• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Organization-defense Style Security System by using Detection of Omens of Illegal Access.

Research Project

Project/Area Number 12558036
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section展開研究
Research Field 情報システム学(含情報図書館学)
Research InstitutionTohoku University

Principal Investigator

NEMOTO Yoshiaki  Tohoku University, Graduate School of Information Sciences, Professor, 大学院・情報科学研究科, 教授 (60005527)

Co-Investigator(Kenkyū-buntansha) MANSFIELD Glenn  Cyber Solutions, Inc. , President, 主任研究員
SONE Hideaki  Information Synergy Center, Professor, 情報シナジーセンター, 教授 (40134019)
KATO Nei  Tohoku University, Graduate School of Information Sciences, Associate Professor, 大学院・情報科学研究科, 助教授 (00236168)
GLENN Mansfield  サイバーソリューションズ(株), 主任研究員
Project Period (FY) 2000 – 2001
Project Status Completed (Fiscal Year 2001)
Budget Amount *help
¥6,500,000 (Direct Cost: ¥6,500,000)
Fiscal Year 2001: ¥1,800,000 (Direct Cost: ¥1,800,000)
Fiscal Year 2000: ¥4,700,000 (Direct Cost: ¥4,700,000)
KeywordsIllegal Access / Detection of Omens / Securitv System / 前兆 / セキュリティ管理
Research Abstract

Along with the development of Internet, the detection of illegal access is becoming a major issue. A guarantee of a secure utilization of Internet is very vital for developers. Therefore, the technology of preventing Internet from intrusion and denial of service attacks is in great demand.
The typical cases of illegal access are as follows:
1- Penetrating and gaining privileges by illegal measures, then stealing classified information, destroying the system or using it as a stepping-stone for further attacks.
2- Forging the source IP address and sending a large amount of useless traffic.
3- Generating incomplete connections far beyond design limitations of the targeted WWW and DNS server to force it to no longer function.
In order to prevent illegal access, the detection of signs of an oncoming attack can be effective. By so doing, we can protect our network system beforehand.
In this research, we propose an organization-defense style security system by using the detection of omens (signs) of illegal access. This system detects various network scans that intend to find out vulnerability of remote network nodes. We implemented the system and evaluated its performance on an operating network. Experimental results show the effectiveness of our proposed system.

Report

(3 results)
  • 2001 Annual Research Report   Final Research Report Summary
  • 2000 Annual Research Report
  • Research Products

    (20 results)

All Other

All Publications (20 results)

  • [Publications] 坂口 薫: "2次計画法を用いたトラヒックパターンの比較によるDoSの追跡手法の提案"電子情報通信学会技術研究報告. CS2001-89. 15-22 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] 油川 良太: "分散NIDSによる広域不正アクセスの検知手法の提案"電子情報通信学会技術研究報告. CS2001-80. 49-54 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] 金丸 朗: "高速ネットワークに対応可能なDoS攻撃の追跡技術"電子情報通信学会誌. 2001-10. 727-729 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] P. Linwong: "Buffer-Size Approximation for the Geo/D/1/K Queue"Networking ICN. (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] S. Nakamura: "A new scheme of combining advanced packet discard and dynamic bandwidth allocation for low delay/low jitter realtime communication using CBQ/ALTQ"IEICE Trans. on Communication. Vol. E84-B, No. 12. 3124-3132 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] Y. Takei: "Detecting and Tracing Illigal Access by using Traffic Patterns Matching Technique"IEICE Trans. on Communication. Vol. J84-B, No. 8. 1464-1473 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] S. Nakamura: "Proposal of Dynamic Bandwidth Allocation Technique far Low Delay/Low Jitter Realtime Communication and Its Evaluation by Using CBQ"IEICE Trans. on Communication. Vol. E84-B, No. 6. 1513-1520 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] A. Kanamaru: "Proposal and Evaluation of Pro-active Buffering based Remote Monitoring System"IEICE Trans. on Communication. Vol. J84-B, No. 3. 392-401 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] S. Makabe: "Dynamic Mirror Server Selection Method with Consideration about Fluctuation of Network Load"IEICE Trans. on Communication. Vol. J84-B, No. 3. 435-442 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] G. Mansfeild: "Towards trapping Wily Intruders in the Large"COMPUTER NETWORK. 34. 659-670 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] N. Kato: "A Proposal and Evaluation of Network Fault Management Supporting System by Intergrating Management Information"IEICE Trans. on Communication. Vol. J83-B, No. 9. 1258-1266 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] A. Kanamaru: "A Simple packet aggregation technique for fault detection"International Journal of Network Management. Vol. 1O, No. 4. 215-228 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] K. Ohta: "Detection, Defense, and Tracking of Internet-Wide Illegal Access in a Distributed Manner"Proceedings of INET. (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] K. Ohta: "Wide area fault detection by monitoring aggregated traffic"The First Passive and Active Measurement Workshop. 25-31 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] P. Linwong: "Some New Results on the Geo/D/1/K Queueing System"TECHNICAL Proceedings of FOURTH INTERNATIONAL WORKSHOP ON QUEUEING NETWORKS WITH FINITE CAPACITY. (2000)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2001 Final Research Report Summary
  • [Publications] 坂口 薫: "2次計画法を用いたトラヒックパターンの比較によるDoSの追跡手法の提案"電子情報通信学会技術研究報告. CS2001-89. 15-22 (2001)

    • Related Report
      2001 Annual Research Report
  • [Publications] 油川 良太: "分散NIDSによる広域不正アクセスの検知手法の提案"電子情報通信学会技術研究報告. CS2001-80. 49-54 (2001)

    • Related Report
      2001 Annual Research Report
  • [Publications] 金丸 朗: "高速ネットワークに対応可能なDoS攻撃の追跡技術"電子情報通信学会誌. 2001-10. 727-729 (2001)

    • Related Report
      2001 Annual Research Report
  • [Publications] 金丸朗: "プロアクティブバッファリングを用いた高精度リモートトラヒック観測システムの提案とその性能評価"電子情報通信学会論文誌B. (印刷中).

    • Related Report
      2000 Annual Research Report
  • [Publications] 油川良太: "分散NIDSとAccess Treeを用いた広域不正アクセスの検出方式の検討"電子情報通信学会リサイエティ大会講演論文集. B-7-50. B-7-50 (2000)

    • Related Report
      2000 Annual Research Report

URL: 

Published: 2000-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi