• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2001 Fiscal Year Final Research Report Summary

Organization-defense Style Security System by using Detection of Omens of Illegal Access.

Research Project

Project/Area Number 12558036
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section展開研究
Research Field 情報システム学(含情報図書館学)
Research InstitutionTohoku University

Principal Investigator

NEMOTO Yoshiaki  Tohoku University, Graduate School of Information Sciences, Professor, 大学院・情報科学研究科, 教授 (60005527)

Co-Investigator(Kenkyū-buntansha) MANSFIELD Glenn  Cyber Solutions, Inc. , President, 主任研究員
SONE Hideaki  Information Synergy Center, Professor, 情報シナジーセンター, 教授 (40134019)
KATO Nei  Tohoku University, Graduate School of Information Sciences, Associate Professor, 大学院・情報科学研究科, 助教授 (00236168)
Project Period (FY) 2000 – 2001
KeywordsIllegal Access / Detection of Omens / Securitv System
Research Abstract

Along with the development of Internet, the detection of illegal access is becoming a major issue. A guarantee of a secure utilization of Internet is very vital for developers. Therefore, the technology of preventing Internet from intrusion and denial of service attacks is in great demand.
The typical cases of illegal access are as follows:
1- Penetrating and gaining privileges by illegal measures, then stealing classified information, destroying the system or using it as a stepping-stone for further attacks.
2- Forging the source IP address and sending a large amount of useless traffic.
3- Generating incomplete connections far beyond design limitations of the targeted WWW and DNS server to force it to no longer function.
In order to prevent illegal access, the detection of signs of an oncoming attack can be effective. By so doing, we can protect our network system beforehand.
In this research, we propose an organization-defense style security system by using the detection of omens (signs) of illegal access. This system detects various network scans that intend to find out vulnerability of remote network nodes. We implemented the system and evaluated its performance on an operating network. Experimental results show the effectiveness of our proposed system.

  • Research Products

    (15 results)

All Other

All Publications (15 results)

  • [Publications] 坂口 薫: "2次計画法を用いたトラヒックパターンの比較によるDoSの追跡手法の提案"電子情報通信学会技術研究報告. CS2001-89. 15-22 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 油川 良太: "分散NIDSによる広域不正アクセスの検知手法の提案"電子情報通信学会技術研究報告. CS2001-80. 49-54 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 金丸 朗: "高速ネットワークに対応可能なDoS攻撃の追跡技術"電子情報通信学会誌. 2001-10. 727-729 (2001)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] P. Linwong: "Buffer-Size Approximation for the Geo/D/1/K Queue"Networking ICN. (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] S. Nakamura: "A new scheme of combining advanced packet discard and dynamic bandwidth allocation for low delay/low jitter realtime communication using CBQ/ALTQ"IEICE Trans. on Communication. Vol. E84-B, No. 12. 3124-3132 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Y. Takei: "Detecting and Tracing Illigal Access by using Traffic Patterns Matching Technique"IEICE Trans. on Communication. Vol. J84-B, No. 8. 1464-1473 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] S. Nakamura: "Proposal of Dynamic Bandwidth Allocation Technique far Low Delay/Low Jitter Realtime Communication and Its Evaluation by Using CBQ"IEICE Trans. on Communication. Vol. E84-B, No. 6. 1513-1520 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] A. Kanamaru: "Proposal and Evaluation of Pro-active Buffering based Remote Monitoring System"IEICE Trans. on Communication. Vol. J84-B, No. 3. 392-401 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] S. Makabe: "Dynamic Mirror Server Selection Method with Consideration about Fluctuation of Network Load"IEICE Trans. on Communication. Vol. J84-B, No. 3. 435-442 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] G. Mansfeild: "Towards trapping Wily Intruders in the Large"COMPUTER NETWORK. 34. 659-670 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] N. Kato: "A Proposal and Evaluation of Network Fault Management Supporting System by Intergrating Management Information"IEICE Trans. on Communication. Vol. J83-B, No. 9. 1258-1266 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] A. Kanamaru: "A Simple packet aggregation technique for fault detection"International Journal of Network Management. Vol. 1O, No. 4. 215-228 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] K. Ohta: "Detection, Defense, and Tracking of Internet-Wide Illegal Access in a Distributed Manner"Proceedings of INET. (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] K. Ohta: "Wide area fault detection by monitoring aggregated traffic"The First Passive and Active Measurement Workshop. 25-31 (2000)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] P. Linwong: "Some New Results on the Geo/D/1/K Queueing System"TECHNICAL Proceedings of FOURTH INTERNATIONAL WORKSHOP ON QUEUEING NETWORKS WITH FINITE CAPACITY. (2000)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 2003-09-17  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi