WEKO3
アイテム
{"_buckets": {"deposit": "f5f102f1-edd0-4daf-b298-cac52862a7f8"}, "_deposit": {"created_by": 1, "id": "25439", "owners": [1], "pid": {"revision_id": 0, "type": "depid", "value": "25439"}, "status": "published"}, "_oai": {"id": "oai:u-fukui.repo.nii.ac.jp:00025439", "sets": ["2292"]}, "author_link": ["73786", "73790", "73788", "73784", "73793", "73785", "73794", "73795", "73792", "73789", "73791", "73787"], "item_10002_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2006-03-31", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "1", "bibliographicPageEnd": "68", "bibliographicPageStart": "59", "bibliographicVolumeNumber": "54", "bibliographic_titles": [{"bibliographic_title": "福井大学工学部研究報告"}]}]}, "item_10002_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Most computer systems provide an authentication mechanism based on a user identification number and a password. In such systems, if a cracker can steal a user\u0027s password, there is no way to protect computer systems. The cracker may lead the computer systems from a normal state to an abnormal state. We propose an algorithm for intrusion detection. Normally, it is observed that users exhibit regularities in their input commands. We considered a method of characterizing users\u0027 behavior. This method is based on the frequency of command sequences. The behavior of the cracker might deviate from the peculiar behavior of each user. We tested intrusion detection using users\u0027 command sequences. As a result, we sound that each users\u0027 behavior is unique and this algorithm is effective. We think it is possible to reinforce the computer security with this new algorithm", "subitem_description_type": "Abstract"}]}, "item_10002_relation_11": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "TD00004787", "subitem_relation_type_select": "NCID"}}]}, "item_10002_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "4298373", "subitem_source_identifier_type": "ISSN"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "井上, 善夫"}], "nameIdentifiers": [{"nameIdentifier": "73784", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "白井, 治彦"}], "nameIdentifiers": [{"nameIdentifier": "73785", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "高橋, 勇"}], "nameIdentifiers": [{"nameIdentifier": "73786", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "黒岩, 丈介"}], "nameIdentifiers": [{"nameIdentifier": "73787", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "小高, 知宏"}], "nameIdentifiers": [{"nameIdentifier": "73788", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "小倉, 久和"}], "nameIdentifiers": [{"nameIdentifier": "73789", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "INOUE, Yoshio", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "73790", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "SHIRAI, Haruhiko", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "73791", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "TAKAHASHI, Isamu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "73792", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "KUROIWA, Jousuke", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "73793", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "ODAKA, Tomohiro", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "73794", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "OGURA, Hisakazu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "73795", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2020-08-05"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "KV54-P59-68.pdf", "filesize": [{"value": "2.4 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 2400000.0, "url": {"label": "KV54-P59-68.pdf", "url": "https://u-fukui.repo.nii.ac.jp/record/25439/files/KV54-P59-68.pdf"}, "version_id": "44d76b69-9448-45e0-8fce-be16e3472ac4"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Authentication", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Intrusion Detection", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Computer Security", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Command Sequences", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "jpn"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "departmental bulletin paper", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "入力コマンド連鎖の出現頻度に基づく個人認証手法の提案", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "入力コマンド連鎖の出現頻度に基づく個人認証手法の提案"}, {"subitem_title": "An Authentication Method Based on the Command Sequences", "subitem_title_language": "en"}]}, "item_type_id": "10002", "owner": "1", "path": ["2292"], "permalink_uri": "http://hdl.handle.net/10098/889", "pubdate": {"attribute_name": "公開日", "attribute_value": "2007-06-29"}, "publish_date": "2007-06-29", "publish_status": "0", "recid": "25439", "relation": {}, "relation_version_is_last": true, "title": ["入力コマンド連鎖の出現頻度に基づく個人認証手法の提案"], "weko_shared_id": -1}
入力コマンド連鎖の出現頻度に基づく個人認証手法の提案
http://hdl.handle.net/10098/889
http://hdl.handle.net/10098/889d2a38153-8032-43ba-abab-96cdaf6bb274
名前 / ファイル | ライセンス | アクション |
---|---|---|
KV54-P59-68.pdf (2.4 MB)
|
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2007-06-29 | |||||
タイトル | ||||||
タイトル | 入力コマンド連鎖の出現頻度に基づく個人認証手法の提案 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | An Authentication Method Based on the Command Sequences | |||||
言語 | ||||||
言語 | jpn | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Authentication | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Intrusion Detection | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Computer Security | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Command Sequences | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | departmental bulletin paper | |||||
著者 |
井上, 善夫
× 井上, 善夫× 白井, 治彦× 高橋, 勇× 黒岩, 丈介× 小高, 知宏× 小倉, 久和× INOUE, Yoshio× SHIRAI, Haruhiko× TAKAHASHI, Isamu× KUROIWA, Jousuke× ODAKA, Tomohiro× OGURA, Hisakazu |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Most computer systems provide an authentication mechanism based on a user identification number and a password. In such systems, if a cracker can steal a user's password, there is no way to protect computer systems. The cracker may lead the computer systems from a normal state to an abnormal state. We propose an algorithm for intrusion detection. Normally, it is observed that users exhibit regularities in their input commands. We considered a method of characterizing users' behavior. This method is based on the frequency of command sequences. The behavior of the cracker might deviate from the peculiar behavior of each user. We tested intrusion detection using users' command sequences. As a result, we sound that each users' behavior is unique and this algorithm is effective. We think it is possible to reinforce the computer security with this new algorithm | |||||
書誌情報 |
福井大学工学部研究報告 巻 54, 号 1, p. 59-68, 発行日 2006-03-31 |
|||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 4298373 | |||||
書誌レコードID | ||||||
識別子タイプ | NCID | |||||
関連識別子 | TD00004787 |