The present invention relates to a system, method, and device for sharing information between multiple organizations.
In the past, it was common in the field of information processing that information was processed individually by organizations through the use of various information owned by the individual organizations. However, there are limits to various processes and countermeasures that are based on the use of information owned by a single organization. Therefore, in recent years, the use of systems sharing information between multiple organizations has been promoted in order to obtain more beneficial effects.
For example, in the field of cybersecurity, cyberattacks by attackers are becoming more diverse and sophisticated, and it is difficult to adequately thwart the threat of cyberattacks by using only the information owned by the individual organizations. Therefore, as a countermeasure against cyberattacks, cyberattack information owned individually by multiple organizations is shared and used by the multiple organizations to improve the security systems of the individual organizations. In fact, public organizations, such as IPA (Information-technology Promotion Agency, Japan) and ISAC (Information Sharing and Analysis Center), are making efforts to share information between multiple organizations.
The efforts are being made to share information as described above. Meanwhile, there is a risk of leakage of shared information, and the shared information may possibly include sensitive information of individual organizations. Consequently, problems may arise to impede the promotion of information sharing. Accordingly, a technology for evaluating the credibility of information sharing partners and sharing the information based on the evaluated credibility has been proposed to address the above problems.
For example, the technology disclosed in Patent Literature 1 below is known regarding transactions using the level of credibility (credit score) through the Internet. In order to promote the transactions of transaction objects through the Internet, the technology disclosed in Patent Literature 1 acquires a credit score based on the behavior of a seller who sells a transaction object on the Internet. In a case where the acquired credit score of the seller satisfies predetermined conditions, the disclosed technology pays the whole or part of the selling price of the transaction object to the seller during the time interval between the instant at which the transaction object is put on sale and the instant at which the purchaser of the transaction object registers the receipt of the transaction object.
Patent Literature 1: JP-2021-18587-A
The technology described in Patent Literature 1 promotes transactions by acquiring the seller's credit score and providing the whole or part of the selling price of the transaction object only when the acquired credit score satisfies the predetermined conditions. However, Patent Literature 1 only assumes one-to-one transactions, and does not assume transactions between a single organization and multiple organizations. Therefore, the technology described in Patent Literature 1 is not applicable in a situation where information is shared with multiple organizations.
The present invention has been made in view of the above circumstances. An object of the present invention is to provide a technology that makes it possible to share information with multiple organizations in accordance with credibility.
According to an aspect of the present invention, there is provided an information sharing system including a concealment processing section, an analysis section, and an information transmission section. The concealment processing section conceals information collected from any one or more of multiple organizations in accordance with a level of credibility between the organizations. The analysis section makes an analysis by using the information concealed by the concealment processing section and an analysis logic collected from any one or more of the multiple organizations. The information transmission section transmits a result of analysis by the analysis section to any one or more of the multiple organizations, and allows each organization to share the result of analysis.
According to another aspect of the present invention, there is provided an information sharing method including: collecting information from any one or more of multiple organizations; concealing the collected information in accordance with the level of credibility between the organizations; causing a computer to make an analysis by using the concealed information and an analysis logic collected from any one or more of the multiple organizations; and transmitting a result of analysis to any one or more of the multiple organizations and allowing each organization to share the result of analysis.
According to yet another aspect of the present invention, there is provided an analysis device including an analysis section and an information transmission section. The analysis section makes an analysis by using an analysis logic collected from any one or more of multiple organizations and information of any one or more of the multiple organizations that is concealed in accordance with a level of credibility between the organizations. The information transmission section transmits a result of analysis by the analysis section to any one or more of the multiple organizations, and allows each organization to share the result of analysis.
At least one implementation of a subject matter disclosed herein will be described in detail in the accompanying drawings and in the rest of this document. Other features, aspects, and advantages of the disclosed subject matter will become apparent from the following disclosure, drawings, and appended claims.
The present invention provides a technology that is able to achieve information sharing based on credibility between multiple organizations.
Embodiments of the present invention will now be described in detail with reference to the accompanying drawings. As a general rule, the embodiments are explained in such a manner that the same component elements are designated by the same reference signs and will not be redundantly described. It should be noted that the embodiments are merely examples for implementing the present invention, and not intended to limit the technical scope of the present invention.
An information sharing system according to a first embodiment of the present invention is described below with reference to
The following embodiments are described with reference to an example in which the functions of the information sharing system provided by the present invention are implemented by causing a computer to execute a program. Alternatively, however, similar functions may be implemented by hardware logic. Further, the program to be executed may be stored in advance in the computer, or may be introduced into the computer through a network from an external device equipped with a non-transitory storage medium or through a portable non-transitory storage medium.
The transmission device 101, which is owned by each of organizations A, B, and C, transmits, to the analysis device 104, which is owned by organization D, information owned by each organization and required for analysis (hereinafter referred to as the analysis information) and information indicating the level of credibility between the organizations, and then requests the analysis device 104 to make an analysis. Meanwhile, the reception device 102, which is owned by each of the organizations A, B, and C, receives an analysis result transmitted from the analysis device 104. In response to an analysis request from any one of the organizations A, B, and C, the analysis device 104 collects the analysis information transmitted from the transmission device 101 of each organization, and conceals and analyzes the collected analysis information. The result of analysis by the analysis device 104 is transmitted from the organization D to each of the organizations A, B, and C, and received by the reception device 102 of each organization. As a result, the information sharing system 1 according to the present embodiment provides information sharing between the multiple organizations.
Although the example depicted in
The transmission device 101 and the reception device 102 will now be described with reference to
The transmission device 101 is implemented by using a general information processing device such as a PC (Personal Computer). As depicted in
The communication IF 111 operates under the control of the CPU 112, and performs interface processing on various information transmitted and received between the transmission device 101, the reception device 102, and the analysis device 104.
An input/output device 117 is a device that receives input from an administrator in charge of managing the information sharing system 1 in the organization A and outputs information to be presented to the administrator. The input/output device 117 includes, for example, a mouse, a keyboard, and a display. The input/output IF 116 is connected to the input/output device 117, and configured to mediate data input and output that are performed by the input/output device 117 with respect to the administrator.
The main memory 113 is, for example, a RAM (Random Access Memory) or other semiconductor storage device, and configured to temporarily store necessary work data and a program that is to be executed by the CPU 112 after being loaded from the storage device 114.
The CPU 112 executes a program stored in the main memory 113 to control various sections of the transmission device 101.
The storage device 114 is, for example, a large-capacity, non-transitory magnetic storage device or a semiconductor storage device, such as a HDD (Hard Disk Drive) or an SSD (Solid State Drive), and configured to store a program to be executed by the CPU 112 and data to be used by the CPU 112. The whole or part of the program and data may be stored in advance in the storage device 114 as mentioned above, or may be introduced as needed from the outside.
In the present embodiment, functional blocks, namely, a request transmission section 121, an information transmission section 122, and an analysis logic transmission section 123, are implemented in the transmission device 101 when a predetermined program is loaded into the main memory 113 from the storage device 114 and executed by the CPU 112. Further, as the data to be used in the processing of these functional blocks, the storage device 114 stores an analysis logic 131 and a concealment policy 132.
The request transmission section 121 generates an analysis request to the analysis device 104, and outputs the generated analysis request to the communication IF 111. The analysis request contains analysis information of the organization A, information for identifying the analysis logic for use in analysis, and the concealment policy 132 of the organization A, which is read from the storage device 114, and is transmitted from the communication IF 111 to the analysis device 104 through the network 103. Further, in a case where the organization A requires analysis logic information for determining the details of analysis, the request transmission section 121 can output a request to transmit the analysis logic information stored in the analysis device 104 to the communication IF 111. The request to transmit the analysis logic information, which is outputted from the request transmission section 121, is transmitted from the communication IF 111 to the analysis device 104 through the network 103.
When the reception device 102 receives a request to share analysis information necessary for analysis in the analysis device 104, the information transmission section 122 acquires the analysis information relevant to the request from the reception device 102, and outputs the acquired analysis information to the communication IF 111. The analysis information outputted from the information transmission section 122 is transmitted from the communication IF 111 to the analysis device 104 through the network 103, and used for an analysis process that is performed by the analysis device 104.
When the reception device 102 receives a request to transmit the analysis logic 131 from the analysis device 104, the analysis logic transmission section 123 responds to the request and outputs the analysis logic 131 stored in the storage device 114 to the communication IF 111. The analysis logic 131 outputted to the communication IF 111 is transmitted to the analysis device 104 through the network 103.
The analysis logic 131 is a program that is owned by the organization A and used for making an analysis. The contents of the analysis logic 131 vary from one organization to another.
The concealment policy 132 is information that is used to define the level of information concealment in each organization when the result of analysis by the analysis device 104 is shared by each organization. The concealment policy 132 will be described in detail later.
As is the case with the transmission device 101, the reception device 102 is implemented by a general information processing device such as a PC. As depicted in
In the present embodiment, functional blocks, namely, an information search section 151 and an analysis result evaluation section 152, are implemented in the reception device 102 when a predetermined program is loaded into the main memory 143 and executed by the CPU 142.
When the transmission device 101 generates an analysis request or when a request to share information is received from the analysis device 104, the information search section 151 searches various information owned by the organization A and stored outside the reception device 102, and retrieves the analysis information necessary for analysis performed in the analysis device 104. The analysis information retrieved by the information search section 151 is outputted from the reception device 102 to the transmission device 101 by the communication IF 141. Then, the information transmission section 122 in the transmission device 101 transmits the analysis information to the analysis device 104 as described above.
The analysis result evaluation section 152 receives the result of analysis, which is transmitted from the analysis device 104, through the communication IF 141, and evaluates the received analysis result. An analysis result evaluation by the analysis result evaluation section 152 will be described in detail later.
Although the example depicted in
The analysis device 104 will now be described with reference to
As is the case with the transmission device 101 and reception device 102 depicted in
In the present embodiment, functional blocks, namely, a request transmission section 171, an information transmission section 172, a concealment processing section 173, an analysis section 174, and a credibility update section 175, are implemented in the analysis device 104 when a predetermined program is loaded into the main memory 163 and executed by the CPU 162. Further, as the data to be used in the processing of these functional blocks, the storage device 164 stores a logic information table 181, an organization information table 182, a credit score table 183, a credibility table 184, and a concealment definition table 185. These tables will be described in detail later.
When an analysis request is transmitted from the transmission device 101 of any one of the organizations A to C, the request transmission section 171 references the organization information table 182 stored in the storage device 164, checks the organizations A to C to identify an organization having analysis information relevant to the details of a requested analysis, and transmits a request to share the analysis information to the reception device 102 of the identified organization. Further, the request transmission section 171 references the logic information table 181 and organization information table 182 stored in the storage device 164, checks the organizations A to C to identify an organization having the analysis logic 131 necessary for analysis, and transmits a request to transmit the analysis logic 131 to the reception device 102 of the identified organization.
Upon receiving the request to transmit the analysis logic information from the transmission device 101 of any one of the organizations A to C, the information transmission section 172 responds to the received transmission request and transmits the logic information table 181 stored in the storage section 162. Further, the information transmission section 172 transmits the result of analysis performed in response to the analysis request to any one or more of the organizations A to C, and thus allows each organization to share the analysis result.
When an analysis request is transmitted from the transmission device 101 of any one of the organizations A to C, the concealment processing section 173 performs a concealment process on the analysis information and the analysis result, which are collected from each organization, by using the concealment policy 132 contained in the analysis request.
In response to the analysis request from any one of the organizations A to C, the analysis section 174 makes an analysis by using the analysis information collected from each organization. This information analysis is made by using the analysis information of each organization, which is derived from the concealment process performed by the concealment processing section 173, and the analysis logic 131, which is acquired from any one of the organizations in response to the transmission request from the request transmission section 171.
The credibility update section 175 updates the contents of the credit score table 183 and credibility table 184 stored in the storage section 162, by using the analysis information, which is collected from the transmission device 101 of each organization, and the result of evaluation that each organization has made on the analysis result shared between the individual organizations. A credibility update process performed by the credibility update section 175 will be described in detail later.
Further, the analysis device 104 may be connected to an input/output device including, for example, a mouse, a keyboard, and a display and provided with an input/output IF configured to input and output data to and from the input/output device, in order to enable an administrator in charge of managing the information sharing system 1 in the organization D to edit the individual tables stored in the storage device 164. Furthermore, the analysis device 104 may be integrated with the transmission device and reception device 102 depicted in
Data structures used in the information sharing system 1 according to the present embodiment will now be described with reference to
First, an example of the concealment policy will be described with reference to
In the information sharing system according to the present embodiment, the level of concealment of information shared between the different organizations varies with credibility between the organizations. The concealment policy 132 is defined in each organization by determining the threshold of the level of concealment for each type of information shared from an own organization to another organization. When performing the concealment process on the analysis information, the analysis device 104 references the concealment policy 132 and determines the level of concealment corresponding to the credibility for each organization with which the information is shared. In the example of
Entries of the concealment policy 132 are expressed in various fields, namely, ID 401, type of shared information 402, medium credibility threshold 403, and high credibility threshold 404. The field “ID 401” stores an identifier that uniquely identifies data corresponding to each record of the concealment policy 132. The field “type of shared information 402” stores the name of the type of information that is owned by each organization and shared between the organizations. The field “medium credibility threshold 403” stores the boundary value between “low credibility” and “medium credibility” among the aforementioned categories indicating the level of concealment. Meanwhile, the field “high credibility threshold 404” stores the boundary value between “medium credibility” and “high credibility.” The medium credibility threshold 403 and the high credibility threshold 404 may be set manually by the administrator, or may be set automatically based on the contents of the data, such as by setting a higher threshold if, for example, the data includes personal information.
An example of the logic information table will now be described with reference to
The logic information table 181 is a table that stores information regarding the analysis logic 131 owned by each organization. The organizations making an analysis request to the analysis device 104 are able to determine the analysis logic 131 for use in analysis by acquiring and referencing the logic information table 181 before making the analysis request.
Entries in the logic information table 181 are expressed in various fields, namely, ID 501, logic name 502, name of owning organization 503, details of logic analysis 504, level of concealment of necessary information 505, and information necessary for analysis 506. The field “ID 501” stores an identifier that uniquely identifies data corresponding to each record of the logic information table 181. The field “logic name 502” stores the name of the analysis logic. The field “name of owning organization 503” stores the name of an organization owning the analysis logic 131. The field “details of logic analysis 504” stores an explanation of the details of analysis performed by the analysis logic 131. The field “level of concealment of necessary information 505” stores information indicating the level of concealment of information used for analysis. The field “information necessary for analysis 506” stores the type of analysis information used for analysis.
It should be noted that the logic information table 181 can be edited by an organization owning the relevant analysis logic 131. When the analysis logic 131 is changed in an organization, the organization modifies the contents of the logic information table 181.
An example of the organization information table will now be described with reference to
The organization information table 182 is a table that records the connection destination of each organization and the types of information owned by each organization. Upon receiving an analysis request from an organization, the analysis device 104 references the information in the organization information table 182, and requests each organization to share the necessary analysis information.
Entries in the organization information table 182 are expressed in various fields, namely, ID 601, organization name 602, connection destination IP 603, security 604, electricity 605, finance 606, and other industry name 607. The field “ID 601” stores an identifier that uniquely identifies data corresponding to each record of the logic information table 181. The field “organization name 602” stores the name of an organization. The field “connection destination IP 603” stores, for example, connection destination IP information as the information indicating the access destination from the analysis device 104 to the reception device 102 of each organization. The fields “security 604,” “electricity 605,” “finance 606,” and “other industry name 607” store the value 1 if the relevant organization owns the information related to these industries, or the value 0 if the relevant organization does not own the information related to these industries. These items of information are used when the analysis device 104 determines an organization that requests the sharing of analysis information. In the example of
An example of the credit score table will now be described with reference to
The credit score table 183 is a table that indicates a credit score representing the level of credibility between the organizations with respect to each combination of the organizations forming the information sharing system 1. The credit score is a score obtained by an organization evaluating the behavior of another organization. In the credit score table 183 depicted in
An example of the credibility table will now be described with reference to
The credibility table 184 is a table that indicates the level of credibility between the organizations with respect to each combination of the organizations forming the information sharing system. The credibility is determined when the aforementioned credit score, which is indicated in the credit score table 183, is normalized in the range from 0 to 1. In the credibility table 184 depicted in
An example of the concealment definition table will now be described with reference to
The concealment definition table 185 defines how each piece of information shared between the organizations is concealed in the analysis device 104. In the concealment definition table 185 depicted in
The processing of the information sharing system 1 according to the present embodiment will now be described with reference to
First, the processing of the information sharing system 1 will be outlined with reference to
First, the transmission device 101 owned by the organization A requests logic information from the analysis device 104 (step S1001).
Upon receiving a request for logic information from the transmission device 101 of the organization A, the analysis device 104 causes the information transmission section 172 to transmit the logic information table 181 to the reception device 102 of the organization A (step S1002).
When the reception device 102 of the organization A receives the logic information table 181, the organization A references the logic information listed in the logic information table 181, and determines which executable analysis is to be made by the analysis device 104. After determination, the reception device 102 of the organization A causes the information search section 151 to perform a search on the information owned by the organization A to retrieve analysis information, and outputs the retrieved analysis information to the transmission device 101. The transmission device 101 causes the request transmission section 121 to generate an analysis request by using the analysis information acquired from the reception device 102, the information for identifying the analysis logic 131 for use in analysis, and the concealment policy 132 stored in the storage device 114, and transmits the generated analysis request to the analysis device 104 to make a request for analysis (step S1003).
Upon receiving the analysis request from the transmission device 101 of the organization A, the analysis device 104 causes the request transmission section 171 to extract the information for identifying the analysis logic 131 from the received analysis request, and identifies the analysis logic 131 for use in analysis and the organization owning the identified analysis logic on the basis of the extracted information and the logic information table 181. Then, the analysis device 104 determines the connection destination of the identified organization by using the organization information table 182, and requests the determined connection destination to transmit the analysis logic 131 (step S1004).
Upon receiving a request to transmit the analysis logic 131 from the analysis device 104, the transmission device 101 of the organization C causes the analysis logic transmission section 123 to transmit the analysis logic 131 stored in the storage device 114 to the analysis device 104 (step S1005).
Upon receiving the analysis logic 131 transmitted from the transmission device 101 of the organization C, the analysis device 104 causes the request transmission section 171 to reference the logic information table 181 and identify the analysis information related to the analysis logic 131. Then, the analysis device 104 references the organization information table 182, determines the organizations owing the identified analysis information and the connection destinations of the determined the organizations, and requests the determined connection destinations to share the analysis information (step S1006).
In the organizations B and C, which are requested by the analysis device 104 to share the analysis information, the information search section 151 in the reception device 102 performs a search within the relevant organization to retrieve information related to analysis as the analysis information. Then, the information transmission section 122 in the transmission device 101 of the organizations B and C transmits the analysis information retrieved from the relevant organization and the concealment policy 132 stored in the storage device 114 to the analysis device 104 (step S1007).
Upon receiving the analysis information and the concealment policy 132, which are transmitted from the transmission device 101 of the organizations B and C, the analysis device 104 causes the concealment processing section 173 to perform the concealment process on the analysis information by using not only the received analysis information and concealment policy 132 but also the analysis information and concealment policy 132, which are contained in the analysis request transmitted in step S1003 from the transmission device 101 of the organization A (step S1008). In the concealment process, the analysis information collected from each organization is concealed by excluding analysis information that has been determined to be unshared and not used for analysis due to low credibility of a transmission source organization. The concealment processing performed in step S1008 will be described in detail later.
Next, the analysis device 104 causes the analysis section 174 to perform the analysis requested by the organization A by using the analysis logic 131 acquired in step S1004 from the transmission device 101 of the organization C and the analysis information concealed by the concealment processing in step S1008 (step S1009). For example, in the case of an analysis performed by extracting a suspicious IP address from an access log, if a common IP address of a possibly highly abnormal access destination is found in the access logs of the multiple organizations when the access log information owned in each organization is analyzed as the analysis information, it is determined that the access from such an IP address is likely to be an access from a cyber attacker. In this instance, as mentioned above, the analysis information excluded in the concealment process will not be used for analysis.
Next, the analysis device 104 causes the credibility update section 175 to regard the organization A, which has made an analysis request, as an evaluation source organization, regard the organizations B and C, which have shared the analysis result, as evaluation destination organizations, and perform a credibility information update process of updating the information indicating the level of credibility from the organization A to the organizations B and C (step S1010). The credibility information update process performed in step S1010 will be described in detail later.
Next, the analysis device 104 causes the information transmission section 172 to transmit the analysis result obtained in step S1009 to each organization other than an organization that is determined in step S1008 by the concealment processing section to be not a sharing partner due to low credibility, and allows each organization to share the analysis result (step S1011). In this instance, the analysis device 104 may transmit the analysis result in response to a request from the transmission device 101 owned by each organization instead of compulsorily transmitting the analysis result to each organization.
The analysis result transmitted from the analysis device 104 is received by the analysis result evaluation section 152 in the reception device 102 owned by each of the organizations A, B, and C. Consequently, the reception device 102 of each of the organizations A, B, and C acquires the analysis result generated by the analysis device 104 and allows the analysis result to be shared between the organizations A, B, and C (step S1012).
Next, the reception device 102 of each of the organizations B and C causes the analysis result evaluation section 152 to evaluate the analysis result acquired in step S1012 from the analysis device 104, and calculates the credit score indicating the level of credibility from the organizations B and C to the organization A, which has made an analysis request (step S1013). A credit score calculation process performed in step S1013 will be described in detail later.
Next, in the organizations B and C, the reception device 102 outputs the credit score calculated in step S1013 to the transmission device 101, and then the transmission device 101 is used to transmit the credit score to the analysis device 104 (step S1014).
Upon receiving the credit score transmitted from the transmission device 101 of each of the organizations B and C, the analysis device 104 causes the credibility update section 175 to regard the organization A, which has made an analysis request, as the evaluation destination organization, regard the organizations B and C, which have evaluated the analysis result, as evaluation source organizations, and perform a credibility information update process of updating the information indicating the level of credibility from each of the organizations B and C to the organization A (step S1015). The credibility information update process performed in step S1015 will be described in detail later.
When the processing in step S1015 terminates, the process depicted in the flowchart of
The concealment process employed in the information sharing system 1 according to the present embodiment will now be described. The concealment process corresponds to the processing in step S1008 of
It should be noted that, as described with reference to
As described earlier, the level of concealment of analysis information in the concealment process varies depending on the level of credibility between the organizations. Specifically, the level of concealment for each organization is determined by comparing the level of credibility between the organizations with a predetermined threshold. The threshold is predetermined by the concealment policy 132 owned by transmission device 101 of each organization for each type of shared analysis information.
In the analysis device 104, the concealment processing section 173 references the concealment policy 132, which is contained in the analysis request transmitted from any one of the organizations in step S1003 of
Specifically, for example, in the flowchart of
The example of the credibility table 184, which is depicted in
A credibility information update process of updating the information indicating the level of credibility from an organization that has requested the analysis device 104 to make an analysis to an organization that has shared the analysis information will now be described with reference to
The credibility update section 175 performs steps S1102 to S1107 below on each organization listed in the organization information table 182 (step S1101).
First, the credibility update section 175 determines whether an organization targeted for processing has provided the analysis logic 131 to the analysis device 104 in step S1005 of
If it is determined in step S1102 that the relevant organization has provided the analysis logic 131 (“YES” at step S1102), the credibility update section 175 references the credit score table 183, regards an organization that has requested the analysis device 104 to make an analysis, as the evaluation source organization, regards the relevant organization as the evaluation destination organization, and adds the value 1 to the credit score for the combination of these organizations (step S1103). In this instance, the value to be added to the credit score is not limited to 1, but may be more or less than 1. In contrast, if it is determined in step S1102 that the relevant organization has not provided the analysis logic 131 (“NO” at step S1102), the credibility update section 175 does not perform the process of step S1103.
Next, the credibility update section 175 determines whether the analysis information collected from the organization targeted for processing has been used for the analysis performed in step S1009 of
If it is determined in step S1104 that the analysis information collected from the relevant organization has been used for the analysis by the analysis section 174 (“YES” at step S1104), the credibility update section 175 references the credit score table 183, regards an organization that has requested the analysis device 104 to make an analysis, as the evaluation source organization, regards the relevant organization as the evaluation destination organization, and adds the value 1 to the credit score for the combination of these organizations (step S1105). In this instance, the value to be added to the credit score is not limited to 1, but may be more or less than 1.
Next, the credibility update section 175 evaluates how much the analysis information collected from the relevant organization and shared is involved in the analysis (step S1106). For instance, in a case where an analysis is made to find suspicious connection destination IP addresses by using forward proxy access logs, for example, the number of access logs related to the analysis information shared from the relevant organization and the number of suspicious IP addresses contained in the access logs can be used to evaluate the degree of involvement of the analysis information in the analysis. The method of evaluation used in such a case may or may not depend on the analysis logic 131.
Subsequently, based on the result of evaluation in step S1106, the credibility update section 175 determines the value to be added to the credit score indicating the level of credibility from the analysis requesting organization, which has requested the analysis device 104 to make an analysis, to the relevant organization, and updates the credit score table 183 by using the determined value to be added (step S1107). In this instance, if the value indicating the result of evaluation in step S1106 is low, the value to be added to the credit score may be 0, or may be set as a negative value to subtract from the credit score.
In contrast, if it is determined in step S1104 that the relevant organization has not provided the analysis logic 131 (“NO” at step S1102), the credibility update section 175 does not perform the process of steps S1105 to S1107.
After exiting the loop in step S1101, the credibility update section 175 normalizes the credit score determined between the organizations to calculate the level of credibility (step S1108). In this instance, the credit score between the organizations is multiplied by a predetermined coefficient to achieve normalization and calculate the credibility so that the levels of credibility between all the organizations are in the range of 0 to 1. When the values of credibility calculated here are recorded in the credibility table 184, the latest reliability scores recorded in the credit score table 183 is reflected to update the credibility table 184.
In the analysis device 104, the credibility update section 175 performs the above-described process of updating the credibility information indicating the level of credibility from an analysis requesting organization to an information sharing organization. As a result, the credibility recorded in the credibility table 184 can be updated for each organization in accordance with the history of provision of the analysis logic 131 from each organization and the degree of contribution of analysis information from each organization to the analysis performed by the analysis section 174. It should be noted that the flowchart of
The credit score calculation process will now be described in detail with reference to
It should be noted that the credit score calculation process depicted in
First, the analysis result evaluation section 152 determines whether the analysis information transmitted from the relevant organization to the analysis device 104 for sharing purposes leaked (step S1201). This determination is made by using, for example, a declaration from an organization that has provided the analysis logic 131 to the analysis device 104, a declaration from an organization that has requested the analysis device 104 to make an analysis, or reports from the other organizations.
If it is determined in step S1201 that the shared analysis information is leaked (“YES” at step S1201), the analysis result evaluation section 152 subtracts the value 1 from the credit score indicating the level of credibility from the relevant organization to an organization that has requested the analysis device 104 to make an analysis (step S1202). The value to be subtracted from the credit score is not limited to 1, but may be more or less than 1. The initial value of the credit score is, for example, 0. The credit score may be negative when a certain value is subtracted from the initial value. In contrast, if it is determined in step S1201 that the shared analysis information is not leaked (“NO” at step S1201), the analysis result evaluation section 152 does not perform the process of step S1202.
Next, the analysis result evaluation section 152 determines whether the result of analysis by the analysis device 104 is useful for the own organization (step S1203).
If it is determined in step S1104 that the result of analysis is useful for the own organization (“YES” at step S1203), the analysis result evaluation section 152 adds a predetermined value to the credit score indicating the level of credibility from the relevant organization to an organization that has requested the analysis device 104 to make an analysis (step S1204). The value to be added in this instance may be a preset value, or may be determined based on the level of usefulness of the result of analysis in the own organization.
It should be noted that the flowchart of
The following describes a process of updating the credibility information indicating the level of credibility from an information sharing organization to an organization that has requested the analysis device 104 to make an analysis. This process corresponds to step S1015 of
Upon receiving the credit score from the transmission device 101 of each organization that has shared the analysis information, the credibility update section 175 updates the credit score table 183 by using the received credit score. In this instance, the credibility update section 175 regards an organization that has transmitted the credit score, as the evaluation source organization, regards an organization that has requested the analysis device 104 to make an analysis, as the evaluation destination organization, and adds the received credit score to the credit score in a field corresponding to the combination of these organizations.
Next, the credibility update section 175 normalizes the credit score by using the updated credit score table 183, and stores the result of normalization in the credibility table 184. In this instance, the credit score is normalized to calculate the level of credibility in the same manner as in step S1108 of
In the analysis device 104, the credibility update section 175 performs the above-described process of updating the credibility information indicating the level of credibility from an information sharing organization to an analysis requesting organization in accordance with the credit score that is calculated by each organization in the credit score calculation process depicted in
The following describes an example of the method for determining the level of credibility when a new organization enters the information sharing system 1 according to the present embodiment.
Here, it is assumed that an organization N newly joins the information sharing system 1 with an introduction from the organization A, which is already a member of the information sharing system 1. In this case, it is conceivable that there is already a certain level of credibility between the organizations A and N. Therefore, the level of credibility between the organization A and the newly joining organization N can be set on the assumption that the administrator of the organization A decides the level of credibility from the organization A to the organization N, and that the administrator of the organization N decides the level of credibility from the organization N to the organization A.
However, the above-described credibility determination method cannot be used between the newly joining organization N and an organization other than the organization A. Therefore, the following describes a method that uses the credibility set between the organizations A and N in order to determine the level of credibility between the organization N and an organization other than the organization A, which is already a member of the information sharing system 1.
When a target organization for which the level of credibility from the organization N is to be determined is an organization X, the level of credibility from the organization X to the organization A is TX to A, and the level of credibility from the organization A to the organization N is TA to N, the level of credibility TX to N from the organization X to the organization Nis calculated, for example, by Equation (1) below.
Further, when the level of credibility from the organization A to the organization X is TA to X, and the level of credibility from the organization N to the organization A is TN to A, the level of credibility TN to X from the organization N to the organization X is calculated, for example, by Equation (2) below.
It should be noted that the level of credibility TX to N from the organization X to the organization N, which is calculated by Equation (1), and the level of credibility TN to X from the organization N to the organization X, which is calculated by Equation (2), may be adjusted as needed by multiplying the right sides of Equations (1) and (2) above by a predetermined coefficient.
An analysis request screen will now be described with reference to
The disclosable data 1302 is displayed in an area that displays the contents of the logic information table 181. When making an analysis request to the analysis device 104, the administrator of each organization can determine the details of analysis by selecting an appropriate analysis logic 131 in accordance with the information displayed as the disclosable data 1302.
An analysis result display screen will now be described with reference to
The analysis result selection section 1402 allows the administrator of each organization to select the analysis result to be displayed. For example, the storage device 114 included in the transmission device 101 of each organization stores previous analysis results under a name that is formed by a set of numerals joined by an underscore to uniquely identify the date of analysis execution and the result of analysis. By selecting an appropriate name, the administrator can display a desired analysis result on the analysis result display screen 1401.
The analysis result display area 1403 displays the details of an analysis result. For example, the result of analysis of suspicious IP addresses is presented by a graph that indicates the level of suspiciousness of each suspicious IP address as depicted in
An organization information edit screen will now be described with reference to
The logic information edit section 1502 is displayed in an area that is used by the administrator to edit the logic information table 181, which stores the information regarding the analysis logic 131, in accordance with the contents of changes made when the analysis logic 131 is newly developed by the own organization or the existing analysis logic 131 is changed by the own organization. The analysis logic 131 displayed in this area concerns only the contents that are described in the logic information table 181 stored in the storage device 164 included in the analysis device 104 and are related to the analysis logic 131 owned by the relevant organization. This area does not display the analysis logic 131 of the other organizations.
The concealment policy edit section 1503 is displayed in an area that is used by the administrator to edit the concealment policy 132 of the own organization. This area displays the contents of the concealment policy 132 owned by the relevant organization.
The organization information edit section 1504 is displayed in an area that is used by the administrator to edit the organization information table 182 of the own organization. The organization information displayed in this area concerns only the contents that are described in the organization information table 182 stored in the storage device 164 included in the analysis device 104 and are related to the relevant organization. This area does not display the information of the other organizations.
The first embodiment of the present invention, which has been described above, provides the following operational advantages.
The information sharing system according to a second embodiment of the present invention will now be described with reference to
As depicted in
Except those as described above, the configurations and functions of the transmission device 101 and reception device 102 owned by each organization forming the information sharing system 1A and the configuration and functions of the analysis device 104 are similar to those in the information sharing system 1 according to the first embodiment.
According to the second embodiment of the present invention, which has been described above, the multiple organizations forming the information sharing system 1A each own the concealment processing section 173, the transmission device 101, and the reception device 102. The concealment processing section 173 of each organization collects and conceals the analysis information of the relevant organization. The transmission device 101 of each organization transmits the concealed analysis information to the analysis device 104, which is connected through the network 103 and the Internet 106, which act as communication lines. The analysis device 104 includes the analysis section 174 and the information transmission section 172, and collects the concealed analysis information by receiving the analysis information transmitted from the transmission device 101 of each of the multiple organizations. The reception device 102 of each organization receives the analysis result transmitted from the analysis device 104. Accordingly, it is possible to implement the information sharing system 1A that conceals the analysis information before being shared by each organization and allows each organization to share the analysis result.
The information sharing system according to a third embodiment of the present invention will now be described with reference to
The transmission device 101 owned by each of the organizations A to C includes the concealment processing section 173, as is the case with the transmission device 101 of the information sharing system 1A according to the second embodiment. In other respects, the configurations and functions of the transmission device 101 and reception device 102 of each of the organizations A to C and the configuration and functions of the analysis device 104 of the organization D are similar to those in the information sharing system 1 according to the first embodiment. It should be noted that the analysis device 104 may be owned by any one of the organizations A to C.
The difference between the information sharing system 1B according to the third embodiment and the information sharing systems 1 and 1A described in conjunction with the first and second embodiments, respectively, is the starting point at which the analysis device 104 begins to perform the analysis process. Specifically, the first and second embodiments perform the analysis process when a certain organization requests the analysis device 104 to make an analysis. However, the third embodiment performs the analysis process when a certain organization determines that a detailed analysis needs to be made based on the shared analysis information. More specifically, firstly, each time the analysis information owned by an organization is updated, the organization provides the updated analysis information to the other organizations for sharing purposes. The analysis information shared between the multiple organizations in this manner is hereafter referred to the “shared analysis information.” Next, when an organization views the shared analysis information provided from another organization and determines that an analysis needs to be made, the organization requests the analysis device 104 to make an analysis. Subsequently, the third embodiment starts to perform the processing as depicted in the flowchart of
In contrast, when an organization views the shared analysis information provided from another organization and determines that no analysis is required, the organization may extract the internally owned analysis information that is associated with the shared analysis information (hereinafter referred to as the “associated analysis information”) and return the extracted associated analysis information to an organization that has provided the shared analysis information. In this case, by using the associated analysis information returned from the organization that has determined that no analysis is required, the organization that has provided the shared analysis information may perform the credibility update process on the relevant organization. In a situation where the credibility update process is performed in the above manner, even if another organization has determined that no analysis is required, the organization that has initially provided the shared analysis information is able to obtain a benefit by acquiring, as the associated analysis information, the analysis information highly associated with the shared analysis information owned by the relevant organization. Further, the organization that has returned the associated analysis information can expect an improvement in the credibility to the own organization, and is thus able to conduct advantageous information transactions from next time on. As a result, it is expected that information sharing between the multiple organizations will be further promoted.
The processing performed by the information sharing system 1B according to the third embodiment will now be outlined with reference to
Upon detecting that the analysis information to be shared with the other organizations is added or updated, the transmission device 101 of the organization A starts to perform the processing depicted in the flowchart of
When the processing starts in step S1801, the transmission device 101 of the organization A requests the concealment definition table 185 from the analysis device 104 (step S1802).
Upon receiving a request for the concealment definition table 185 from the transmission device 101 of the organization A, the analysis device 104 transmits the concealment definition table 185 to the organization A (step S1803).
When the concealment definition table 185 is transmitted from the analysis device 104, the organization A causes the reception device 102 to receive the concealment definition table 185, and outputs the concealment definition table 185 to the transmission device 101. The transmission device 101 conceals the analysis information possessed by the own organization, by using the received concealment definition table 185, and creates a group of concealed analysis information (concealed information group), which is concealed at a concealment level that varies from one organization to another (step S1804).
Next, the transmission device 101 of the organization A transmits, to the analysis device 104, the concealed information group, which has been created in step S1804, and credibility threshold information regarding the level of credibility to the analysis information, which is determined by referencing the concealment policy 132 (step S1805).
Upon receiving the above-mentioned items of information from the transmission device 101 of the organization A, the analysis device 104 uses the credibility table 184, the organization information table 182, and the received credibility threshold information to divide the concealed information group, which is provided from the organization A, into analysis information (concealed information) concealed at a concealment level appropriate for the level of credibility from the organization A to each of the other organizations, and transmits the resulting analysis information to each organization other than the organization A as the shared analysis information provided by the organization A (step S1806). For example, for the organization B, the level of credibility from the organization A to the organization B is determined from the credibility table 184, and the level of concealment from the organization A to the organization B is determined in accordance with the above-mentioned level of credibility and with the credibility threshold information received from the organization A. Then, the concealed information concealed at the determined level of concealment is extracted from the concealed information group and transmitted to the reception device 102 of the organization B as the shared analysis information. In this instance, the information at the transmission destination is identified by acquiring the connection destination IP address of the organization B from the organization information table 182. For the organization C, too, the concealed information serving as the shared analysis information is transmitted from the analysis device 104 to the reception device 102 by following the same procedure as described above. That is to say, in the analysis device 104, the information transmission section 172 transmits, to the organizations B and C, information that is concealed by the concealment processing section 173 of the organization A at a concealment level that varies from one organization to another based on the level of credibility, and allows each organization to share the concealed information. As a result, the analysis information concealed at a concealment level that varies from one organization to another based on the level of credibility between the organizations can be transmitted from the analysis device 104 to each organization and shared between the organizations. In this instance, as is the case with step S1011 of
When the reception device 102 receives the concealed information (shared analysis information), which has been transmitted from the analysis device 104 (step S1807), the organizations B and C may view the received information and make an analysis at the discretion of each organization.
In the above instance, the organizations B and C may perform the process of evaluating the received concealed information (shared analysis information) and updating the credibility. In such a case, the organizations B and C determine whether the received shared analysis information is useful for the own organizations. If the result of such determination indicates that the shared analysis information is useful for the own organizations, a predetermined value is added to the credit score indicating the level of credibility from the organizations B and C to the organization A, which is a shared analysis information provider. The value to be added in this case may be a preset value, or may be determined based on the level of usefulness of the shared analysis information in the own organization. When the credit score determined in the above-described manner is transmitted from the organizations B and C to the analysis device 104, the analysis device 104 performs the credibility information update process.
Subsequently, the organizations B and C each determine whether the received concealed information (shared analysis information) needs to be analyzed in more detail. If the result of such determination indicates that, for example, the organization C needs to make a more detailed analysis in step S1807, the transmission device 101 of the organization C requests the logic information from the analysis device 104 (step S1808), as is the case with step S1001 of
When the reception device 102 of the organization C receives the logic information table 181, the organization C references the logic information listed in the logic information table 181, and determines which executable analysis is to be made by the analysis device 104. After determination, the transmission device 101 of the organization B generates an analysis request, and transmits the generated analysis request to the analysis device 104 to request the analysis device 104 to make an analysis (step S1810).
Subsequently, the information sharing system 1B performs an analysis process (step S1811). In the analysis process, processing is performed in a manner similar to the processing in steps S1004 to S1015 of
The processing in steps S1901 to S1907 is the same as the processing in steps S1801 to S1807 of
The transmission device 101 of the organization B requests the concealment definition table 185 from the analysis device 104 (step S1908).
Upon receiving the request for the concealment definition table 185 from the transmission device 101 of the organization B, the analysis device 104 transmits the concealment definition table 185 to the organization B (step S1909).
When the concealment definition table 185 is transmitted from the analysis device 104, the organization B receives the concealment definition table 185 by using the reception device 102, and outputs the concealment definition table 185 to the transmission device 101. The transmission device 101 causes the concealment processing section 173 to conceal the related analysis information retained by the own organization a number of times at different levels of concealment, through the use of the received concealment definition table 185, and creates a group of concealed related analysis information (concealed related analysis information group) (step S1910).
Next, the transmission device 101 of the organization B transmits, to the analysis device 104, the concealed related analysis information group, which has been created in step S1910, and the credibility threshold information, which has been obtained by referencing the concealment policy 132 (step S1911).
Upon receiving the above-mentioned items of information from the transmission device 101 of the organization B, the analysis device 104 selects, from the concealed related analysis information group provided from the organization B, the concealed related analysis information indicating a concealment level appropriate for the level of credibility from the organization B to the organization A by using the credibility table 184, the organization information table 182, and the received credibility threshold information, and then transmits the selected concealed related analysis information to the organization A (step S1912).
The concealed related analysis information transmitted from the analysis device 104 is received by the reception device 102 owned by the organization A (step S1913).
Having received the concealed related analysis information, the organization A may use the received concealed related analysis information to perform the process of updating the level of credibility from the organization A to the organization B. In this case, the credibility is updated by the processing similar to the processing in steps S1012 to S1015 of
According to the third embodiment of the present invention, which has been described above, the multiple organizations forming the information sharing system 1B each own the concealment processing section 173, the transmission device 101, and the reception device 102. The concealment processing section 173 of each organization collects and conceals the analysis information of the relevant organization. The transmission device 101 of each organization transmits the concealed analysis information to the analysis device 104 that is connected through the networks 103 and 105 and the Internet 106, which act as communication lines. The analysis device 104 includes the analysis section 174 and the information transmission section 172, collects the concealed analysis information by receiving the analysis information transmitted from the transmission device 101 of each of the multiple organizations, and transmits the concealed analysis information, which is collected from each organization, to the other organizations. The reception device 102 of each organization receives the concealed analysis information and the analysis result, which are transmitted from the analysis device 104. Accordingly, it is possible to implement the information sharing system 1B that enables each organization to determine, based on the shared analysis information concealed by the other organizations, whether an analysis is required, make an analysis by using the analysis device 104 if it is determined that the analysis is required, and feed back the related information even if it is determined that no analysis is required.
Further, the transmission device 101 of each organization transmits, to the analysis device 104, the related analysis information that is included in the internally owned analysis information and related to concealed shared analysis information provided from the other organizations and transmitted by the analysis device 104. The information transmission section 172 transmits, to an organization that is among the multiple organizations and is the source of providing the concealed shared analysis information, the related analysis information transmitted from the transmission device 101 of each organization other than the relevant organization. In this instance, the information transmission section 172 transmits, at a concealment level appropriate for the level of credibility, the concealed related analysis information, which is transmitted from the transmission device 101 of each of the multiple organizations, to the organization acting as the source of providing the concealed shared analysis information. Accordingly, it is possible to implement the information sharing system 1B that is able to further promote information sharing between the multiple organizations.
The information sharing system according to a fourth embodiment of the present invention will now be described with reference to
The transmission device 101 owned by each of the organizations A to C includes the concealment processing section 173, as is the case with the transmission device 101 of the information sharing systems 1A and 1B according to the second and third embodiments. Further, the reception device 102 owned by each of the organizations A to C includes the analysis section 174, which is included in the analysis device 104 in the foregoing embodiments. In other respects, the configurations and functions of the transmission device 101 and reception device 102 of the organizations A to C and the configuration and functions of the analysis device 104 of the organization D are similar to those in the information sharing system 1 according to the first embodiment. It should be noted that the analysis section 174 may alternatively be included in the transmission device 101 of the organizations A to C.
The difference between the information sharing system 1C according to the fourth embodiment and the information sharing systems 1, 1A, and 1B described in conjunction with the first to third embodiments, respectively, is that the analysis section 174 makes an analysis by using the analysis information retained by a single organization instead of the analysis information retained by the multiple organizations. Specifically, the fourth embodiment initially causes a single organization to make an analysis by using the analysis logic acquired from one or more organizations, conceals the result of the analysis, and allows the multiple organizations to share the concealed analysis result. Subsequently, the fourth embodiment evaluates the analysis result by using the method described in conjunction with the first embodiment, and performs the credibility update process.
The processing performed by the information sharing system 1C according to the fourth embodiment will now be outlined with reference to
First, the transmission device 101 owned by the organization A requests the logic information from the analysis device 104 (step S2101).
Upon receiving the request for the logic information from the transmission device 101 of the organization A, the analysis device 104 causes the information transmission section 172 to transmit the logic information table 181 to the reception device 102 of the organization A (step S2102).
When the reception device 102 of the organization A receives the logic information table 181, the organization A references the logic information listed in the logic information table 181, and determines which analysis is to be made. After determination, the transmission device 101 of the organization A transmits information for identifying the analysis logic 131 for use in analysis to the analysis device 104, and attempts to acquire the analysis logic 131 (step S2103).
Upon receiving the analysis logic 131 transmitted from the transmission device 101 of the organization A, the analysis device 104 causes the request transmission section 171 to identify the analysis logic 131 for use in analysis and the organization retaining such analysis logic in accordance with the received information and the logic information table 181. Then, the analysis device 104 determines the connection destination of the identified organization by using the organization information table 182, and requests the determined connection destination to transmit the analysis logic 131 (step S2104).
Upon receiving the request for the transmission of the analysis logic 131 from the analysis device 104, the transmission device 101 of the organization C causes the analysis logic transmission section 123 to transmit the analysis logic 131 stored in the storage device 114 to the analysis device 104 (step S2105).
Upon receiving the analysis logic 131 transmitted from the transmission device 101 of the organization C, the analysis device 104 transmits the received analysis logic 131 to the organization A.
Upon receiving the analysis logic 131 transmitted from the analysis device 104, the reception device 102 of the organization A causes the analysis section 174 to make the analysis determined in step S2103 by using the received analysis logic 131 and the analysis information retained by the own organization (step S2106).
Next, the transmission device 101 of the organization A requests the concealment definition table 185 from the analysis device 104 (step S2107).
Upon receiving the request for the concealment definition table 185 from the transmission device 101 of the organization A, the analysis device 104 transmits the concealment definition table 185 to organization A (step S2108).
When the concealment definition table 185 is transmitted from the analysis device 104, the organization A causes the reception device 102 to receive the concealment definition table 185, and outputs the received concealment definition table 185 to the transmission device 101. The transmission device 101 causes the concealment processing section 173 to conceal the analysis result, which has been obtained in step S2106, by using the received concealment definition table 185 in accordance with the level of credibility between the organizations, and create a group of analysis results (concealed analysis result group), which is concealed at a concealment level that varies from one organization to another (step S2109).
Next, the transmission device 101 of the organization A transmits, to the analysis device 104, the concealed analysis result group, which has been created in step S2109, and the credibility threshold information, which has been obtained by referencing the concealment policy 132 and is related to the level of credibility to the analysis information used for analysis. (step S2110).
Upon receiving the above-mentioned items of information from the transmission device 101 of the organization A, the analysis device 104 uses the credibility table 184, the organization information table 182, and the received credibility threshold information to divide the concealed analysis result group, which is provided from the organization A, into analysis results (concealed analysis results) concealed at a concealment level appropriate for each organization, and transmits the concealed analysis results to each organization other than the organization A (step S2111). That is to say, the analysis device 104 causes the information transmission section 172 to transmit, to the organizations B and C, the analysis results, which are concealed, based on the level of credibility, by the concealment processing section 173 of the organization A at a concealment level that varies from one organization to another, and allows each organization to share the concealed analysis results. As a result, the concealed analysis results, which are concealed, based on the level of credibility between the organizations, at a concealment level that varies from one organization to another, can be transmitted from the analysis device 104 to each organization and shared between the organizations. In this instance, as is the case with step S1011 of
The reception device 102 of each of the organizations B and C receives the concealed analysis results transmitted from the analysis device 104 (step S2112).
Subsequently, the information sharing system 1C performs the credibility update process (step S2113). In this credibility update process, the processing similar to the processing in steps S1013 to S1015 of
According to the fourth embodiment of the present invention, which has been described above, the multiple organizations forming the information sharing system 1C each own the concealment processing section 173, the analysis section 174, the transmission device 101, and the reception device 102. The analysis section 174 of each organization makes an analysis by using the analysis information retained by the relevant organization. The concealment processing section 173 of each organization conceals the result of analysis performed by the analysis section 174 of the relevant organization. The transmission device 101 of each organization transmits the concealed analysis results to the analysis device 104 that is connected through the networks 103 and 105 and the Internet 106, which act as communication lines. The analysis device 104 includes the information transmission section 172, and transmits the concealed analysis results, which are transmitted from the transmission device 101 of each of the multiple organizations, to the other organizations. That is to say, the information transmission section 172 transmits, to any one or more of the multiple organizations, the information concealed, based on the level of credibility, by the concealment processing section 173 of any one of the multiple organizations at a concealment level that varies from one organization to another, and allows each organization to share the concealed information. The reception device 102 of each organization receives the concealed analysis results transmitted from the analysis device 104. Accordingly, it is possible to implement the information sharing system 1C that is able to achieve even more secure information sharing by allowing each organization to make an analysis based on its own analysis information, conceal the result of analysis, and share the concealed result of analysis with the other organizations.
The information sharing system according to a fifth embodiment of the present invention will now be described with reference to
The difference between the fifth embodiment and the third embodiment lies in the processing performed in a phase (step S1806 of
It is preferable that the above-mentioned index make it possible to determine, before the concealed analysis information is provided to each organization, whether it is worth providing the concealed analysis information to each organization. In the fifth embodiment, for example, the degree of similarity between the analysis information provided by the organization A and the analysis information retained by each organization is used as the above-mentioned index. In this instance, if the degree of similarity between the analysis information provided by the organization A and the analysis information originally retained by another organization is high, it is highly probable that the relevant organization has an issue common to the organization A and has analysis information highly related to the organization A. Therefore, when the index representing the degree of similarity between the relevant analysis information and the analysis information retained by each organization is introduced in a situation where the level of concealment of analysis information to be transmitted from the analysis device 104 to each organization is to be determined, it is possible to evaluate whether the above-mentioned related analysis information received by the organization A acting as an information provider from each organization, is highly likely to be beneficial to the organization A. If there is an organization that retains analysis information with a high degree of similarity, and the related analysis information fed back from the relevant organization to the organization A after the shared analysis information is provided to the relevant organization from the organization A is highly likely to be beneficial to the organization A, the organization A can allow the sharing of analysis information with a low level of concealment with the relevant organization in order to obtain a benefit even if the credibility to the relevant organization is somewhat low.
In a case, for example, where the organization A attempts to share information regarding a suspicious IP address with the other organizations B and C, the suspicious IP address list retained by the organization A is compared with the access logs of the organizations B and C to determine the degree of similarity between them. If, for example, the access log of the organization B has a high degree of similarity to the suspicious IP address list of the organization A, it signifies that the organization B receives many communications from access destinations common to the organization A. Therefore, it is highly probable that the related analysis information returned as feedback from the organization B in response to the provision of shared analysis information from the organization A will be useful to the organization A. Further, the information regarding a suspicious IP address that is provided from the organization A to the organizations B and C as the shared analysis information is useful information for the organization B, which retains information highly similar to such information regarding a suspicious IP address. Consequently, it is expected that the level of credibility between the organizations A and B will improve, and that they will share more beneficial information from next time on.
When the concealed information group created in step S2204 and the credibility threshold information obtained by referencing the concealment policy 132 are received from the transmission device 101 of the organization A, the analysis device 104 causes the information transmission section 172 to search the organizations other than the organization A for information similar to the concealed information group received from the organization A. In this instance, for example, a well-known secret search technique capable of conducting a search while keeping the details of the search secret by encryption may be used to search for information similar to the analysis information. As a result, for an organization from which the information similar to the concealed information group is retrieved, the degree of similarity between these items of information is calculated (step S2206). In contrast, for an organization from which the information similar to the concealed information group is not retrieved, the degree of similarity is calculated as 0.
Next, by using the credibility table 184, the organization information table 182, the credibility threshold information received from the organization A, and the degree of similarity calculated in step S2206, the analysis device 104 causes the information transmission section 172 to divide the concealed information group, which is provided from the organization A, into pieces of analysis information (concealed information) that are concealed at a concealment level appropriate for the level of credibility from the organization A to the other organizations and for the degree of information similarity between the organization A and the other organizations, and transmit the resulting information to each organization other than the organization A as the shared analysis information provided by the organization A (step S2207). In this instance, whether the level of concealment based on the degree of similarity is to be adopted in accordance with the level of credibility may be determined. For example, for an organization that is judged to have low credibility, the determination is made by using the degree of similarity, and if the degree of similarity is judged to be high, the analysis information having a low concealment level (highly sensitive analysis information) is transmitted to such organization even if the credibility is low (step S2207). Further, in the above instance, as is the case with step S1011 of
When the reception device 102 receives the concealed information (shared analysis information) transmitted from the analysis device 104 (step S2208), the organizations B and C may each view the received information and make an analysis in accordance with the determination made by each organization. Subsequently, the organizations B and C examine the received concealed information (shared analysis information) to determine whether it requires a more detailed analysis, and performs processing based on the result of determination (step S2209). In this case, if it is determined that a more detailed analysis is required, the organizations B and C perform the processing similar to the processing in steps S1808 to S1811 of
According to the fifth embodiment of the present invention, which has been described above, the multiple organizations forming the information sharing system 1B each own the concealment processing section 173, the transmission device 101, and the reception device 102. The concealment processing section 173 of each organization collects and conceals the analysis information retained by the relevant organization. The transmission device 101 of each organization transmits the concealed analysis information to the analysis device 104 that is connected through the networks 103 and 105 and the Internet 106, which act as communication lines. The analysis device 104 includes the analysis section 174 and the information transmission section 172, collects the concealed analysis information by receiving the analysis information transmitted from the transmission device 101 of the multiple organizations, and transmits the concealed analysis information, which is collected from each organization, to the other organizations. The reception device 102 of each organization receives the concealed analysis information and analysis results, which are transmitted from the analysis device 104. Further, the information transmission section 172 calculates the degree of similarity between the analysis information concealed by the concealment processing section 173 of each organization and the analysis information owned by each of the multiple organizations, and transmits the concealed analysis information, which is concealed at a concealment level appropriate for the level of credibility and the degree of similarity, to any one or more of the multiple organizations. Accordingly, the information sharing system 1B is able to transmit the analysis information, which is provided from any one of the multiple organizations, to the other organizations at an appropriate concealment level. For example, even if the level of credibility from an organization providing the analysis information to an organization receiving the analysis information is low, the provided analysis information is compared with the analysis information retained by the organization that receives the provided analysis information, and then the degree of similarity between the compared items of analysis information is calculated. As a result, the multiple organizations are able to share information at a low concealment level and in an easier-to-use manner.
Moreover, as is the case with the third embodiment, each organization is able to determine, based on the shared analysis information concealed by the other organizations, whether an analysis is required, and if it is determined that the analysis is required, each organization is able to perform the analysis by using the analysis device 104. In contrast, even if it is determined that the analysis is not required, it is possible to implement an information sharing system that is able to provide feedback of the related information.
It should be noted that the present invention is not limited to the above-described embodiments and modifications, and can be implemented by using appropriate component elements without departing from the spirit and scope of the present invention. Further, the above-described embodiments and modifications can be implemented in any appropriate combination.
The above-described embodiments and modifications are merely examples, and the present invention is not limited to above-described embodiments and modifications as long as the characteristics of the present invention are not impaired. Furthermore, although various embodiments and modifications have been described above, the present invention is not limited to the above-described embodiments and modifications. Other aspects conceivable within the scope of the technical idea of the present invention are also included within the scope of the present invention.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2021/048972 | 12/28/2021 | WO |