SG11201606323QA - Log analysis device, unauthorized access auditing system, log analysis program, and log analysis method - Google Patents

Log analysis device, unauthorized access auditing system, log analysis program, and log analysis method

Info

Publication number
SG11201606323QA
SG11201606323QA SG11201606323QA SG11201606323QA SG11201606323QA SG 11201606323Q A SG11201606323Q A SG 11201606323QA SG 11201606323Q A SG11201606323Q A SG 11201606323QA SG 11201606323Q A SG11201606323Q A SG 11201606323QA SG 11201606323Q A SG11201606323Q A SG 11201606323QA
Authority
SG
Singapore
Prior art keywords
log analysis
unauthorized access
auditing system
program
access auditing
Prior art date
Application number
SG11201606323QA
Inventor
Hideyuki Sunada
Yasushi Nagata
Original Assignee
Mitsubishi Electric Corp
Mitsubishi Electric Inf Tech
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp, Mitsubishi Electric Inf Tech filed Critical Mitsubishi Electric Corp
Publication of SG11201606323QA publication Critical patent/SG11201606323QA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
SG11201606323QA 2014-02-12 2014-02-12 Log analysis device, unauthorized access auditing system, log analysis program, and log analysis method SG11201606323QA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2014/053179 WO2015121923A1 (en) 2014-02-12 2014-02-12 Log analysis device, unauthorized access auditing system, log analysis program, and log analysis method

Publications (1)

Publication Number Publication Date
SG11201606323QA true SG11201606323QA (en) 2016-09-29

Family

ID=53799693

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201606323QA SG11201606323QA (en) 2014-02-12 2014-02-12 Log analysis device, unauthorized access auditing system, log analysis program, and log analysis method

Country Status (5)

Country Link
US (1) US9965624B2 (en)
EP (1) EP3107025A4 (en)
JP (1) JP5936798B2 (en)
SG (1) SG11201606323QA (en)
WO (1) WO2015121923A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6799404B2 (en) * 2016-07-13 2020-12-16 株式会社デンソーテン Information processing device and information processing method
CN106326085A (en) * 2016-08-16 2017-01-11 成都菜鸟网络技术有限公司 Auditing method for electric power information log
CN111224807B (en) * 2018-11-27 2023-08-01 中国移动通信集团江西有限公司 Distributed log processing method, device, equipment and computer storage medium
CN109783318A (en) * 2019-01-07 2019-05-21 中国工商银行股份有限公司 Intelligent terminal finance peripheral hardware method for safety monitoring, device, server and system
CN110851340A (en) * 2019-11-06 2020-02-28 香港乐蜜有限公司 Operation log collection method and device and server
CN112214418B (en) * 2020-12-04 2021-03-02 支付宝(杭州)信息技术有限公司 Application compliance detection method and device and electronic equipment

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004206564A (en) * 2002-12-26 2004-07-22 Hitachi Information & Control Systems Inc Verification device and method for unauthorized
US20050021975A1 (en) 2003-06-16 2005-01-27 Gouping Liu Proxy based adaptive two factor authentication having automated enrollment
JP2005234729A (en) 2004-02-18 2005-09-02 Hitachi Omron Terminal Solutions Corp Unauthorized access protection system and its method
JP2006067279A (en) * 2004-08-27 2006-03-09 Matsushita Electric Ind Co Ltd Intrusion detection system and communication equipment
WO2007106902A2 (en) * 2006-03-15 2007-09-20 Daniel Chien Identifying unauthorized access to a network resource
JP4933218B2 (en) 2006-10-31 2012-05-16 株式会社野村総合研究所 Remote access control device
JP4843546B2 (en) 2007-03-30 2011-12-21 ヤフー株式会社 Information leakage monitoring system and information leakage monitoring method
JP2009075940A (en) 2007-09-21 2009-04-09 Lac Co Ltd Log analyzing apparatus and program
JP4113571B1 (en) * 2008-01-22 2008-07-09 株式会社Cskホールディングス Log audit device and log audit program
JP2009259214A (en) 2008-03-19 2009-11-05 Nec Corp Audit system, external audit device, external audit method, and external audit program
US8086596B2 (en) 2008-05-15 2011-12-27 International Business Machines Corporation Healthcheck of information technology infrastructure based on log data
JP2010123014A (en) 2008-11-21 2010-06-03 Nomura Research Institute Ltd Server unauthorized-operation monitoring system
JP5226636B2 (en) 2009-09-25 2013-07-03 株式会社野村総合研究所 Security maintenance support system and information terminal
JP2012133407A (en) * 2010-12-17 2012-07-12 Ntt Comware Corp Unauthorized access detection apparatus, unauthorized access detection system, unauthorized access detection method and program
JP5789390B2 (en) * 2011-03-25 2015-10-07 株式会社野村総合研究所 Business information protection device, business information protection method, and program
JP5730735B2 (en) 2011-09-30 2015-06-10 株式会社日立ソリューションズ Security management system, method and program
US8826403B2 (en) * 2012-02-01 2014-09-02 International Business Machines Corporation Service compliance enforcement using user activity monitoring and work request verification
US9712536B2 (en) * 2013-01-09 2017-07-18 Nomura Research Institute, Ltd. Access control device, access control method, and program

Also Published As

Publication number Publication date
EP3107025A4 (en) 2017-03-29
JPWO2015121923A1 (en) 2017-03-30
US20170177861A1 (en) 2017-06-22
EP3107025A1 (en) 2016-12-21
WO2015121923A1 (en) 2015-08-20
JP5936798B2 (en) 2016-06-22
US9965624B2 (en) 2018-05-08

Similar Documents

Publication Publication Date Title
EP3136249A4 (en) Log analysis device, attack detection device, attack detection method and program
IL248396A0 (en) Methods and systems for signature analysis and authentication
EP3361443A4 (en) Action detecting system, action detecting device, action detecting method, and action detecting program
EP3082124A4 (en) Security device, method therefor and program
EP2953298A4 (en) Log analysis device, information processing method and program
EP3099024A4 (en) Analysis rule adjustment device, analysis rule adjustment system, analysis rule adjustment method, and analysis rule adjustment program
EP3190536A4 (en) Analysis device, analysis method, and analysis program
EP3100192A4 (en) Automated penetration testing device, method and system
EP3252650A4 (en) Anonymization processing device, anonymization processing method, and program
EP2947595A4 (en) Attack analysis system, coordination device, attack analysis coordination method, and program
GB201510610D0 (en) Method, device, and computer program
EP3139297A4 (en) Malware determination device, malware determination system, malware determination method, and program
EP3015989A4 (en) System analysis device, system analysis method and system analysis program
HK1232324A1 (en) Systems, devices, and methods for sample integrity verification
EP3125057A4 (en) System-analyzing device, analysis-model generation method, system analysis method, and system-analyzing program
EP3096309A4 (en) Secure computation method, secure computation system, sorting device, and program
SG11201602112WA (en) Log analysis system
HK1221099A1 (en) Method, device and system for debugging hardware device
HK1209885A1 (en) System, method and device for processing door-lock authority
EP3118750A4 (en) Factor analysis device, factor analysis method, and factor analysis program
SG11201602110SA (en) Log analysis system
HK1206456A1 (en) Task execution method, apparatus and system
EP3293657A4 (en) Analysis method, analysis device, and analysis program
EP3181203A4 (en) Motion analysis method, motion analysis device, motion analysis system, and program
EP3120901A4 (en) Movement analysis method, movement analysis device, movement analysis system and program