Presentation | 2011-03-03 Extraction of Information Leak activities on Terminal Operation Logs Toru KOBAYASHI, Machiko TOYODA, Yusuke ICHIKAWA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, an information leak by an inside job has been a big problem. The regular security inspection against the terminal operation logs has been attracted the attention as an inside job deterrent measure. However, it would be difficult to rely on inspectors to analyze all terminal operation logs because such logs tend to be bigger than serve logs. Therefore, we propose a automatic extraction method for information leak activities based on the data stream mining technique. We evaluate our proposed method by applying the terminal operation logs collected at a self-governing body. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Information Leak / Security Inspection / Terminal Operation Log / Data Stream Mining |
Paper # | LOIS2010-68 |
Date of Issue |
Conference Information | |
Committee | LOIS |
---|---|
Conference Date | 2011/2/24(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Life Intelligence and Office Information Systems (LOIS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Extraction of Information Leak activities on Terminal Operation Logs |
Sub Title (in English) | |
Keyword(1) | Information Leak |
Keyword(2) | Security Inspection |
Keyword(3) | Terminal Operation Log |
Keyword(4) | Data Stream Mining |
1st Author's Name | Toru KOBAYASHI |
1st Author's Affiliation | NTT Cyber Solutions Laboratories() |
2nd Author's Name | Machiko TOYODA |
2nd Author's Affiliation | NTT Communication Science Laboratories |
3rd Author's Name | Yusuke ICHIKAWA |
3rd Author's Affiliation | NTT Cyber Solutions Laboratories |
Date | 2011-03-03 |
Paper # | LOIS2010-68 |
Volume (vol) | vol.110 |
Number (no) | 450 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |