ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング


インデックスリンク

インデックスツリー

  • RootNode

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 国際会議
  2. CollabTech
  3. 2012

Cybersecurity Incident Management through Collaborative Security Log Analysis System

https://ipsj.ixsq.nii.ac.jp/records/87908
https://ipsj.ixsq.nii.ac.jp/records/87908
9f782fd8-3750-4fcf-8af2-b7aabacee27d
名前 / ファイル ライセンス アクション
IPSJ-CollabTech2012026.pdf IPSJ-CollabTech2012026.pdf (848.8 kB)
Copyright (c) 2012 by the Information Processing Society of Japan
オープンアクセス
Item type International Conference(1)
公開日 2012-08-27
タイトル
タイトル Cybersecurity Incident Management through Collaborative Security Log Analysis System
タイトル
言語 en
タイトル Cybersecurity Incident Management through Collaborative Security Log Analysis System
言語
言語 eng
キーワード
主題Scheme Other
主題 Information Security
キーワード
主題Scheme Other
主題 CSCW
キーワード
主題Scheme Other
主題 Log Analysis
キーワード
主題Scheme Other
主題 Visualization
キーワード
主題Scheme Other
主題 Digital Forensic
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
Graduate School of Science and Technology Keio University
著者所属
Graduate School of Science and Technology Keio University
著者所属
Graduate School of Science and Technology Keio University/JST Japan
著者所属(英)
en
Graduate School of Science and Technology Keio University
著者所属(英)
en
Graduate School of Science and Technology Keio University
著者所属(英)
en
Graduate School of Science and Technology Keio University / JST Japan
著者名 Hiroshi, Kure Chifumi, Nishioka Ken-ichiOkada

× Hiroshi, Kure Chifumi, Nishioka Ken-ichiOkada

Hiroshi, Kure
Chifumi, Nishioka
Ken-ichiOkada

Search repository
著者名(英) Hiroshi, Kure Chifumi, Nishioka Ken-ichi, Okada

× Hiroshi, Kure Chifumi, Nishioka Ken-ichi, Okada

en Hiroshi, Kure
Chifumi, Nishioka
Ken-ichi, Okada

Search repository
論文抄録
内容記述タイプ Other
内容記述 This paper describes the design and implementation of a new collaborative security log analysis system, which supports two analysts to rapidly analyze security log in cybersecurity incident management. The system allows a collaborative analysis through two application windows implemented on an interactive whiteboard, a window to support selecting an IDS alert and assigning analysts to the alert’s relative information equipments and a windowto support analyzing security log to identify the cause of an incident. With these windows, analysts specialized in different information equipments can effectively share and discuss their current situation of analysis and expert knowledge for a rapid investigation of the incident. Lastly, we conducted an experiment to evaluate the proposed system and quantitative results show improved analysis time with the proposed system.
論文抄録(英)
内容記述タイプ Other
内容記述 This paper describes the design and implementation of a new collaborative security log analysis system, which supports two analysts to rapidly analyze security log in cybersecurity incident management. The system allows a collaborative analysis through two application windows implemented on an interactive whiteboard, a window to support selecting an IDS alert and assigning analysts to the alert’s relative information equipments and a windowto support analyzing security log to identify the cause of an incident. With these windows, analysts specialized in different information equipments can effectively share and discuss their current situation of analysis and expert knowledge for a rapid investigation of the incident. Lastly, we conducted an experiment to evaluate the proposed system and quantitative results show improved analysis time with the proposed system.
書誌情報 Proceedings of The Sixth International Conference on Collaboration Technologies

巻 2012, p. 127-132, 発行日 2012-08-27
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-21 17:00:39.533450
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

Ken-ichiOkada, 2012: 情報処理学会, 127–132 p.

Loading...

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3