Abstract:
The purpose of the present application is to provide a technique for the exchange of path information between different routing domains, which, while reducing the exchange of useless path information in the stage for constructing a hierarchical structure, can maintain robustness of path recognition that tolerates network partition. Of the management communication node identifiers which are described in hierarchical information included in a path control message received from a neighboring communication node and in hierarchical information held by the local communication node and which indicate a communication node that manages each level of the hierarchicalized network structure, the identifier indicating the highest level communication node and the identifier indicating the transmission source communication node are used to identify whether the routing domain to which the aforementioned neighboring communication node belongs is the same as the routing domain of the local communication node, and if the routing domain to which the aforementioned neighboring communication node belongs is different from the routing domain of the local communication node, the path information held by the local communication node is made known.
Abstract:
A policy generation apparatus according to one example embodiment of the present disclosure includes at least one memory configured to store instructions; and at least one processor configured to execute the instructions to: acquire, regarding a plurality of elements related to access control, relation data indicating a relation between a plurality of elements and score data that defines at least one of a score which is based on a viewpoint of risk of access or a score which is based on a viewpoint of a need for access; and generate a policy for access control using the relation data and the score data.
Abstract:
A network control apparatus (10) according to the present disclosure is a network control apparatus (10) configured to control a node included in a network, and the network control apparatus (10) includes a collecting unit (11) configured to collect data pertaining to a node included in a network, a calculating unit (12) configured to calculate a security index pertaining to a threat of the node based on the data collected by the collecting unit (11), and a determining unit (13) configured to determine a zone of the node based on the security index calculated by the calculating unit (12).
Abstract:
Provided is a data sharing system in which data are shared between a plurality of communication terminals capable of wirelessly transmitting and receiving a communication message to and from each other. Each communication terminal determines whether or not the own communication terminal is a specified terminal. Each communication terminal, in case of it is determined that the own communication terminal is a specified terminal, transmits a holding list that lists information about data that the own communication terminal holds, to another communication terminal through use of a communication message. Each communication terminal, when receiving a holding list from another communication terminal, transmits and receives communication messages to and from the other communication terminal that is a source of the holding list that does not match the holding list of the own communication terminal so as to share data with each other.
Abstract:
A communications terminal (a first communications terminal) that creates a holding list that lists information about remaining data, after the removal from data held by said communications terminal of at least one item of data which is not desired to be shared with another communications terminal (a second communications terminal), and sends said list to the second communications terminal by using a communications message. The second communications terminal determines what data, among the data in the holding list received from the first communications terminal, is not held by the second communications terminal, and sends a request for the determined data to the first communications terminal by using a communications message. The first communications terminal sends the data requested by the second communications terminal to the second communications terminal, by using a communications message.
Abstract:
A determination system according to an aspect of the present disclosure includes: at least one memory storing a set of instructions; and at least one processor configured to execute the set of instructions to: receive a first inspection result that is a result of a first inspection of vulnerability of target software; receive a second inspection result that is a result of a second inspection of vulnerability of the target software; determine validity of the first inspection from undetected vulnerability that is vulnerability detected in the result of the second inspection and not detected in the result of the first inspection; and output a result of determination of the validity.
Abstract:
A causality search apparatus including: a causality information calculation unit that selects two different components from a plurality of components provided in a target system and calculating causality information indicating causality between the two selected components; and a causality information correction unit that corrects the causality information based on function information indicating functions respectively associated with the two selected components.
Abstract:
Provided is an analysis system that allows a security administrator to understand the impact of known vulnerabilities on the system to be diagnosed. The topology identification unit 14 identifies network topology of devices included in a system to be diagnosed. The analysis unit 6 generates an attack pattern that includes an attack condition, an attack result, an attack means that is vulnerability that is used by an attack, and a segment where the attack can occur in the system to be diagnosed. The display control unit 8 displays segments included in attack patterns superimposed on the network topology, on a display device. At this time, the display control unit 8 changes a display mode of the segment according to a type of the vulnerability that corresponds to the attack means included in the attack pattern including the segment.
Abstract:
A risk analysis is conducted without increasing the computational cost. A grouping means groups a plurality of hosts included in a system to be analyzed into a plurality of groups. A virtual analysis element generation means generates at least one virtual analysis element for each of the plurality of groups. An analysis means analyzes whether an attack against the virtual analysis element being an end point of an attack is possible by using the virtual analysis element. An analysis target element determination means determines, as a target of a risk analysis, a host corresponding to the virtual analysis element included in a path where the attack occurs among hosts included in the system to be analyzed. An analysis means analyzes whether an attack against the host being the end point of the attack is possible for the host determined as a target of the risk analysis.
Abstract:
An analysis unit 6 generates one or more pairs of a start point fact which is a fact representing possibility of the attack in a device that is a start point and an end point fact which is a fact representing possibility of the attack in the device that is an end point, analyzes, for each pair, whether or not it is possible to derive the end point fact from the start point fact, based on facts representing states of the devices generated based on information regarding the device that is the start point and information regarding the device that is the end point, the start point fact, and one or more analysis rules for analyzing the attack, and generates an attack scenario in a case where it is possible to derive the end point fact from the start point fact.