Presentation | 2006-07-21 Visualization Technologies of nicter Incident Analysis System Koji NAKAO, Fumiko MATSUMOTO, Daisuke INOUE, Shunsuke BABA, Kazuya SUZUKI, Masashi ETO, Katsunari YOSHIIOKA, Kenji RIKITAKE, Yoshiaki HORI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigating overall countermeasures against security incidents detected over the wide area Internet. In this paper, focusing on visualization technologies for the purpose of the incident analysis and operation in the nicter, we describe the technologies currently implemented and planned to be developed in the nicter, based on the visualization requirements. Further, some issues for the extended visualization technologies required in the nicter are also mentioned. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | incident analysis / visualization / network security |
Paper # | ISEC2006-51 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2006/7/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Visualization Technologies of nicter Incident Analysis System |
Sub Title (in English) | |
Keyword(1) | incident analysis |
Keyword(2) | visualization |
Keyword(3) | network security |
1st Author's Name | Koji NAKAO |
1st Author's Affiliation | National Institute of Information and Communications Technology (NICT)() |
2nd Author's Name | Fumiko MATSUMOTO |
2nd Author's Affiliation | National Institute of Information and Communications Technology (NICT) |
3rd Author's Name | Daisuke INOUE |
3rd Author's Affiliation | National Institute of Information and Communications Technology (NICT) |
4th Author's Name | Shunsuke BABA |
4th Author's Affiliation | Security Project Dept., Business Development Div., Yokogawa Electric Corporation |
5th Author's Name | Kazuya SUZUKI |
5th Author's Affiliation | Security Project Dept., Business Development Div., Yokogawa Electric Corporation |
6th Author's Name | Masashi ETO |
6th Author's Affiliation | National Institute of Information and Communications Technology (NICT) |
7th Author's Name | Katsunari YOSHIIOKA |
7th Author's Affiliation | National Institute of Information and Communications Technology (NICT) |
8th Author's Name | Kenji RIKITAKE |
8th Author's Affiliation | National Institute of Information and Communications Technology (NICT) |
9th Author's Name | Yoshiaki HORI |
9th Author's Affiliation | Faculty of Information Science and Electrical Engineering, Kyushu University |
Date | 2006-07-21 |
Paper # | ISEC2006-51 |
Volume (vol) | vol.106 |
Number (no) | 176 |
Page | pp.pp.- |
#Pages | 7 |
Date of Issue |