{"updated":"2025-01-22T10:00:38.726674+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00045380","sets":["1164:3925:3972:3974"]},"path":["3974"],"owner":"1","recid":"45380","title":["逃げログー削除まで考慮にいれたログ情報保護手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"1999-05-21"},"_buckets":{"deposit":"60fc1902-6664-4778-b80c-ceabe473a320"},"_deposit":{"id":"45380","pid":{"type":"depid","value":"45380","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"逃げログー削除まで考慮にいれたログ情報保護手法","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"逃げログー削除まで考慮にいれたログ情報保護手法"},{"subitem_title":"NIGE Log - A method of protecting logging information from even their removal","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"1999-05-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学大学院情報システム学研究科"},{"subitem_text_value":"電気通信大学大学院情報システム学研究科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The Graduate School of Information Systems University of Electro - Communications","subitem_text_language":"en"},{"subitem_text_value":"The Graduate School of Information Systems University of Electro - Communications","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/45380/files/IPSJ-CSEC99005003.pdf"},"date":[{"dateType":"Available","dateValue":"2001-05-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC99005003.pdf","filesize":[{"value":"680.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"bce107c1-9498-4da3-8330-7edcf0257ce3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 1999 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高田, 哲司"},{"creatorName":"小池, 英樹"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tetsuji, Takada","creatorNameLang":"en"},{"creatorName":"Hideki, Koike","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"不正侵入検知にはログ情報が必要不可欠である.不正侵入検知システムは,ログ情報を解析し,不正侵入が発生しているか否かを判断する.一方で,不正侵入者は侵入の痕跡を削除するために,ログ情報の改ざんを行なおうとする.したがってなんらかの方法でこれを保護する必要がある.そこで本研究では,新たなログ情報保護手法を提案する.本手法は,ログ情報のバックアップを複数作成し,それらをファイルシステム内に隠蔽することでログ情報を保護する.これによりログ情報の保護だけでなく,ログ惰報改ざんの検知,さらには改ざん時のログ情報の自動復元も可能にする.また本手法をC++のクラスとして実装した.これにより様々なアプリケーシヨンに本手法を適用することも可能である.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Logging information is essential to perform intrusion detection. Intrusion detection system inspects various logging information in order to detect intrusions. On the other hand, intruder would try to modify them in order to remove his intrusion's trails. We must protect them in some techniques. In this paper, we propose new logging information protection method. It uses two processes to protect them against intruder. The one is to make more than one their backups. The other is to conceal these backups into file system. This method is not only enables to protect logging informaton from attacker's malicious modification, but it enables to detect their modification and recover modified information from backups automatically. We had implemented our method as C++ Class. It, therefore, is possible to integrate our method to various applications.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"18","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"13","bibliographicIssueDates":{"bibliographicIssueDate":"1999-05-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"45(1999-CSEC-005)","bibliographicVolumeNumber":"1999"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"created":"2025-01-18T23:11:20.131927+00:00","id":45380,"links":{}}