{"id":16663,"date":"2023-07-19T23:34:48","date_gmt":"2023-07-19T14:34:48","guid":{"rendered":"https:\/\/begi.net\/news\/?p=16663"},"modified":"2023-07-18T15:35:12","modified_gmt":"2023-07-18T06:35:12","slug":"jpcert-cc%e3%80%81dns%e3%82%92%e4%b8%8d%e6%ad%a3%e4%bd%bf%e7%94%a8%e3%81%99%e3%82%8b%e6%89%8b%e6%b3%95%e3%81%ab%e9%96%a2%e3%81%99%e3%82%8b%e6%8a%80%e8%a1%93%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88","status":"publish","type":"post","link":"https:\/\/begi.net\/news\/archives\/16663.html","title":{"rendered":"JPCERT\/CC\u3001DNS\u3092\u4e0d\u6b63\u4f7f\u7528\u3059\u308b\u624b\u6cd5\u306b\u95a2\u3059\u308b\u6280\u8853\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b"},"content":{"rendered":"<p><A HREF=\"https:\/\/www.jpcert.or.jp\/\">JPCERT\/CC\u306f7\u67086\u65e5\u3001DNS\u306e\u4e0d\u6b63\u4f7f\u7528\u3059\u308b\u624b\u6cd5\u306b\u95a2\u3059\u308b\u6280\u8853\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b\u3057\u305f\u3002JPCERT\u304c\u30e1\u30f3\u30d0\u30fc\u3068\u3057\u3066\u53c2\u52a0\u3057\u3066\u3044\u308bFIRST\u306eDNS Abuse SIG\u304c2\u6708\u306b\u516c\u958b\u3057\u305f\u300cDNS Abuse Techniques Matrix\u300d\u3092\u3001JPCERT\u304c\u4e3b\u4f53\u3068\u306a\u3063\u3066\u4f5c\u6210\u3057\u305f\u65e5\u672c\u8a9e\u7248\u306b\u5f53\u305f\u308b\u3002<\/p>\n<p>\u4eca\u56de\u516c\u958b\u3055\u308c\u305f\u30ec\u30dd\u30fc\u30c8\u306f\u3001\u3053\u308c\u307e\u3067\u516c\u958b\u3055\u308c\u305f\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3068\u306f\u7570\u306a\u308a\u3001DNS\u304c\u4e0d\u6b63\u306b\u4f7f\u7528\u3055\u308c\u308b\u969b\u306e\u3001\u5404\u624b\u6cd5\u306b\u95a2\u9023\u3059\u308b\u30b9\u30c6\u30fc\u30af\u30db\u30eb\u30c0\u30fc\u3092\u691c\u77e5\u3001\u7de9\u548c\u3001\u6291\u6b62\u306e3\u3064\u306e\u30d5\u30a7\u30fc\u30ba\u3054\u3068\u306b\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u5f62\u5f0f\u3067\u307e\u3068\u3081\u3001\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u306e\u7e26\u8ef8\u306b21\u7a2e\u985e\u306e\u624b\u6cd5\u3001\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u306e\u6a2a\u8ef8\u306b\u306f15\u7a2e\u985e\u306e\u95a2\u4fc2\u4e8b\u696d\u8005\u3084\u7d44\u7e54\u3001\u4eba\u7269\u3092\u914d\u7f6e\u3057\u3001\u3069\u306e\u30b9\u30c6\u30fc\u30af\u30db\u30eb\u30c0\u30fc\u304c\u3069\u306e\u3088\u3046\u306a\u65b9\u6cd5\u3067\u691c\u77e5\u3001\u7de9\u548c\u3001\u6291\u6b62\u304c\u3067\u304d\u308b\u30fb\u3067\u304d\u306a\u3044\u3092\u5bb9\u6613\u306b\u5224\u5225\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u3063\u3066\u3044\u308b\u3002<\/p>\n<p>\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306f\u3001DNS\u306e\u4e0d\u6b63\u4f7f\u7528\u306b\u5bfe\u5fdc\u3059\u308b\u30c1\u30fc\u30e0\u3084DNS\u306e\u4e0d\u6b63\u4f7f\u7528\u306b\u95a2\u3059\u308b\u7814\u7a76\u306a\u3069\u306b\u5f79\u7acb\u3066\u308b\u3053\u3068\u304c\u671f\u5f85\u3055\u308c\u3066\u3044\u308b\u3002<\/p>\n<p align=\"right\">(\u5ddd\u539f \u9f8d\u4eba\/\u3073\u304e\u306d\u3063\u3068)<\/p>\n<p><b>[\u95a2\u9023\u30ea\u30f3\u30af]<\/b><br \/>\n<A HREF=\"https:\/\/blogs.jpcert.or.jp\/ja\/2023\/07\/DNS-Abuse-Techniques-Matrix.html\">Blog\u306b\u3088\u308b\u8a18\u4e8b<\/A><br \/>\n<A HREF=\"https:\/\/www.first.org\/global\/sigs\/dns\/DNS-Abuse-Techniques-Matrix_v1.1-ja.pdf\">\u30ec\u30dd\u30fc\u30c8(pdf)<\/A><\/p>\n","protected":false},"excerpt":{"rendered":"<p>JPCERT\/CC\u306f7\u67086\u65e5\u3001DNS\u306e\u4e0d\u6b63\u4f7f\u7528\u3059\u308b\u624b\u6cd5\u306b\u95a2\u3059\u308b\u6280\u8853\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b\u3057\u305f\u3002JPCERT\u304c\u30e1\u30f3\u30d0\u30fc\u3068\u3057\u3066\u53c2\u52a0\u3057\u3066\u3044\u308bFIRST\u306eDNS Abuse SIG\u304c2\u6708\u306b\u516c\u958b\u3057\u305f\u300cDNS Abuse Technique [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-16663","post","type-post","status-publish","format-standard","hentry","category-17"],"_links":{"self":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/16663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/comments?post=16663"}],"version-history":[{"count":1,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/16663\/revisions"}],"predecessor-version":[{"id":16664,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/16663\/revisions\/16664"}],"wp:attachment":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/media?parent=16663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/categories?post=16663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/tags?post=16663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}