講演抄録/キーワード |
講演名 |
2017-11-16 14:50
Log analysis for hijacked user account's login detection method based on an autonomous system number of access source ○Akira Sato・Shuji Sannomiya・Yoshihiro Oyama・Hisashi Nakai・Kenichi Yoshida・Keisuke Kameyama(Univ. of Tsukuba) IA2017-50 |
抄録 |
(和) |
(まだ登録されていません) |
(英) |
User accounts may be hijacked carelessly, and system administrators
should detect such hijacked user accounts as soon as possible to eliminate or minimize malicious accesses.
In this study, we propose a method to detect the use of the hijacked
user accounts by focusing on both the autonomous systems number of access source and the time interval of accesses.
We introduce an assumption that authentic users take relatively long time to change or transfer their network systems in access source.
In this paper, this assumption is verified by analyzing the actual
access logs in university information systems. |
キーワード |
(和) |
/ / / / / / / |
(英) |
log analysis / hijacked account detection / mail system / / / / / |
文献情報 |
信学技報, vol. 117, no. 299, IA2017-50, pp. 95-98, 2017年11月. |
資料番号 |
IA2017-50 |
発行日 |
2017-11-08 (IA) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
著作権に ついて |
技術研究報告に掲載された論文の著作権は電子情報通信学会に帰属します.(許諾番号:10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
PDFダウンロード |
IA2017-50 |