摘要 |
PROBLEM TO BE SOLVED: To specify an unauthorized access person in the case of a system operation while maintaining versatility, to exactly pursue a cause of information leak and to further prevent the information leak. SOLUTION: In this invention, request data and response data to be transmitted/received via a Web server 3 are acquired by a monitoring program 31, predetermined information is extracted from the request data and the response data by the monitoring program 31, the extracted information is accumulated in an access log data base 7 as an access log and the access log is analyzed by a log analysis part 94. COPYRIGHT: (C)2006,JPO&NCIPI
|