æ»æãšäŸµå®³ã¯æ°åã§çºçããå¯èœæ§ãããã æ»æããã»ã¹â 䟵害 â ããŒã¿æŒæŽ© â ã€ã³ã·ãã³ãæ€åº â å¿çãšé€å»ã«ã¯æ°æ¥ãæ°é±éãå Žåã«ãã£ãŠã¯æ°ãæãããããŸãã ã»ãšãã©ã®å Žåãããã¯æ»æè ãããŒã¿ã䟵害ããåŸã«çºçããŸãã åæã«ãã·ã¹ã³ã®æ å ±ã»ãã¥ãªãã£ã«é¢ããå¹Žæ¬¡å ±åæžã«ãããšãã»ãã¥ãªãã£ã®å°é家ã¯å°±æ¥æ¥äžã«åä¿¡ããè åšã¡ãã»ãŒãžã®56ïŒ ããåŠçã§ããããããã®è åšã¢ã©ãŒãã®äžã§æ£åœã§ãããšèªèãããã®ã¯1ç§ã«1åã ãã§ãïŒã€ãŸã28ïŒ ïŒã ãããã£ãŠãã€ã³ã·ãã³ãã®44ïŒ ã¯ç¡èŠãããŸãïŒ
åæã«ãåžå Žã«ã¯ããã¹ãŠã®ã€ã³ã·ãã³ããåŠçã§ãããªãœãŒã¹ã ãã§ãªããã·ã¹ãã å šäœãéåžžã«äžè¶³ããŠããããããµã€ããŒæ»æã®åæ段éã§ãããã«å¯Ÿå¿ããããšãã§ããŸã-çæ³çã«ã¯éçšåã«ãè åšã«é¢ããåæ£ããç¥èãèç©ããåä¿¡ããããŒã¿ãå ±æããŸããè åšã®åå ã調æ»ããããã«å¯Ÿå¿ããŸãã èããããè åšã«é¢ããæ å ±ãããè¿ éã«èç©ããã«ã¯ãããŸããŸãªãœãŒã¹ããã®æçšãªããŒã¿ãå ±æããããåªåããå¿ èŠããããŸãã åæã«ããã®æ å ±ãæšæºåãããŠããããšãéèŠã§ããã€ãŸããããŒã¿ã®éä¿¡ãšæäŸã®ããã®æšæºãšãããã³ã«ãäºåã«å®çŸ©ãããŠããŸãã
è åšè¿œè·¡ã¯ãå¹æçãªããžãã¹ä¿è·ã®ããã®æãéèŠãªæ©èœã®1ã€ã§ãã TI-è åšãæ»æã圌ãã«å±å®³ãå ããåã«ããã«ã€ããŠåŠã¶ããšãå¯èœã«ããã·ã¹ãã ã ã€ã³ã·ãã³ããçºçããå ŽåãTIã¯ãæ¢åã®è åšãŸãã¯æœåšçãªè åšã«é¢ããã³ã³ããã¹ããã¡ã«ããºã ã䟵害ã®ææšãããã³åæã䜿çšããŠç¥èããŒã¹ãæ¡å€§ããªããã察å¿ãåæãããã³èª¿æ»ããããšãã§ããŸãã
è åšã€ã³ããªãžã§ã³ã¹ã¿ã¹ã¯
å³1.è åšã€ã³ããªãžã§ã³ã¹ã¿ã¹ã¯
è匱æ§ãšè åšã€ã³ããªãžã§ã³ã¹ãšã€ã³ããªãžã§ã³ã¹
TIã¯ã»ãã¥ãªãã£ã·ã¹ãã ã«çµ±åããå¿ èŠããããè匱æ§ãšè åšã«é¢ããæ å ±ãå ¬çããã³ç§çãœãŒã¹ããéäžçã«åéããæ©èœãæäŸããå¿ èŠããããŸãã
åæ
TIã¯ãè åšãžã®å¯Ÿå¿ã«é¢ããæšå¥šäºé ã®æ€åºãé瀺ãéçºãããã³çºè¡ã«é¢ããç¥èããŒã¹ãåæããã³æ§ç¯ããå¿ èŠããããŸãã
ããŒã¿äº€æ
TIã¯ãåä¿¡ããããŒã¿ããªã¢ã«ã¿ã€ã ã§äº€æããæ©èœãæäŸããå¿ èŠããããŸãã åææ å ±ã¯ãå éšããã³å€éšã®äž¡æ¹ã®ä¿è·æ段ã«æšæºåããã圢åŒã§å³åº§ã«é åžãããå¿ èŠããããŸãã
ã¯ã€ãã¯ã¢ã©ãŒã
TIã¯ãåé¡ãããããŒã¿ãæã€åäžã®æšæºåãããããŒã¿ããŒã¹ã䜿çšããŠããããããšã³ããã€ã³ãã§ã®æ»æãšè åšã«ã€ããŠè¿ éã«éç¥ããå¿ èŠããããŸãã
è åšã€ã³ããªãžã§ã³ã¹ã®ããŒã¿å
TIã¯ãæŠè¡çãéçšçãæŠç¥çã®3çš®é¡ã®ããŒã¿ãæ±ãå¿ èŠããããŸãã
æŠè¡
æ»æããŒã¿ïŒäŸµå ¥è ã䜿çšããããŒã«ãæŠè¡ãæè¡ããã³æé ïŒTTPïŒã䟵害ã€ã³ãžã±ãŒã¿ã«é¢ããããŒã¿ïŒIoCïŒã¯ãã€ã³ãã©ã¹ãã©ã¯ãã£å ã®æªæã®ããã¢ã¯ãã£ããã£ã®å åãæ€åºããããã®åå¥ã®ããŒã¿ã§ãã
éçšäž
æ°ããè åšãã¯ãã«ããã«ãã§ãŒã³ãæ å ±åŠçããã»ã¹ã䟵害ããæ¹æ³ãªã©ã远跡ããããšã§ååŸããçŸåšããã³äºæž¬ãããæ»æã«é¢ããããŒã¿ã
æŠç¥ç
æ å ±ã»ãã¥ãªãã£ã·ã¹ãã ã®éçºæŠç¥ãéçºãããšãããããªãç®æšãæ²ãããäžçã®è åšã®åŸåã«é¢ããåæããŒã¿ã
Threat Intelligenceããã»ã¹ãæ§ç¯ããããã«å¿ èŠãªãã®
å©çšå¯èœãªãã¹ãŠã®å€éšããã³å éšãœãŒã¹ããåä¿¡ããæ å ±ã«åºã¥ãã察çã䜿çšããŠãè åšãæ€åºããŠå¯Ÿå¿ããããã»ã¹ãæ§ç¯ããã«ã¯ã次ã®ããšãå¿ èŠã§ãã
â¢ããŒã¿ãœãŒã¹ïŒãã£ãŒãïŒãç¹å®ãã-䟵害ã®å åã®ãœãŒã¹ããŒã¿ãååŸããå ŽæïŒå éšãšå€éšã®äž¡æ¹ïŒã
â¢å éšåæã®å®æœ-çµç¹å ã«ã¯ãæ¹åæ§ã®ããæçãªæ å ±ãç¹å®ããŠçµ±åã§ããå°é家ãé¢é£éšéã®å°é家ãå€æ°ããå ŽåããããŸãã
â¢ããŒã¿æäŸã®ç°ãªããœãŒã¹éã®å¹æçãªéä¿¡ã®ããã«ãããŒã¿ã®è»¢éãšæäŸã®ããã®ãªãŒãã³ãªæšæºãšãããã³ã«ãå°å ¥ããŸã ã ãã®æ®µéã§ã¯ããã¹ãŠã®è åšãèšè¿°ãã䟵害ã¯ã©ã¹ã«çµã¿åãããŠæ£åžžã«è»¢éããããšãéèŠã§ãã
â¢ããŒã¿ã®åŠçãšåæã®ããã®ãã©ãããã©ãŒã ãå°å ¥ããŸãã ãã£ãŒããAPIãæšæºããããã³ã«ããã§ã«å«ãŸããŠããå¯èœæ§ããããããŸããŸãªã·ã¹ãã ãšçµ±åã§ãããªã©ãç¬èªã®ãªãŒãã³ãœãŒã¹ãœãªã¥ãŒã·ã§ã³ãæ¢è£œã®ãªãŒãã³ãœãŒã¹ãœãªã¥ãŒã·ã§ã³ããåæããå¿ èŠããããŸãã
ããŒã¿ãœãŒã¹
å éšããŒã¿ãœãŒã¹
ãŸããå éšæ å ±ä¿è·ããŒã«ããã®SIEMãŸãã¯LMãªã©ã䜿çšããŠãããŒã¿åéã®å¯èœãªå®è£ ã«é¢ããŠç€Ÿå ã§åæãè¡ãããšãã§ããŸãã ãããã£ãŠãæçšãªããŒã¿ãååŸã§ããŸãã
â¢ãããã¯ãŒã¯ãã©ãã£ãã¯ã®ç°åžžïŒNetflow / jFlow / sFlowïŒã
â¢ç°åžžãªIPã¢ãã¬ã¹ããã®ã¢ã¯ãã£ããã£ã
â¢DNSã¯ãšãªã
â¢URLããã³URIã
â¢SMTPããããŒã
â¢ã¡ãŒã«ã¢ãã¬ã¹ã
â¢æªæã®ããã³ãŒãã®ãµã³ãã«ã
â¢ãŠãŒã¶ãŒã¢ã¯ãã£ããã£ã
â¢ãã°ã€ã³è©Šè¡ã®å€±æã
â¢ç®¡çã¢ã¯ã»ã¹ã
â¢DBMSã䜿çšããæäœã
â¢éå®åããŒãã§ã®æ¥ç¶ã
â¢éå®åãããã³ã«ã®åºçŸã
â¢ãµãŒãã¹ãããã³ã«ã®ãã±ãããµã€ãºã®æšæºãšã®äžäžèŽã
â¢ã¢ãããã€ã¶ãŒã®ã¢ãã¬ã¹ã
â¢HTTPã®ãŠãŒã¶ãŒãšãŒãžã§ã³ãã
â¢æªæã®ããIPã
â¢ãŠãŒã¶ãŒããµã€ãããã¡ã€ã«ãªã©ã®è©å€
å€éšããŒã¿ãœãŒã¹
ã»ãã¥ãªãã£æ©èœã匷åããã«ã¯ãIoCããã³ãã®ä»ã®è åšã«é¢ããæ å ±ãå ¥æã§ããå€éšãªãœãŒã¹ãç¹å®ããå¿ èŠããããŸãã åæã«ãäŒç€Ÿã®ããŒãºã«å¿ããŠãã£ãŒããœãŒã¹ãéžæããéã®éèŠãªèŠçŽ ãèæ ®ããå¿ èŠããããŸãã
â¢ãœãŒã¹ã®ã¿ã€ãã
â¢ããŸããŸãªããŒã¿åœ¢åŒïŒJSONãXMLãCyBOXãSTiXãCSVãªã©ïŒã®ãµããŒãã
â¢æ å ±æäŸã®é »åºŠã
â¢æäŸãããããŒã¿ã®éã
â¢ããŒã¿ãæäŸãããœãŒã¹ãä¿¡é ŒããŸãã
â¢äŒæ¥ã€ã³ãã©ã¹ãã©ã¯ãã£ã®ã³ã³ãã©ã€ã¢ã³ã¹ã
â¢äŸ¡æ Œã
æã人æ°ã®ããå€éšãã£ãŒããœãŒã¹
å³2.æãäžè¬çãªå€éšãã£ãŒããœãŒã¹
å éšåæ
å éšããã³å€éšãã£ãŒãã«å ããŠãäŒç€Ÿã¯ä»¥äžã®ååšäžã§ç¬ç«ããç¬ç«ããåæãè¡ãããšãã§ããŸãã
â¢äºä»¶èª¿æ»å¡ã
â¢ãã«ãŠã§ã¢åæã®å°é家ã
â¢æ å ±ã»ãã¥ãªãã£ã®åéã§ãããããªããã¥ãŒã¹ã远跡ããã¹ãã·ã£ãªã¹ããäŸïŒ
o䟵害ããããµã€ãããã³ææãããµã€ãã
oãã£ãã·ã³ã°ãªãœãŒã¹ã
oæªæã®ãããã¡ã€ã«ã®ããã·ã¥ã
oæªæã®ããã³ãŒããæ€åºãããããã»ã¹ã
oã¬ãžã¹ããªããŒãªã©
â¢ãªã¢ã«ã¿ã€ã ã§æããã«ãªã£ãæ å ±ã
ãã®æ®µéã§èŠã€ãã£ããã¹ãŠã®æ å ±ã¯ãé¢é£ããå°é家ã«ãã£ãŠç¢ºèªããã³ãã¹ãããããã®åŸåäžã®ãœãŒã¹ã«å ¥åãããå¿ èŠããããŸãã æ€èšŒãšãã¹ãã«å ããŠããã®æ®µéã§ã¯ãèãããããªã¹ã¯ã軜æžããããã®æšå¥šäºé ãçå®ããããšãéèŠã§ãã
TIèŠæ Œ
ç¹å®ããããã¹ãŠã®è åšã¯ãæšæºåãããŠèšè¿°ãããå¿ èŠããããŸãã ãŸãããããã«é¢ããæ å ±ãéä¿¡ããæ©èœãæäŸããå¿ èŠããããŸãã çŸåšãããŒã¿ãæäŸããã³éä¿¡ãããããã®åé¡ã解決ããããã®å€æ°ã®ãªãŒãã³æšæºããã³ãããã³ã«ããããŸãã æã人æ°ã®ãããã®ãæ€èšããŠãã ããïŒ
⢠STIX ïŒStructured Threat Information eXpressionïŒ-çµ±åããããµã€ããŒè åšæ å ±ïŒCTIïŒãæäŸããããã«äœ¿çšãããæšæºã ããŸããŸãªåéã®ããŸããŸãªè åšãšé¢é£ãã©ã¡ãŒã¿ã®èª¬æãå ±æã§ããŸãã STIXã¯ã次ã®ãããªçµ±åãããã€ã³ã·ãã³ãæ å ±ãæäŸããŸãã
oæ å ±ãªããžã§ã¯ãïŒããšãã°ãã¬ãžââã¹ããªããŒã®äœæãç¹å®ã®IPã¢ãã¬ã¹ãžã®ãããã¯ãŒã¯ãã©ãã£ãã¯ãç¹å®ã®ã¢ãã¬ã¹ããã®é»åã¡ãŒã«ã®éä¿¡ãªã©ïŒã
oã€ã³ãžã±ãŒã¿ã
oã€ã³ã·ãã³ã;
oæŠè¡ãæ¹æ³ãæ»æã®æé ïŒæ»æãã¿ãŒã³ããã«ãŠã§ã¢ããšã¯ã¹ããã€ããªã©ïŒã
oæäœãªããžã§ã¯ãïŒè匱æ§ãã»ãã¥ãªãã£ãšã©ãŒãäžé©åãªæ§æãªã©ïŒã
o察çïŒã€ã³ã·ãã³ãã¬ã¹ãã³ã¹ãŸãã¯ã»ãã¥ãªãã£ã®è匱æ§/ãšã©ãŒã®ä¿®æ£ïŒ;
oãµã€ããŒæ»æã®ã°ã«ãŒãïŒäžé£ã®ã€ã³ã·ãã³ããTTPïŒã
oãµã€ããŒè åšãžã®åå è ïŒèå¥ãæµã®ç¹æ§ïŒã
以äžã¯ãSTIXã¢ãŒããã¯ãã£ã§ãã
å³3. STIXã¢ãŒããã¯ãã£
⢠CybOX ïŒCyberââ Observable eXpressionïŒ-芳å¯ãããã»ãã¥ãªãã£ã€ãã³ãã®ã€ã³ãžã±ãŒã¿ãèšè¿°ããã³è¡šç€ºããããã®å ±éã®æ§é ãæäŸããæšæºã çŸåšããã¡ã€ã«ããããã¯ãŒã¯æ¥ç¶ãHTTPã»ãã·ã§ã³ããããã¯ãŒã¯ãã©ãã£ãã¯ãX.509蚌ææžãªã©ã70ãè¶ ããããŸããŸãªç£èŠå¯Ÿè±¡ãªããžã§ã¯ããæ¢ã«éä¿¡ãããŠããŸãã
⢠TLP ïŒTraffic Light ProtocolïŒ-æ å ±ã4è²ã§ãè²ä»ããã§ãããããã³ã«ã§ãè åšã«é¢ããåä¿¡æ å ±ãåä¿¡ã§ãããŠãŒã¶ãŒã«åœ±é¿ãäžããŸãã
-æ å ±ã¯é åžçšã§ã¯ãããŸããã
-çµç¹å ã§ã®ã¿å©çšå¯èœã
-瀟äŒãŸãã¯ã³ãã¥ããã£å ã§ã®ã¿å©çšå¯èœã
-誰ã§ãå©çšã§ããŸãã
⢠IODEF ïŒã€ã³ã·ãã³ããªããžã§ã¯ãã®èª¬æãšäº€æ圢åŒïŒïŒRFC 5070ïŒ-é£çµ¡å æ å ±ãééçæ害ãæéã圱é¿ãåãããªãã¬ãŒãã£ã³ã°ã·ã¹ãã ããã³ã¢ããªã±ãŒã·ã§ã³ãªã©ãå«ããã€ã³ã·ãã³ãã®30ã®ã¯ã©ã¹ããã³ãµãã¯ã©ã¹ãè¶ ããXML圢åŒã§å«ãŸããæšæº IODEFã¯ååã«éçºãããæšæºã§ããããã§ã«å€ãã®å Žæã§äœ¿çšãããŠããŸãã IODEF-SCIïŒæ§é åãµã€ããŒã»ãã¥ãªãã£æ å ±ã®IODEFïŒ-IODEFã«è¿œå ããŒã¿ãè¿œå ã§ããIODEFã®æ¡åŒµïŒæ»æãã¿ãŒã³ããã©ãããã©ãŒã ã«é¢ããæ å ±ãè匱æ§ãç¡ååã®æ瀺ãå±éºã¬ãã«ãªã©
⢠OpenIOC ïŒ äŸµå®³ã®å å ïŒ- 䟵害ã®å åãèšè¿°ããããã®ãªãŒãã³ã¹ã¿ã³ããŒãã XMLã«åºã¥ããŠæ§ç¯ãããäž»ã«ããŒãïŒãã¹ãïŒ-ãã¡ã€ã«ããã©ã€ããŒããã£ã¹ã¯ãããã»ã¹ãã¬ãžã¹ããªãã·ã¹ãã ãããã·ã¥ãªã©ã500ãè¶ ããããŸããŸãªã€ã³ãžã±ãŒã¿ãŒãå«ãŸããŠããŸãã
⢠MISP-ã€ã³ãžã±ãŒã¿ãŒã®æ§é åããã説æãè åšã«é¢ããæ å ±ã æ»æè ãéèè©æ¬ºãJSONã«åºã¥ããªãŒãã³åœ¢åŒã
⢠VERIS ïŒã€ãã³ãèšé²ãšã€ã³ã·ãã³ãå ±æã®èªåœïŒ-è åšãšã€ã³ã·ãã³ããèšè¿°ããããã®æšæºã VERISã¹ããŒã ã¯ã5ã€ã®éšåã§æ§æãããŠããŸãã
-ã€ã³ã·ãã³ã远跡;
-被害è å±€;
-ã€ã³ã·ãã³ãã®èª¬æã
-çºèŠãšå¿ç;
-圱é¿è©äŸ¡ã
⢠TAXII ïŒã€ã³ããªãžã§ã³ã¹æ å ±ã®ä¿¡é Œãããèªå亀æïŒ-STIXã䜿çšããŠèšè¿°ãããHTTPSãããã³ã«ã§ãµã€ããŒè åšæ å ±ïŒCTIïŒã亀æããæ¹æ³ãçµ±äžããããã«äœ¿çšãããæšæºã
ããŒã¿ã亀æããã«ã¯ããã€ãã®æ¹æ³ããããŸãã
-ããã¢ã³ãã¹ããŒã¯ã ãã®ã¢ãŒããã¯ãã£ã¯ã1ã€ã®çµç¹ãæ å ±äº€æã®äžå¿ãšããŠæ©èœããããšãæ³å®ããŠããŸã-察話ã®ä»ã®ãã¹ãŠã®åå è ã®ãã-ã¹ããŒã¯ã ã¹ããŒã¯ã¯æ å ±ããããšå ±æããããã¯ãã®æ å ±ãä»ã®ã¹ããŒã¯ãšåå ±æããŸãã
-ãœãŒã¹/ãµãã¹ã¯ã©ã€ããŒã ãã®ã¢ãŒããã¯ãã£ã§ã¯ã1ã€ã®çµç¹ãä»ã®ãã¹ãŠã®äŒæ¥ã®æ å ±æºãšããŠæ©èœãããšæ³å®ããŠããŸãã
-ãã¢ããŒãã¢ã ã¢ãŒããã¯ãã£ã¯ãçµç¹ãæ å ±ã®çç£è ãšæ¶è²»è ã®äž¡æ¹ãšããŠæ©èœã§ããããšãåæãšããŠããŸãã
TAXIIã«ã¯æ¬¡ã®ãµãŒãã¹ãå«ãŸããå ŽåããããŸãããããã®ãµãŒãã¹ã¯ãäžç·ã«äœ¿çšããããšãåå¥ã«äœ¿çšããããšãã§ããŸãã
-åä¿¡ããã¯ã¹ïŒåä¿¡ããã³ã³ãã³ããåä¿¡ããããã®ãµãŒãã¹ã
-ã¢ã³ã±ãŒãïŒã³ã³ãã³ãããªã¯ãšã¹ãããããã®ãµãŒãã¹ã
-ã³ã¬ã¯ã·ã§ã³ç®¡çïŒããŒã¿ã³ã¬ã¯ã·ã§ã³ãæäœããããã®ãµãŒãã¹ã
-çºèŠïŒãµããŒããããŠããæ°ãããµãŒãã¹ã«é¢ããæ å ±ã
⢠VEDEF ïŒè匱æ§ãšãšã¯ã¹ããã€ãã®èª¬æãšäº€æåœ¢åŒ ïŒ-è匱æ§ãšãšã¯ã¹ããã€ãã«é¢ããæ å ±ã亀æããããã®æšæºã
å³4.è匱æ§ãšãšã¯ã¹ããã€ãã®èª¬æããã³äº€æ圢åŒ
å³5.è匱æ§ãšãšã¯ã¹ããã€ãã®èª¬æããã³äº€æ圢åŒ
⢠CAIF ïŒå ±éã¢ããŠã³ã¹ã¡ã³ã亀æãã©ãŒãããïŒ-ã»ãã¥ãªãã£ãªããžã§ã¯ããä¿åããã³äº€æããããã®XMLããŒã¹ã®æšæºã äž»ãªã»ãã¥ãªãã£åé¡ã説æããããã«èšèšãããåºæ¬çãªèŠçŽ ã»ãããæäŸããŸãã èŠçŽ ã®ã»ãããå±éã§ããããšãéèŠã§ãã è€æ°ã®èªè ã°ã«ãŒãã®æ å ±ãã°ã«ãŒãåã§ãã1ã€ã®ããã¥ã¡ã³ãã§å€èšèªããã¹ãã®èª¬æãæäŸããŸãã
⢠MMDEF ïŒãã«ãŠã§ã¢ã¡ã¿ããŒã¿äº€æãã©ãŒãããïŒ-ãã«ãŠã§ã¢ã®æšæºã¡ã¿ããŒã¿äº€æã
⢠RID ïŒReal-time Inter-network DefenseïŒ-HTTP / HTTPSã«åºã¥ããŠæ§ç¯ããããããŸããŸãªæ å ±ã»ãã¥ãªãã£ã·ã¹ãã ã®çžäºäœçšãå¯èœã«ãããããã³ã«ã
è匱æ§ç®¡çæšæº
MITER ïŒé£éŠæ¿åºãåŸæŽããç 究éçºã»ã³ã¿ãŒãéå¶ããéå¶å©çµç¹ãFFRDCãéå¶ïŒïŒ
⢠CVE ïŒCommon Vulnerabilities and ExposuresïŒ-è匱æ§ã®äžè¬çãªåœåãå®çŸ©ããæšæºã
⢠OVAL ïŒãªãŒãã³ãªè匱æ§ãšè©äŸ¡èšèªïŒ-ã¹ãã£ããŒãšã»ãã¥ãªãã£åæã·ã¹ãã ã®è匱æ§ãèšè¿°ããããã®ãªãŒãã³ãªèšèªã
⢠CCE ïŒå ±éæ§æåæïŒ-ã¹ãã£ããŒããã³ã»ãã¥ãªãã£åæã·ã¹ãã ã§ããã«æ€èšŒã§ããæ§æãèšè¿°ããããã®æšæºã
⢠CEE ïŒCommon Event ExpressionïŒ-ç°ãªãä¿è·æ段éã®ã¢ã©ãŒã ã®èª¬æãä¿åã亀æã®æšæºã
⢠CME ïŒCommon Malware EnumerationïŒ-CVEã«äŒŒãŠããŸããããã«ãŠã§ã¢ã«çŠç¹ãåœãŠãæšæºã
⢠CWE ïŒCommon Weakness EnumerationïŒ-ãœãããŠã§ã¢ã®åŒ±ç¹ã®æšæºåãããã»ããã
⢠CPE ïŒCommon Platform EnumerationïŒ-ITã€ã³ãã©ã¹ãã©ã¯ãã£ã®èŠçŽ ãèšè¿°ããã³åœåããããã®æšæºã
⢠CAPEC ïŒäžè¬çãªæ»æãã¿ãŒã³ã®åæãšåé¡ïŒ-æ»æãã¿ãŒã³ã®æšæºçãªåé¡ã
⢠CRF ïŒCommon Result FormatïŒ-ãã¹ãçµæãèšè¿°ããããã»ãã¥ãªãã£ãè©äŸ¡ãããããããã®æšæºã
⢠SCAP ïŒã»ãã¥ãªãã£ã³ã³ãã³ããªãŒãã¡ãŒã·ã§ã³ãããã³ã«ïŒ-ã»ãã¥ãªãã£ããŒã¿ã®ç®¡çãèªååããããã®ãããã³ã«ã ããã¯ãå®å šæ§ããŒã¿ã®è¡šç€ºãšäº€æã®ããã®æè¡ä»æ§ãå®çŸ©ããäžé£ã®ãªãŒãã³ã¹ã¿ã³ããŒãã§ãã
⢠CVSS ïŒCommon Vulnerability Scoring SystemïŒ-è匱æ§ã«åªå é äœãä»ããããã®æšæºã
ããŒã¿åŠçããã³åæã®ããã®ãã©ãããã©ãŒã
TIãã©ãããã©ãŒã ã¯ãäž»ã«ããŸããŸãªãœãŒã¹ãã䟵害ã®å åãåéããããã«èšèšãããŠããŸãã ãŸããããã«é¢é£ããã¢ã¯ã·ã§ã³ãåé¡ããŠå®è¡ããå¿ èŠããããŸãã
ãã©ãããã©ãŒã ã®éžæã¯ãå®è£ ãèšç»ããŠããTIã·ã¹ãã ã®èŠæš¡ã«çŽæ¥äŸåããå¿ èŠããããŸãã 匷åãªTIã®å Žåãããšãã°ãMiter CRITãMaltegoãThreatConnectãIBM i2ãªã©ã®ãã©ãããã©ãŒã ãæ€èšã§ããŸããå®è£ ã容æã«ããããã«ããªãŒãã³ãœãŒã¹ãœãªã¥ãŒã·ã§ã³ã䜿çšã§ããŸãããã®å ŽåãèŠæš¡ãæ©èœããµããŒããããäŸ¡æ Œãåªå ããŸãã ã æã人æ°ã®ãããã©ãããã©ãŒã ãæ€èšããŠãã ããã
Anomali ThreatStream
â¢ããŸããŸãªãã£ãŒãã
å³6.ããŸããŸãªãã£ãŒãã䜿çšãã
â¢å€ãã®æ å ±ã»ãã¥ãªãã£è£œåããã³SIEMã·ã¹ãã ãšã®çµ±åã
å³7.å€ãã®æ å ±ã»ãã¥ãªãã£è£œåãšSIEMã·ã¹ãã ãšã®çµ±å
â¢è åšèª¿æ»ã«é¢ãã詳现æ å ±ãæäŸããŸãã
â¢APIã®å¯çšæ§ã
MANTIS ïŒè åšã€ã³ããªãžã§ã³ã¹ãœãŒã¹ã®ã¢ãã«ããŒã¹åæïŒ
OpenIOCãIODEFãCybOXãSTIXãTAXIIæšæºã䜿çšããŠååŸããè åšæ å ±ãã€ã³ããŒãã§ããè åšç®¡çãã©ãããã©ãŒã ã ã€ã³ããŒããããSTIXããŒã¿ã®ãµã³ãã«ïŒ
å³8.ã€ã³ããŒããããSTIXããŒã¿ã®ãµã³ãã«
å³9.ã€ã³ããŒããããSTIXããŒã¿ã®ãµã³ãã«
CIF ïŒCollective Intelligence FrameworkïŒ
â¢CIFããµããŒãããããŸããŸãªãœãŒã¹ããè åšæ å ±ãåéããã³çµ±åããæ©èœã
â¢åä¿¡ããæ å ±ã䜿çšããŠã€ã³ã·ãã³ããç¹å®ããŸãã
â¢Snortãiptablesãããã³ãã®ä»ã®ä¿è·æ段ã®ã«ãŒã«ãçæããããšã«ããè åšã®æ€åºãšäžåã
â¢ã»ãšãã©ã®å Žåãæªæã®ããã¢ã¯ãã£ããã£ã«é¢é£ä»ããããŠããIPã¢ãã¬ã¹ããã¡ã€ã³åãããã³URLã§åäœããŸãã
â¢IODEFãæ å ±ä¿å圢åŒãšããŠäœ¿çšããŸãã
â¢ãªãŒãã³ãœãŒã¹ãã©ãããã©ãŒã ã
â¢ãã£ãŒããšAPIã®å¯çšæ§ã
å³10.ã³ã¬ã¯ãã£ãã€ã³ããªãžã§ã³ã¹ãã¬ãŒã ã¯ãŒã¯
IBM X-Force Exchange
â¢1åããšã®åçæŽæ°ã«ããè åšåæã
â¢250åãè¶ ããWebããŒãžããã³ç»åããè åšã远跡ããŸãã
â¢96,000ãè¶ ããè åšã«é¢ããæ å ±ãå«ãããŒã¿ããŒã¹ã«ãã£ãŠãµããŒããããŠããŸãã
â¢ã¹ãã ãšãã£ãã·ã³ã°ã䜿çšãã800äžä»¶ãè¶ ããæ»æã®åæã
â¢860,000ã®æªæã®ããIPã¢ãã¬ã¹ã®ã¬ãã¥ããŒã·ã§ã³ããŒã¿ã远跡ããŸãã
â¢IBM Security補åãšX-Force Exchangeåæãçµ±åããŸãã
â¢è åšãä¿è·è£œåã«é¢é£ä»ããæ©èœãå®è£ ããŸããã
â¢RESTfulã䜿çšããŠãSTIXããã³TAXIIæšæºã«åºã¥ãä»ã®ã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ãšçµ±åããæ©èœã
â¢å å ¥è ãX-Force Exchangeããã®è åšåæããŒã¿ãäŒæ¥ã»ãã¥ãªãã£ã»ã³ã¿ãŒïŒSOCïŒãéçºç°å¢ïŒDevOpsïŒãªã©ã®ç¬èªã®éçšã«çµ±åããæ©èœã
ãã¹
â¢è åšæ å ±ãäœæãåŠçãå ±æãããã³ã³ã©ãã¬ãŒã·ã§ã³ããããã®ãªãŒãã³ãœãŒã¹ãã©ãããã©ãŒã ã
â¢æè»ãªèªååæ©èœãAPIãšã®é£æºã
â¢ãã€ãã£ãã®STIX圢åŒãšSTIXãOpenIOCã®äž¡æ¹ã®ãµããŒããããã¹ãããã³csvããŒã¿ã®ã€ã³ããŒãã
â¢ç°ãªãã¢ã¯ã¿ãŒéã§ã®è åšæ å ±ã®èªåã»ãã¥ã¢äº€æã®ãµããŒãã
â¢IDSãSIEMãBroãSnortãSuricataãªã©ã®ã«ãŒã«ã®èªåçæã
ãããã«
ãµã€ããŒç¯çœªè ã¯é·ãéãä»ã®èª°ãã®çµéšãå©çšããŠãããé«åºŠãªæ°ããæ»æãä»æããŠããŸããã æ å ±ã»ãã¥ãªãã£æ¥çã¯é·ãéééçãªãã®ãšããŠçºå±ããŠããŸããã è åšãæ€åºããŠæ»æãé²ãããã«åœ¹ç«ã€ç¥èãšçµéšãå ±æãã人ã¯ããŸããã§ããã
TIã¯è åšãšäŸµå ¥è ã«é¢ãã倧èŠæš¡ãªç¥èããŒã¹ã§ãããæ»æè ãå±å®³ãå ããããã«äœ¿çšããæ¹æ³ãšãããã«å¯ŸåŠããæ¹æ³ã«é¢ããæ å ±ãèç©ããŸãã TIã¯ãè åšã®ãœãŒã¹ãšäŸµå®³ã®å åã«é¢ããåçãªæ å ±ãåŠçããŸãã
ãã¡ãããTIã®å©ããåããŠããã¹ãŠã®ãã©ãã«ãé²ãããšã¯ã§ããŸãããããµã€ããŒç¯çœªã«å¯Ÿå¿ããæã匷åãªææ°ããŒã«ã§ãããæ»æãè¡ãããŠããæ¹åããã°ããç¹å®ãããããããé²åŸ¡ããã®ã«åœ¹ç«ã¡ãŸãã
æçš¿è Oksana Koterevaããœãªã¥ãŒã·ã§ã³ããã¢ãŒã·ã§ã³ãããŒãžã£ãŒ
InformzashchitaäŒç€Ÿão.kotereva @ infosec.ru