{"id":10323,"updated":"2025-01-23T02:54:22.533185+00:00","links":{},"created":"2025-01-18T22:45:15.912018+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00010323","sets":["581:612:621"]},"path":["621"],"owner":"1","recid":"10323","title":["不正侵入調査を目的とした複数ログの時系列視覚化システム"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-04-15"},"_buckets":{"deposit":"a77674fe-9681-4fdd-b4db-fc6df3826632"},"_deposit":{"id":"10323","pid":{"type":"depid","value":"10323","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"不正侵入調査を目的とした複数ログの時系列視覚化システム","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"不正侵入調査を目的とした複数ログの時系列視覚化システム"},{"subitem_title":"A Visualization System of Multiple Logs with Timelines for Intrusion Analysis","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:再考分散システム/インターネットの運用・管理","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2006-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学大学院情報システム学研究科"},{"subitem_text_value":"電気通信大学大学院情報システム学研究科"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Systems University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Systems University of Electro-Communications","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/10323/files/IPSJ-JNL4704012.pdf"},"date":[{"dateType":"Available","dateValue":"2008-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4704012.pdf","filesize":[{"value":"1.8 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"2be4c9d1-86d8-4048-b48f-9d74d578681a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2006 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"江端, 真行"},{"creatorName":"小池, 英樹"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masayuki, Ebata","creatorNameLang":"en"},{"creatorName":"Hideki, Koike","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"不正侵入検知において最も基本的なタスクとして“ログの調査” がある.近年では,計算機やセキュリティ機器の増加にともない,複数のログを対象とし多面的に不正侵入の調査を行うことが必要となってきている.しかし,依然としてログの調査手法はテキストベースで行われていることが多く,複数のログの調査手法としては非効率であるといえる.我々は,複数のログに対して事象の出現頻度を基に時系列に視覚化し,調査支援を行うシステムを構築した.また,本システムをハニーポットのログの調査に適用し,その有効性を示した.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Log analysis is one of the most fundamental task of intrusion detection. In recent years, since a number of computers and network security devices increases, it is required to analyze multiple logs produced by them. However, log analysis is done with text-based techniques and it is inefficient for analyzing of multiple logs. We developed a visualization system for analysis of multiple logs which visualizes the frequency of events by timeline. We analysed logs produced by a honeypot by using the system, and showed its effectiveness.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1107","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1099","bibliographicIssueDates":{"bibliographicIssueDate":"2006-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"47"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワークセキュリティ"}]},"weko_creator_id":"1"}}