Paper Abstract and Keywords |
Presentation |
2018-07-17 13:25
Study on Estimating Risk in Incident Response by Analyzing Flows of Communication logs Naoko Kosaka, Akira Koyama, Tsuneko Kura, Yoshihiro Yoshida, Koji Kishi (NTT) ICTSSL2018-17 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The emergency management handled by the staffs in decision making and planning layers of the organization can be broadly divided into two cycles. The first is the PDCA cycle including before and after the incident occurrence, which is a relatively long term and consists of preparations before an incident event occurs (Plan), incident response after occurrence (Do), review after action (Check), and improve after review (Action). The second is the OODA loop as the situation of incident response (Do) in the above PDCA cycle changes, which is a relatively short period and consists of surveillance to grasp the current situation (Observe), situation judgment based on information obtained by surveillance (Orient), decision making based on situation judgment (Decide), actions based on policies adopted in decision making (Act). The authors have been researching and developing the system "KADAN®" that supports incident response to complex risks such as natural disasters and cyber-attacks so far. We also validated KADAN® at large international sports events and confirmed its usefulness. In the past verification, it was carried out for part of the PDCA cycle and OODA loop by using KADAN®. In this paper, we consider the method of risk estimation necessary for transition from “Observe” to “Orient” in OODA loop based on analysis of communication log in an incident response. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Emergency Management / OODA Loop / ICS (Incident Command System) / ISO22320 / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 118, no. 132, ICTSSL2018-17, pp. 7-12, July 2018. |
Paper # |
ICTSSL2018-17 |
Date of Issue |
2018-07-10 (ICTSSL) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICTSSL2018-17 |
Conference Information |
Committee |
ICTSSL |
Conference Date |
2018-07-17 - 2018-07-18 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
NTT Musashino R&D Center |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ICTSSL |
Conference Code |
2018-07-ICTSSL |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Study on Estimating Risk in Incident Response by Analyzing Flows of Communication logs |
Sub Title (in English) |
|
Keyword(1) |
Emergency Management |
Keyword(2) |
OODA Loop |
Keyword(3) |
ICS (Incident Command System) |
Keyword(4) |
ISO22320 |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Naoko Kosaka |
1st Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
2nd Author's Name |
Akira Koyama |
2nd Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
3rd Author's Name |
Tsuneko Kura |
3rd Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
4th Author's Name |
Yoshihiro Yoshida |
4th Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
5th Author's Name |
Koji Kishi |
5th Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2018-07-17 13:25:00 |
Presentation Time |
25 minutes |
Registration for |
ICTSSL |
Paper # |
ICTSSL2018-17 |
Volume (vol) |
vol.118 |
Number (no) |
no.132 |
Page |
pp.7-12 |
#Pages |
6 |
Date of Issue |
2018-07-10 (ICTSSL) |
|