{"updated":"2025-01-19T22:55:47.771001+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00195778","sets":["1164:4088:9695:9775"]},"path":["9775"],"owner":"44499","recid":"195778","title":["On Compression of Logging Messages for a Computer Security Incident Response"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-05-16"},"_buckets":{"deposit":"208ff1f2-7af3-44cd-b78d-1a027f5bed1d"},"_deposit":{"id":"195778","pid":{"type":"depid","value":"195778","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"On Compression of Logging Messages for a Computer Security Incident Response","author_link":["467415","467414"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"On Compression of Logging Messages for a Computer Security Incident Response"},{"subitem_title":"On Compression of Logging Messages for a Computer Security Incident Response","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-05-16","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Tottori University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tottori University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/195778/files/IPSJ-IOT19045006.pdf","label":"IPSJ-IOT19045006.pdf"},"date":[{"dateType":"Available","dateValue":"2021-05-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT19045006.pdf","filesize":[{"value":"592.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"b1276a92-2daa-4b49-8efb-482b74f4d8df","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Motoyuki, Ohmori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Computer security has been getting more attentions because a computer security incident may cause great damage on an organization. In order to quickly and properly detect and / or handle a computer security incident, ones may need store logging messages of network equipment and servers as many as possible. These logging messages then require a large size of storage while these logging messages are not so useful during daily normal operations. It is then better to minimize sizes of logging files as much as possible. On the other hand, ones may need to retrieve a specific logging message on a computer security incident, and its retrieval time should be shorter as much as possible. It is then necessary to solve this dilemma between a smaller storage size and shorter retrieval time. To this end, this paper proposes to convert a logging message, which are usually in text format, into binary format in order to compress their sizes. Most of logging messages of network equipment and servers are in text format, and those formats are in almost fixed. Most of logging messages must be then able to be converted into binary format. This paper then discusses the possibility to compress logging messages like above, and how we can reduce the size of the logging messages in real environment.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Computer security has been getting more attentions because a computer security incident may cause great damage on an organization. In order to quickly and properly detect and/or handle a computer security incident, ones may need store logging messages of network equipment and servers as many as possible. These logging messages then require a large size of storage while these logging messages are not so useful during daily normal operations. It is then better to minimize sizes of logging files as much as possible. On the other hand, ones may need to retrieve a specific logging message on a computer security incident, and its retrieval time should be shorter as much as possible. It is then necessary to solve this dilemma between a smaller storage size and shorter retrieval time. To this end, this paper proposes to convert a logging message, which are usually in text format, into binary format in order to compress their sizes. Most of logging messages of network equipment and servers are in text format, and those formats are in almost fixed. Most of logging messages must be then able to be converted into binary format. This paper then discusses the possibility to compress logging messages like above, and how we can reduce the size of the logging messages in real environment.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-05-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"2019-IOT-45"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:00:40.967653+00:00","id":195778,"links":{}}