leorio bthesis
|
|
- せせら かやぬま
- 5 years ago
- Views:
Transcription
1 IDS Doan Viet Tung Rodney D. Van Meter III
2 ( 22 ) IDS IDS IDS IDS : 1, 2., 3., 4,
3 Abstract of Bachelor s Thesis - Academic Year 2010 Anomaly Detection System using Statistical Analysis of IDS logs Nowadays, with the spread of computer networks, information systems are more open to the Internet. Therefore, the importance of secured networks is tremendously increased. There has been an increasing need for security systems against the external attacks from the hackers. One important type is the Intrusion Detection System (IDS). Intrusion Detection System tries to detect malicious activities such as denial of service attacks or even attempts to crack into computers by monitoring network traffic. IDS reads all the incoming packets and tries to find suspicious patterns known as signatures or rules. However, IDS generally generates many false positives (corresponding to a false alert) and false negatives (corresponding to a non-detected attack). As a result, it s a heavy workload for the network manager to check all the detected events. This thesis presents an anomaly detection system using statistical analysis of IDS logs. Based on tendency of IDS alert events, this system can cluster, analyze and then classify alerts into normal alerts and abnormal alerts. Keywords : 1. Security, 2.Intrusion Detection System, 3.Anomaly Detection, 4.Statistical analysis Keio University, Faculty of Environment and Information Studies Doan Viet Tung
4 Intrusion Detection System IDS IDS T p iii
5 T p t s a s th
6 2.1 NIDS & HIDS HIDS NIDS /01/ /01/ CRIM ALAC t T p portscan Open Port SNMP trap UDP portscan Open Port SNMP trap UDP T p
7 vi
8 IDS NIDS & HIDS t t
9 1 1.1 IPA [1] ,392 13, : DOS [2] % 28% index index.html index.php 1
10 DOS : JavaScript[3] xxx.js ID ID DoS : Intrusion Detection System - IDS 2
11
12 2 IDS IDS 2.1 Intrusion Detection System IDS Intrusion Detection System IDS IDS IDS IDS 2 IDS IDS 2 HIDS NIDS HIDS NIDS 2.1 NIDS NIDS Misuse Detection Anomaly Detection RFC 4
13 2 2.1: NIDS & HIDS CIDF Common Intrusion Detection Framework[4] [5] Event generator E-box Event analyzer A-box Event database D-box Response unit R-box 5
14 2 2.2: IDS false positive false negative IDS IDS IDS 2.3 6
15 2 2.3: IDS 1. Host-based Intrusion Detection System - HIDS HIDS HIDS OS 2. Network-based Intrusion Detection System - NIDS NIDS 7
16 2 2.4: HIDS NIDS 2 NIDS NIDS HTTPS [6] SSL [7] NIDS NIDS IPS[8] [9] 8
17 2 2.5: NIDS SQL [10] IDS NIDS [11] 2.1 NIDS HIDS 2.2 NIDS IDS NIDS 9
18 2 NIDS HIDS SNMP Syslog TCP RST UDP, ICMP ICMP port unreachable ACL 2.1: IDS 10
19 2 2.2: NIDS & HIDS NIDS HIDS BOF DoS SQL Web 11
20 Misuse Detection Anomaly Detection 2 1. Anomaly Detection 1 5MB 1 10MB IDS : zero-day attack[12] DoS [2] 12
21 2 2. Misuse Detection 2.7 EXEC ALERT 13
22 2 1 rule[bsm LONG SUID EXEC(*): 2 [+e:bsm event] 3 [? e.header event type == AUE EXEC 4 e.header event type == AUE EXECVE] 5 [? e.subject euid!= e.subject ruid] 6 [? contains (e.exec args, ˆ\\ ) == 1] 7 [? e.header size> NORMAL LENGTH] 8 ==> 9 [! printf( ALERT: Buffer overrun attack \ 10 on command %s\n, e.header command)] 11 ] 2.7: : 14
23 2 OS BOF [13] IDS EOI EOI EOI 15
24 2 2.2 IDS IDS IDS NIDS IDS 500 IPv4 Snort[14] [15] Snort
25 : 17
26 2 2.9: 2010/01/ : 2010/01/02 NIDS 18
27 NIDS NIDS
28 3 IDS 3.1 Frederic Cuppens Alexandre Miege Alert Correlation in a Cooperative Intrusion Detection Framework[16] CRIM IDS CRIM : CRIM IDS 1 20
29 3 IDS 3.2 Tadeusz Pietraszek [17] ALAC Adaptive Learner for Alert Classification ALAC ALAC : ALAC [18] root cause analysis[19] [20] ALAC 21
30 3 ALAC ALAC 30% 3.3 [21] IDS IDS IDS IDS IDS IDS 3.4 IDS IDS 1 22
31 4 IDS 4.1 t 2.3 t t 4.1: t 23
32 t t Date Time Signature Occurence times Signature A 2011/01/01 00:00:00-23:59:59 Signature B b Signature C 4.1: t 1 a c Date Time Signature Occurence times Signature A a 1 00:00:00-05:59:59 Signature B b 1 Signature C c 1 Signature C c 2 06:00:00-11:59:59 Signature D d /01/01 Signature E e 1 Signature A a 2 12:00:00-17:59:59 Signature B b 2 Signature F f Signature B b 3 18:00:00-23:59:59 Signature D d 2 Signature E e 2 4.2: t
33 T p T p T p t t 1 T p : T p 3 T p
34 4 4.3: % 1 95% 2 ( 99.7%) 3 X N(, 2 ) 1 X 68.26% % % Snort portscan SNMP trap UDP
35 4 portscan Open Port SNMP trap UDP 2010/12/ /12/ /12/ /12/ /12/ /12/ /12/ : 2 27
36 4 4.4: portscan Open Port 4.5: SNMP trap UDP
37 4 4.6: portscan Open Port 4.7: SNMP trap UDP
38 t x T p s a : : 4.10: s a s a < % 1 <s a < a 2 b 27% 2 <s a a 3 b 5% 30
39 4 4.11: s a s a s a 3 4.4:
40 s a s t h 4.5 s a s th s a s th 4.5:
41 Snort Snort MySQL[22] MySQL
42 5 5.1: 5.2: 34
43 第 5 章 実環境における提案手法の適用と評価 不正アクセスを検出する時に Snort は警告をすることと同時に MySQL にログを書 き込むことである 管理者はログを見たい時刻 過去期間 Tp 学習期間 集約期間 t を 入力した後で図 5.3 ログ分析部分は MySQL から過去期間 Tp において集約期間 t の警告 イベントをシグネチャ名にクラスタリングし 過去の検知数の分布を調べることにした がって 警告イベントごとにアノマリスコアとアノマリラベルを付ける 順番を決めた結 果は図 5.4 のように示す 図 5.3: 入力する情報 図 5.4: 分析した警告 しきい値を入力した後で しきい値より大きいアノマリスコアがある警告イベントだけ を見せる 図 5.5 と図 5.6 のように示す 35
44 5 5.5: 1 5.6: 2 36
45 T p T p T p T p T p T p T p 5.7: T p 37
46 t t t s a ?? 5.8:?? s th s th 38
47 5 5.9:
48
49 6 t 41
50 Rodney D.Van Meter III Pham Van Hung Vu Xuan Duong Do Thi Thuy Van Nguyen Hung Long 42
51 [1] (IPA) [2] Carnegie Mellon University s Computer Emergency Response Team (CERT). Denial of Service Attacks, html. [3] Mozilla Developer Network. JavaScript, en/javascript. [4] CIDF working group. Common Intrustion Detection Framework. edu/cidf/. [5] and., pages , [6] E.Rescorla. HTTP over TLS. Internet RFC 2818, [7] Chad W. Engelgau and Sanjeet Singh. Overview of SSL Acceleration Implementations. Dell Power Solutions, global.aspx/power/en/ps1q02_ssl. [8]. IDS IPS, /246798/. [9] (IPA). Web Application Firewall, [10] Microsoft TechCenter. SQL, [11]., pages , [12] Tony Bradley. Zero Day Exploits. About.com Guide. com/od/newsandeditorial1/a/aazeroday.htm. 43
52 [13] Maciej Ogorkiewicz and Piotr Frej. Analysis of Buffer Overflow Attacks. Windows OS Security, Buffer_Overflow_Attacks.html. [14] Sourcefire Inc. Snort. [15]. NIDS, [16] Frederic Cuppens and Alexandre Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. IEEE Symposium on Research in Security and Privacy, [17] Tadeusz Pietraszek. Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), pages Springer, [18] biz/datamining.html. [19] Klaus Julisch. Using Root Cause Analysis to Handle Intrusion Detection Alarms. PhD thesis, University of Dortmund, [20] Stefanos Manganaris, Marvin Christensen, Dan Zerkle, and Keith Hermiz. A Data Mining Analysis of RTID Alarms. Computer Networks: The International Journal of Computer and Telecommunications Networking, 34: , [21].. In, [22] Oracle Corporation. MySQL.
2004 SYN/ACK SYN Flood G01P014-6
2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information外れ構造抽出技術を用いた大規模セキュリティログ分析
Large-scale Security Log Analysis based on Outlier Extraction Technology 本多聡美 丸橋弘治 鳥居悟 武仲正彦 あらまし IDS Intrusion Detection System IDS Abstract In recent years, attacks on cyber space have not only increased
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More informationIPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU
1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale
More informationuntitled
Internet Week 2006T13 (4) CISSP 1 UTM: Unified Threat Management F/W Web G/W 2 IPS GW Box UTM!? S/W PC, F/WIPS IDS/IPS 3 or 4 5 Orange Alert Yellow Alert by @Police http://www.cyberpolice.go.jp/detect/index.html
More informationsnortの機能を使い尽くす & hogwashも使ってみる
presented by P snort hogwash snort1.8.2(3) Martin Roesch IDS IDS hogwash snort1.7 FW+NIDS 100M IP IP snort./configure;make su make install configure Flexresp database snmp snmp alert idmef xml smbalert
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More informationDesign and Implementation of a Game with Network Traffic Visualization to Enhance Security Awareness
2010 22 Rodney D. Van Meter III 23 2 13 - 2010 ( 22 ) : 1, 2., 3., 4, Abstract of Bachelor s Thesis - Academic Year 2010 Network Traffic Visualization to Enhance Security Awareness For typical computer
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More information2015 ( 27 ) RFID RF RFID, 2., 3., 4. i
2015 ( 27 ) 71143204 2015 ( 27 ) RFID RF 1 100 98 20 20 1 19 1. RFID, 2., 3., 4. i Abstract of Bachelor s Thesis Academic Year 2015 Smart Management System of Rechargeable Batteries with Automatic Identification
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationSNS GIS Abstract The Tourism-based Country Promotion Basic Act was enacted in Japan over a decade ago. Tourism is expected to be the primary contribut
SNS GIS Abstract The Tourism-based Country Promotion Basic Act was enacted in Japan over a decade ago. Tourism is expected to be the primary contributing factor toward the economic activation of Japan
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationshio_20041004.PDF
JPNIC JPCERT/CC 2004 Web 2004 10 4 Web Web Web WASC Web Application Security Consortium 7 Web Security Threat Classification Web URL 2 ...?? It depends!? It depends!??? 3 ? It depends!...
More informationuntitled
IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationIPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f
1,a) 2 zabbix Consideration of a system to support understanding of fault occurrences based on the similarity of the time series Miyaza Nao 1,a) Masuda Hideo 2 Abstract: With the development of network
More information_念3)医療2009_夏.indd
Evaluation of the Social Benefits of the Regional Medical System Based on Land Price Information -A Hedonic Valuation of the Sense of Relief Provided by Health Care Facilities- Takuma Sugahara Ph.D. Abstract
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More informationMicrosoft Word - D JP.docx
Application Service Gateway Thunder/AX Series vthunder ライセンスキー インストール 手順 1 1.... 3 2. vthunder... 3 3. ACOS... 3 4. ID... 5 5.... 8 6.... 8 61... 8 62 GUI... 10 2 1. 概要 2. vthunder へのアクセス 方法 SSHHTTPSvThunder
More informationFileMaker Server Getting Started Guide
FileMaker Server 13 2007-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect Bento FileMaker,
More informationuntitled
Windows Internet Information Server SQL Server 2 Explorer 3 MMC MMC mmc /a SQL Enterprise Manager IIS 4 MMC 5 MMC 6 Internet Information Server IIS %SystemRoot% system32 Logfiles IIS Web 8 IIS 9 ODBC Windows
More information:
An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationi TCP/IP NIC Intel 3com NIC TCP/IP *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP *1 3
i TCP/IP NIC Intel 3com NIC TCP/IP 78 90 500 *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP 79 80 *1 3 ii IPv4 IPv4 *2 *3 IPv6 5 IPv6 UDP UDP IP UDP IP TCP/IP IPv6 IPv4 TCP/IP IPv6 TCP/IP TCP/IP TCP/IP TCP/IP IPv6
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information165--184 (責)江.indd
LD ADHD One Perspective on Supporting Japanese Language Learners with LD/ADHD: An Analysis of Teachers Support in the Japanese in Context Course NAKAGAWA Yasuhiro In recent years, there has been increasing
More informationStudies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth
Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More informationVol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a
1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the
More informationIPSJ SIG Technical Report Vol.2014-CE-127 No /12/7 1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of
1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of the zoo animals behavior Yoshida Nobuaki 1,a) Tanaka Masayuki 2,3 Wada Seitaro 2,3 Abstract: The authors are
More information2
0. 92a --------------------------------------------------------- ---------------------------------------------------- 1. 1-1. 1-2. 1-3. 2. 2-5. 1 2 a ---------------------------------------------------------
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More informationOracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Packインストレーション・ガイド リリース2.2
Oracle Enterprise Manager Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Pack 2.2 2000 11 : J02263-01 Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Pack 2.2
More information<Documents Title Here>
Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More informationHP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree
LAN 1 2 3 2 LAN WiFiTag WiFiTag LAN LAN 100% WiFi Tag An Improved Determination Method with Multiple Access Points for Relative Position Estimation Using Wireless LAN Abstract: We have proposed a WiFiTag
More informationCore Ethics Vol. a
Core Ethics Vol. CP CP CP Core Ethics Vol. a - CP - - Core Ethics Vol. CP CP CP b CP CP CP e f a c c c c c c CP CP CP d CP ADL Core Ethics Vol. ADL ADL CP CP CP CP CP CP CP,,, d Core Ethics Vol. CP b GHQ
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationshibasaki(印刷用)
M M M NIC alert NIDS Snort alert tcp 192.168.0.0/24 any -> $HTTP_SERVER 80 (msg: HTTP Access Detected";) alert tcp 192.168.0.0/24 any $HTTP_SERVER -> 80 oinkmaster Oink M M ANNEX PC-UNIX DSU M KIU L3 Web
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More informationetrust Access Control etrust Access Control UNIX(Linux, Windows) 2
etrust Access Control etrust Access Control UNIX(Linux, Windows) 2 etrust Access Control etrust Access Control 3 ID 10 ID SU ID root 4 OS OS 2 aaa 3 5 TCP/IP outgoing incoming DMZ 6 OS setuid/setgid) OS
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More information1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar
DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More informationICTのメガトレンドに向けたハイパーコネクテッド・クラウドへの取組み
ICT Project on Hyper-connected Cloud to Embrace Megatrends in ICT 飯田一朗 あらまし ICT SI ICT Abstract With significant changes occurring on a daily basis, the information and communications technology (ICT)
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More informationSQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL i
28 SQL Proposal of attack detection method based on appearance frequency of symbols included in SQL injection attack and its relevance 1170311 2017 2 28 SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL
More information403-0702_‚Ofl¼
HP-UX HP System Insight Manager Whitepaper ..................................................................................2..............................................................2 SIM....................................................................................2.............................................................3................................................................................3
More information特集04.indd
2 1 Journal of Multimedia Aided Education Research 2005, Vol. 2, No. 1, 4354 TIES e 1997 TIES e TIES 4 ASPApplication Service Provider 25e 2004 openties 6000 TIES 100 5000 TIESe eties 10 1997 TIES1 LAN
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More informationfiš„v5.dvi
(2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java
More informationFirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi
Security FirePass SSL VPN FirePass SSL VPN Virtual Edition VE) 1 Web E 11 12 icontrol SSL VPN API 12 FirePass FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client
More information企業内システムにおけるA j a x 技術の利用
Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet
More informationSport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be
Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship between broadcasting and sport (major sport and professional
More information2-20030509.PDF
JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC
More informationfiš„v8.dvi
(2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More informationSNS ( ) SNS(Social Networking Service) SNS SNS i
22 SNS Job-Hunting Activities situation Understanding Support System Using SNS 1110252 2011 03 01 SNS ( ) SNS(Social Networking Service) SNS SNS i Abstract Job-Hunting Activities situation Understanding
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More informationThe F5 DDoS Mitigation Reference Architecture | F5 White Paper
F5 DDoS F5DDoS White Paper F5 DDoS 3 DDoS 4 3 DDoS 3 DDoS 4 DDoS 6 F5 7 8 DDoS 8 1 8 2 10 DNS DDoS 11 12 FSI DDoS 13 DDoS 14 SMB DDoS 15 17 18 2 F5 DDoS 2012 DDoS DDoS F5 DDoS 1 DNS 3 4 DDoS 2 CPU F5 DDoS
More information2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP
1.,.. 2 OSI,,,,,,,,, TCP/IP,, IP, ICMP, ARP, TCP, UDP, FTP, TELNET, ssh,,,,,,,, IP,,, 3 OSI OSI(Open Systems Interconnection: ). 1 OSI 7. ( 1) 4 ( 4),,,,.,.,..,,... 1 2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP,
More informationrzat10pdf.ps
IBM i 7.2 IBM Navigator for i IBM IBM i 7.2 IBM Navigator for i IBM 9 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Connecting to your system Connecting to IBM Navigator for i Copyright IBM Corporation
More informationLync Server 2010 Lync Server Topology Builder BIG-IP LTM Topology Builder IP Lync 2010 BIG IP BIG-IP VE Virtual Edition BIG-IP SSL/TLS BIG-IP Edge Web
1.1 Microsoft Lync Server 2010 BIG-IP LTM 2 4 5 BIG-IP : Lync 6 BIG-IP : Lync 7 BIG-IP : - 8 BIG-IP : - 9 A: BIG-IP Microsoft Lync Server 2010 Microsoft Lync Server 2010 Office Communications Server BIG-IP
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More informationMRI | 所報 | 分権経営の進展下におけるグループ・マネジメント
JOURNAL OF MITSUBISHI RESEARCH INSTITUTE No. 35 1999 (03)3277-0003 FAX (03)3277-0520 E-mailprd@mri.co.jp 76 Research Paper Group Management in the Development of Decentralized Management Satoshi Komatsubara,
More informationVol. 0 No (AOI: Attribute Oriented Induction) AOI AOI Characterization and Anomaly Detection for Network Log Using Attribute Oriented Inductio
Vol No 959 (AOI: Attribute Oriented Induction) AOI AOI Characterization and Anomaly Detection for Network Log Using Attribute Oriented Induction Akira Yamada, Yutaka Miyake, Keisuke Takemori and Toshiaki
More informationVol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus
Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More informationTab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2
COMPANION 20 MULTIMEDIA SPEAKER SYSTEM Owner s Guide Tab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2 Tab1, 7, 13 Tab 2, 8, 14 Tab 3, 9, 15 Tab 4, 10, Tab 5, 11 This product conforms to all
More informationThe Indirect Support to Faculty Advisers of die Individual Learning Support System for Underachieving Student The Indirect Support to Faculty Advisers of the Individual Learning Support System for Underachieving
More informationスライド 1
IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More information【生】④木原資裕先生【本文】/【生】④木原資裕先生【本文】
WBC MLB J MLB MLB J J J http : //www.zen koutairen.com/: NHK NHK ABC Live NHK NHK ABC NHKABC NHK PTA NHK ABC WORLD BASEBALL CLASSIC WBC http : //www.topics.or.jp/kaishaannai/ http : //adv.yomiuri.co.jp/yomiuri/n
More informationI 1) 2) 51 (1976) 6.9 ha 9 (1934) 2km 15, (1955) 6 (1620)
I 1) 2) 51 (1976) 6.9 ha 9 (1934) 2km 15,000 30 (1955) 6 (1620) 3 1 1 45 16 2003 50 (1975) 2 150 49 (1974) II (1) 3) 1 49 50 51 53 54 56 57 59 61 63 3 8 9 10 11 12 NHK 46 2 44 (1969) 2 40 50 240 60 (1985)
More informationAPI SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning SCORM SCORM SCO LMS SCORM SCORM HTML XML JavaScript SCO
18 API SCORM Development of SCORM Making Support System focus on using Data Model and API Instance 1070419 2007 3 9 API SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning
More information22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener
22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Generator PF-Web for Constructing Web Applications. Tomohiro
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More informationimai@eng.kagawa-u.ac.jp (phishing) URL HP web URL URL Phishing Phishing "fishing" "sophisticated" WikiPedia http://en.wikipedia.org/wiki/phishing "fishing" "phreaking" phreak http://www.atmarkit.co.jp/fsecurity/special/83phishing/phishing00.html
More information2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More information熊本大学学術リポジトリ Kumamoto University Repositor Title 特別支援を要する児童生徒を対象としたタブレット端末 における操作ボタンの最適寸法 Author(s) 竹財, 大輝 ; 塚本, 光夫 Citation 日本産業技術教育学会九州支部論文集, 23: 61-
熊本大学学術リポジトリ Kumamoto University Repositor Title 特別支援を要する児童生徒を対象としたタブレット端末 における操作ボタンの最適寸法 Author(s) 竹財, 大輝 ; 塚本, 光夫 Citation 日本産業技術教育学会九州支部論文集, 23: 61-68 Issue date 215 Type URL Right Journal Article http://hdl.handle.net/2298/3622
More information