JP7554139B2 - 不正侵害分析支援装置、及び不正侵害分析支援方法 - Google Patents
不正侵害分析支援装置、及び不正侵害分析支援方法 Download PDFInfo
- Publication number
- JP7554139B2 JP7554139B2 JP2021032480A JP2021032480A JP7554139B2 JP 7554139 B2 JP7554139 B2 JP 7554139B2 JP 2021032480 A JP2021032480 A JP 2021032480A JP 2021032480 A JP2021032480 A JP 2021032480A JP 7554139 B2 JP7554139 B2 JP 7554139B2
- Authority
- JP
- Japan
- Prior art keywords
- infringement
- text
- field
- relevance
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/35—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2021032480A JP7554139B2 (ja) | 2021-03-02 | 2021-03-02 | 不正侵害分析支援装置、及び不正侵害分析支援方法 |
| EP21929141.6A EP4206950B1 (en) | 2021-03-02 | 2021-09-09 | Unauthorized intrusion analysis assistance device and unauthorized intrusion analysis assistance method |
| PCT/JP2021/033101 WO2022185576A1 (ja) | 2021-03-02 | 2021-09-09 | 不正侵害分析支援装置、及び不正侵害分析支援方法 |
| US17/911,755 US20230126967A1 (en) | 2021-03-02 | 2021-09-09 | Unauthorized intrusion analysis support apparatus and unauthorized intrusion analysis support method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2021032480A JP7554139B2 (ja) | 2021-03-02 | 2021-03-02 | 不正侵害分析支援装置、及び不正侵害分析支援方法 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2022133671A JP2022133671A (ja) | 2022-09-14 |
| JP2022133671A5 JP2022133671A5 (https=) | 2023-08-09 |
| JP7554139B2 true JP7554139B2 (ja) | 2024-09-19 |
Family
ID=83155223
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2021032480A Active JP7554139B2 (ja) | 2021-03-02 | 2021-03-02 | 不正侵害分析支援装置、及び不正侵害分析支援方法 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20230126967A1 (https=) |
| EP (1) | EP4206950B1 (https=) |
| JP (1) | JP7554139B2 (https=) |
| WO (1) | WO2022185576A1 (https=) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12499216B2 (en) * | 2021-01-28 | 2025-12-16 | Nec Corporation | Display apparatus, display system, display method, and non-transitory computer-readable medium |
| JP7733623B2 (ja) | 2022-08-24 | 2025-09-03 | 株式会社日立システムズ | 計算機システム及びセキュリティ対策の評価方法 |
| JP2024041143A (ja) * | 2022-09-14 | 2024-03-27 | 株式会社日立製作所 | 機械学習モデルの学習に用いるシステム、および、方法 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2015052841A (ja) | 2013-09-05 | 2015-03-19 | 株式会社Ubic | 文書分析システム及び文書分析方法並びに文書分析プログラム |
| JP2019049800A (ja) | 2017-09-08 | 2019-03-28 | 日本電信電話株式会社 | 抽出装置、抽出方法および抽出プログラム |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5983216A (en) * | 1997-09-12 | 1999-11-09 | Infoseek Corporation | Performing automated document collection and selection by providing a meta-index with meta-index values indentifying corresponding document collections |
| US20050261962A1 (en) * | 2004-05-18 | 2005-11-24 | Khai Gan Chuah | Anonymous page recognition |
| KR100862187B1 (ko) * | 2006-10-27 | 2008-10-09 | 한국전자통신연구원 | 취약점 분석 및 공격방식 모델링을 이용한 네트워크기반의인터넷 웜 탐지 장치 및 그 방법 |
| KR101303643B1 (ko) * | 2007-01-31 | 2013-09-11 | 삼성전자주식회사 | 침입 코드 탐지 장치 및 그 방법 |
| IL199115A (en) * | 2009-06-03 | 2013-06-27 | Verint Systems Ltd | Systems and methods for efficiently locating keywords in communication traffic |
| WO2014208427A1 (ja) | 2013-06-24 | 2014-12-31 | 日本電信電話株式会社 | セキュリティ情報管理システム及びセキュリティ情報管理方法 |
| US9237161B2 (en) * | 2013-12-16 | 2016-01-12 | Morphick, Inc. | Malware detection and identification |
| KR101911304B1 (ko) * | 2014-02-04 | 2018-10-24 | 가부시키가이샤 프론테오 | 문서 분석 시스템, 문서 분석 방법, 및 문서 분석 프로그램 |
| US20170244741A1 (en) * | 2016-02-19 | 2017-08-24 | Microsoft Technology Licensing, Llc | Malware Identification Using Qualitative Data |
| CN108647299A (zh) * | 2018-05-09 | 2018-10-12 | 北京启明星辰信息安全技术有限公司 | 生僻字符匹配方法、字符串模式匹配方法及存储介质 |
| CN109376531B (zh) * | 2018-09-28 | 2021-06-01 | 杭州电子科技大学 | 基于语义重编码与特征空间分离的Web入侵检测方法 |
| JP2021032480A (ja) | 2019-08-24 | 2021-03-01 | 住江織物株式会社 | 電気カーペットの温度制御方法 |
-
2021
- 2021-03-02 JP JP2021032480A patent/JP7554139B2/ja active Active
- 2021-09-09 EP EP21929141.6A patent/EP4206950B1/en active Active
- 2021-09-09 US US17/911,755 patent/US20230126967A1/en not_active Abandoned
- 2021-09-09 WO PCT/JP2021/033101 patent/WO2022185576A1/ja not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2015052841A (ja) | 2013-09-05 | 2015-03-19 | 株式会社Ubic | 文書分析システム及び文書分析方法並びに文書分析プログラム |
| JP2019049800A (ja) | 2017-09-08 | 2019-03-28 | 日本電信電話株式会社 | 抽出装置、抽出方法および抽出プログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4206950A1 (en) | 2023-07-05 |
| JP2022133671A (ja) | 2022-09-14 |
| US20230126967A1 (en) | 2023-04-27 |
| WO2022185576A1 (ja) | 2022-09-09 |
| EP4206950A4 (en) | 2024-07-31 |
| EP4206950B1 (en) | 2025-03-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9621570B2 (en) | System and method for selectively evolving phishing detection rules | |
| EP3651043A1 (en) | Url attack detection method and apparatus, and electronic device | |
| CN103299304B (zh) | 分类规则生成装置和分类规则生成方法 | |
| JP7554139B2 (ja) | 不正侵害分析支援装置、及び不正侵害分析支援方法 | |
| US11562262B2 (en) | Model variable candidate generation device and method | |
| CN111651768B (zh) | 计算机二进制程序的链接库函数名识别方法及装置 | |
| CN107247902A (zh) | 恶意软件分类系统及方法 | |
| CN109800569A (zh) | 程序鉴别方法及装置 | |
| CN118984246A (zh) | 恶意加密流量检测方法、装置、计算机设备和介质 | |
| CN110674479B (zh) | 异常行为数据实时处理方法、装置、设备及存储介质 | |
| JP2012088803A (ja) | 悪性ウェブコード判別システム、悪性ウェブコード判別方法および悪性ウェブコード判別用プログラム | |
| US8151117B2 (en) | Detection of items stored in a computer system | |
| CN117633783A (zh) | 数据库的攻击防御方法、装置、存储介质及电子设备 | |
| CN114915974A (zh) | 垃圾短信防治方法及装置 | |
| Skula et al. | A framework for preparing a balanced and comprehensive phishing dataset | |
| CN108959922B (zh) | 一种基于贝叶斯网的恶意文档检测方法及装置 | |
| EP3964986A1 (en) | Extraction device, extraction method, and extraction program | |
| Nikolic et al. | Model provenance testing for large language models | |
| CN110598397A (zh) | 一种基于深度学习的Unix系统用户恶意操作检测方法 | |
| CN106790025B (zh) | 一种对链接进行恶意性检测的方法及装置 | |
| CN113949621B (zh) | 入侵事件的告警关联方法、装置、电子设备及存储介质 | |
| CN115118498A (zh) | 基于关联性的漏洞数据分析方法和系统 | |
| TW201539217A (zh) | 文件分析系統、文件分析方法、以及文件分析程式 | |
| CN107194259A (zh) | 一种基于攻击过程的漏洞严重度综合评估方法和系统 | |
| CN111970272A (zh) | 一种apt攻击操作识别方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20230801 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20230801 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20240903 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20240906 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 7554139 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |