• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

1994 Fiscal Year Final Research Report Summary

Evaluation Method of Information Network Security

Research Project

Project/Area Number 05452362
Research Category

Grant-in-Aid for General Scientific Research (B)

Allocation TypeSingle-year Grants
Research Field 情報システム学(含情報図書館学)
Research InstitutionJapan Advanced Iustitute of Science and Technology

Principal Investigator

UYEMATSU Tomohiko  JAIST,School of Inf. Sci., Associ. Prof., 情報科学研究所, 助教授 (60168656)

Co-Investigator(Kenkyū-buntansha) KUROSAWA Kaoru  TIT,Elec. & Elec. Eng., Associ. Prof., 工学部, 助教授 (60153409)
MAMBO Masahiro  JAIST,School of Inf. Sci., Assist. Prof., 情報科学研究所, 助手 (60251972)
SHINODA Yoichi  JAIST,School of Inf. Sci., Associ. Prof., 情報科学研究所, 助教授 (50206108)
OKAMOTO Eiji  JAIST,School of Inf. Sci., Professor, 情報科学研究所, 教授 (60242567)
Project Period (FY) 1993 – 1994
KeywordsComputer Virus / Simulation / Degree of Security / Digital Signature / Information Network
Research Abstract

Information networks have recently achieved a dramatic expansion, and such development has caused an increase of threats against the information network at the same time, e. g. computer viruses and worms (viruses for short). A demand for secure information networks has arose from this background. In order to build a secure information network we need first to assess the degree of security of the information network and then to introduce a proper treatment into it following the obtained assessment.
In this study we focus on computer viruses and propose a method to quantitatively assess the degree of security aginst the computer viruses. According to the assessment result, we propose a measure for virus protection in the information network. The details are as follows.
1. Theoretical analysis and simulation of spread and extinction of computer viruses : We study how computer viruses spread in an information network and what degree of a protective measure leads to virus extinction. In particular, we should observe the degree of the use of security measure at each node and the percentage of finding out viruses. From these studies we can quantitatively grasp the degree of security at nodes required for virus prevention.
2. A.signature scheme using a compiler : Using digital signature we can check whether a software is infected with a virus or not. Especially, we consider a signature scheme using a compiler. With the use of a compiler, not only the chance of virus infection but also the work of a user is reduced.
We can realize a certain degree of security integration of an information network through macroscopically observing the behavior of viruses and microscopically detecting viruses by the new software.

  • Research Products

    (8 results)

All Other

All Publications (8 results)

  • [Publications] 千石清: "コンピュータウィルス拡散の理論とシミュレーション" 1994年暗号と情報セキュリティシンポジウム予稿集. 5A (1994)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 臼田啓介: "コンパイラによる著名方式" 1994年情報理論とその応用シンポジウム予稿集. 377-380 (1994)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Keisuke Usuda: "A Signature Scheme Using a Compiler" Proc.of Japan and Korea Joint Workshop '95. 111-119 (1995)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 谷田武: "IP/Secureの設計と実装:インターネットのデータグラム配送におけるセキュリティの実現" 1995年暗号と情報セキュリティシンポジウム予稿集. B5.3 (1995)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Yasushi Sengoku: "Theoretical Analysis and Simulation of Computer-Viruses Prevalence" Proc. of 1994 SCIS. 5A. (1994)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Keisuke Usuda: "Proposal of Automatic Signature Creation for Virus Protection" Proc. of 1994 SITA. 377-380 (1994)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Keisuke Usuda: "A Signature Scheme Using a Compiler" Proc. of JK-JW '95. 111-119 (1995)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Takeshi Tanida: "Design and Implementation of the IP/Secure : Providing Security on Internet Datagram Delivery" Proc. of 1995 SCIS. B5.3. (1995)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 1996-04-15  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi