Abstract:
Provided is a data sharing system in which data are shared between a plurality of communication terminals capable of wirelessly transmitting and receiving a communication message to and from each other. Each communication terminal determines whether or not the own communication terminal is a specified terminal. Each communication terminal, in case of it is determined that the own communication terminal is a specified terminal, transmits a holding list that lists information about data that the own communication terminal holds, to another communication terminal through use of a communication message. Each communication terminal, when receiving a holding list from another communication terminal, transmits and receives communication messages to and from the other communication terminal that is a source of the holding list that does not match the holding list of the own communication terminal so as to share data with each other.
Abstract:
A communications terminal (a first communications terminal) that creates a holding list that lists information about remaining data, after the removal from data held by said communications terminal of at least one item of data which is not desired to be shared with another communications terminal (a second communications terminal), and sends said list to the second communications terminal by using a communications message. The second communications terminal determines what data, among the data in the holding list received from the first communications terminal, is not held by the second communications terminal, and sends a request for the determined data to the first communications terminal by using a communications message. The first communications terminal sends the data requested by the second communications terminal to the second communications terminal, by using a communications message.
Abstract:
An anomaly cause estimation apparatus includes: an anomaly detection unit converts a data series acquired in a time series from a plurality of components provided in a target system into an anomaly level data series, and detects an anomaly based on the obtained anomaly level data series; and an anomaly propagation estimation unit inputs a target anomaly level data series, extracted from the anomaly level data series, for a period before a point in time at which the anomaly is detected, a target data series corresponding to the target anomaly level data series, and information indicating a causal relationship between the components to an anomaly propagation estimation model, and estimates an anomaly propagation likelihood of the anomaly propagating between the components.
Abstract:
A setting unit (11) sets a path or a procedure for a cyber attack that is obtained through analysis of a risk to a communication system. A collection unit (12) collects safety information that is associated with safety in terms of information security regarding the constituent apparatuses of a communication system. An evaluation unit (13) evaluates the magnitude of a security risk present in the communication system, in accordance with the path or procedure for the cyber attack, on the basis of the security information, the security risk to a constituent apparatus related to the path or procedure for the cyber attack being evaluated to be lower when inspection for information security has been carried out on the constituent apparatus related to the path or procedure for the cyber attack than when inspection for information security is not carried out.
Abstract:
An access control system includes workload distribution control function that decides an access control granularity by analyzing dynamic risk factors in network system; and policy selection function that selects an access control policy corresponding to the access control granularity, from a core policy and distributes the selected access control policy toward filtering PEP (Policy Enforcement Point) controller and fine-grained PEP (Policy Enforcement Point) controller.
Abstract:
An analysis apparatus (10) includes: a setting unit (11) configured to set virtual vulnerabilities in a plurality of nodes configuring an information system to be analyzed; an extraction unit (12) configured to extract an attack route of the information system based on the virtual vulnerabilities set by the setting unit (11); and a discrimination unit (13) configured to discriminate vulnerabilities to be monitored based on the virtual vulnerabilities in the extracted attack route extracted by the extraction unit (12).
Abstract:
The purpose of the present application is to provide a technique for the exchange of path information between different routing domains, which, while reducing the exchange of useless path information in the stage for constructing a hierarchical structure, can maintain robustness of path recognition that tolerates network partition. Of the management communication node identifiers which are described in hierarchical information included in a path control message received from a neighboring communication node and in hierarchical information held by the local communication node and which indicate a communication node that manages each level of the hierarchicalized network structure, the identifier indicating the highest level communication node and the identifier indicating the transmission source communication node are used to identify whether the routing domain to which the aforementioned neighboring communication node belongs is the same as the routing domain of the local communication node, and if the routing domain to which the aforementioned neighboring communication node belongs is different from the routing domain of the local communication node, the path information held by the local communication node is made known.
Abstract:
A determination system according to an aspect of the present disclosure includes: at least one memory storing a set of instructions; and at least one processor configured to execute the set of instructions to: receive a first inspection result that is a result of a first inspection of vulnerability of target software; receive a second inspection result that is a result of a second inspection of vulnerability of the target software; determine validity of the first inspection from undetected vulnerability that is vulnerability detected in the result of the second inspection and not detected in the result of the first inspection; and output a result of determination of the validity.
Abstract:
A causality search apparatus including: a causality information calculation unit that selects two different components from a plurality of components provided in a target system and calculating causality information indicating causality between the two selected components; and a causality information correction unit that corrects the causality information based on function information indicating functions respectively associated with the two selected components.
Abstract:
Provided is an analysis system that allows a security administrator to understand the impact of known vulnerabilities on the system to be diagnosed. The topology identification unit 14 identifies network topology of devices included in a system to be diagnosed. The analysis unit 6 generates an attack pattern that includes an attack condition, an attack result, an attack means that is vulnerability that is used by an attack, and a segment where the attack can occur in the system to be diagnosed. The display control unit 8 displays segments included in attack patterns superimposed on the network topology, on a display device. At this time, the display control unit 8 changes a display mode of the segment according to a type of the vulnerability that corresponds to the attack means included in the attack pattern including the segment.