Abstract:
An automated system design apparatus provided with inputter receives a requirement for a system including a redundancy demand; and configuration generator generates a system configuration proposal for the system by selecting, from among designated concretization patterns defining a method for concretization while making a configuration element in the system redundant, a concretization pattern in accordance with the requirement for the system.
Abstract:
A network management apparatus that connects to a terminal by way of a communication apparatus, includes: a legitimate information generation unit configured to generate legitimate identification information that is identification information to identify the terminal on a network that the network management apparatus manages, the legitimate identification information being managed as legitimate information by the network management apparatus; a fake information generation unit configured to generate fake identification information that is different from the legitimate identification information and that cannot be used as it is for communication with another terminal; a management unit configured to manage the legitimate identification information and the fake identification information in association with each other; and a registration unit configured to register the fake identification information to the terminal.
Abstract:
An extraction apparatus (1) can obtain a first alert and a second alert that are generated, when an anomaly occurs in a control system, in order to provide notification of the anomaly. The extraction apparatus (1) includes: a classification unit (10) configured to generate association information associating the first alert with the second alert; a learning unit (20) configured to learn a generation pattern of the second alert when the anomaly occurs due to a cause other than a cyber-attack based on the association information generated by the classification unit (10) and a generation pattern of the first alert when the anomaly occurs due to a cause other than a cyber-attack; and an extraction unit (30) configured to extract, from among the second alerts, the second alert generated due to a cyber-attack based on the generation pattern of the second alert that is learned by the learning unit (20) and output the extracted second alert.
Abstract:
This invention provides an information processing system for controlling, in the management of network resources, with a desired accuracy and at a lower cost, whether to perform operations for the network resources. The information processing system comprises a means that performs a determination as to whether to execute an Application Programming (API) called up by an operating subject and used for controlling the network resources, said determination being performed on the basis of a correspondence among the operating subject, a tenant that is a set consisting of the network resources for which the operating subject has been permitted to perform operations, and the API for which the execution by the operating subject has been permitted. This means then controls the execution of the API on the basis of a result of the determination.
Abstract:
An automated system design apparatus provided with configuration proposal generator generates a configuration proposal for a system concretized from abstract requirements for the system; facet model generator concretizes a model relating to a feature, the feature being required in the system from a facet other than a configuration of the system; and evaluator generates information required for evaluation of the configuration proposal based on the concretized model, and for evaluating the configuration proposal based on the information.