WEKO3
-
RootNode
アイテム
Cybersecurity Incident Management through Collaborative Security Log Analysis System
https://ipsj.ixsq.nii.ac.jp/records/87908
https://ipsj.ixsq.nii.ac.jp/records/879089f782fd8-3750-4fcf-8af2-b7aabacee27d
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2012 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | International Conference(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2012-08-27 | |||||||
タイトル | ||||||||
タイトル | Cybersecurity Incident Management through Collaborative Security Log Analysis System | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Cybersecurity Incident Management through Collaborative Security Log Analysis System | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | Information Security | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | CSCW | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | Log Analysis | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | Visualization | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | Digital Forensic | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_5794 | |||||||
資源タイプ | conference paper | |||||||
著者所属 | ||||||||
Graduate School of Science and Technology Keio University | ||||||||
著者所属 | ||||||||
Graduate School of Science and Technology Keio University | ||||||||
著者所属 | ||||||||
Graduate School of Science and Technology Keio University/JST Japan | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Graduate School of Science and Technology Keio University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Graduate School of Science and Technology Keio University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Graduate School of Science and Technology Keio University / JST Japan | ||||||||
著者名 |
Hiroshi, Kure
Chifumi, Nishioka
Ken-ichiOkada
× Hiroshi, Kure Chifumi, Nishioka Ken-ichiOkada
|
|||||||
著者名(英) |
Hiroshi, Kure
Chifumi, Nishioka
Ken-ichi, Okada
× Hiroshi, Kure Chifumi, Nishioka Ken-ichi, Okada
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | This paper describes the design and implementation of a new collaborative security log analysis system, which supports two analysts to rapidly analyze security log in cybersecurity incident management. The system allows a collaborative analysis through two application windows implemented on an interactive whiteboard, a window to support selecting an IDS alert and assigning analysts to the alert’s relative information equipments and a windowto support analyzing security log to identify the cause of an incident. With these windows, analysts specialized in different information equipments can effectively share and discuss their current situation of analysis and expert knowledge for a rapid investigation of the incident. Lastly, we conducted an experiment to evaluate the proposed system and quantitative results show improved analysis time with the proposed system. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | This paper describes the design and implementation of a new collaborative security log analysis system, which supports two analysts to rapidly analyze security log in cybersecurity incident management. The system allows a collaborative analysis through two application windows implemented on an interactive whiteboard, a window to support selecting an IDS alert and assigning analysts to the alert’s relative information equipments and a windowto support analyzing security log to identify the cause of an incident. With these windows, analysts specialized in different information equipments can effectively share and discuss their current situation of analysis and expert knowledge for a rapid investigation of the incident. Lastly, we conducted an experiment to evaluate the proposed system and quantitative results show improved analysis time with the proposed system. | |||||||
書誌情報 |
Proceedings of The Sixth International Conference on Collaboration Technologies 巻 2012, p. 127-132, 発行日 2012-08-27 |
|||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |