{"updated":"2025-01-23T01:45:35.599572+00:00","links":{},"id":12226,"created":"2025-01-18T22:46:38.448282+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00012226","sets":["581:690:695"]},"path":["695"],"owner":"1","recid":"12226","title":["ログ情報視覚化システムを用いた集団監視による不正侵入対策手法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2000-08-15"},"_buckets":{"deposit":"acb5e47f-bb00-4c05-83ba-301e70376ebe"},"_deposit":{"id":"12226","pid":{"type":"depid","value":"12226","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"ログ情報視覚化システムを用いた集団監視による不正侵入対策手法の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ログ情報視覚化システムを用いた集団監視による不正侵入対策手法の提案"},{"subitem_title":"A Proposal of Novel Intrusion Management Using Log Information Visualization Systems by Multiple Users","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:情報セキュリティの理論と応用","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2000-08-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学大学院情報システム学研究科情報システム運用学専攻"},{"subitem_text_value":"電気通信大学大学院情報システム学研究科情報システム運用学専攻"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Systems, University of Electro-communications","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Systems, University of Electro-communications","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/12226/files/IPSJ-JNL4108017.pdf"},"date":[{"dateType":"Available","dateValue":"2002-08-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4108017.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1b9f4d24-20ad-4b1c-ba01-38bbbadb3f36","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2000 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高田, 哲司"},{"creatorName":"小池, 英樹"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tetsuji, Takada","creatorNameLang":"en"},{"creatorName":"Hideki, Koike","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"今日,計算機への不正侵入が大きな問題となっており,すでに様々な対策手法が提案されている.しかし既存の手法には種々の問題点があり,それらが原因となって不正侵入対策の普及は進んでいないといえる.よって既存の対策手法における問題を改善しうる新たな手法が望まれている.そこで我々は,4種類の作業からなる不正侵入対策手法を基に既存の対策手法における問題点の抽出を行った.この考察から我々は,不正侵入対策を強固にするためにはログ情報の調査作業を確実に遂行することが必要であることを認識した.そこで本研究では,その作業を支援する一手法として情報視覚化によるログ情報視覚化システムを提案する.本研究では,ログ情報の視覚化手法としてログ情報の要約表示と時間軸表示を提案する.これらを組み合わせてログ情報の調査作業を行うことで,効率良くかつ容易に作業が行えるようになり,一般ユーザでも自身でログ情報調査作業を行うことが可能になる.さらに我々は,この利点を利用することで既存の不正侵入検知システムが抱えている問題だけでなく,不正侵入対策における人的問題をも改善可能な集団監視による不正侵入対策を提案する.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"An intrusion to the computer becomes a serious threat.Some methods to cope with them are already proposed.Such methods, however,do not come to use widely,because these methods have some problems respectively.We extract the problem from existing intrusion management.As a result of it,we led that periodical log inspection makes a computer more secure againstthe intrusion.We suggest a log information visualization system that helps inspectinglog information.We propose two visualization methods in this research.One is a summary visualization.The other is a time based visualization.Both methods enable an inspector to investigate log information more easilyand effectively.This advantage makes it possible for a novice user to investigate log information.We also propose a novel intrusion management that monitors log informationby multiple users using visualization systems.This method can improve not only the problem in existing intrusion detectionsystems but also the problem originated in human factor.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2227","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"2216","bibliographicIssueDates":{"bibliographicIssueDate":"2000-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicVolumeNumber":"41"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワークセキュリティ"}]},"weko_creator_id":"1"}}