u5f37\u3057\u3088\u3046\u304b\u3068\u304a\u3082\u3044\u307e\u3059\u3002 \u8abf\u3079\u3066\u3044\u3066\u8208\u5473\u6df1\u304b\u3063\u305f\u8ad6\u6587\u306f\u3001Charles JACQUET &#8220;Pr [&hellip;]","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[5,33],"tags":[],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8IUOX-EK","_links":{"self":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/2526"}],"collection":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2526"}],"version-history":[{"count":2,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/2526\/revisions"}],"predecessor-version":[{"id":2528,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/2526\/revisions\/2528"}],"wp:attachment":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}