发明名称 ILLICIT COMMAND/DATA DETECTING SYSTEM, ILLICIT COMMAND/DATA DETECTING METHOD AND ILLICIT COMMAND/DATA DETECTING PROGRAM
摘要 PROBLEM TO BE SOLVED: To defend against an attack by an illicit command or data of a new pattern. SOLUTION: A signature table 25 stores a signature for characterizing the illicit command/data. A heuristic inspection means 22 has a decision criterion for inspecting whether or not an inspection object command/data includes characteristic appearing in the illicit command/data and an evaluation value for indicating a probability for expressing command/data illicit in this characteristic. A signature inspection means 21 determines the command/data as illicit when the command/data includes the signature, and delivers the command/data to the heuristic inspection means 22 when the command/data does not include the signature. The heuristic inspection means 22 inspects the command/data in a plurality of decision criteria, and determines a value as illicit when the sum of the evaluation values of the decision criteria including the characteristics exceeds an evaluation threshold, and stores the command/data in a log file 23. A signature extracting means 24 stores the signature exceeding an inspection threshold on the appearing number of the same signature in the log file 23 in a signature table 25. COPYRIGHT: (C)2004,JPO
申请公布号 JP2004054330(A) 申请公布日期 2004.02.19
申请号 JP20020206896 申请日期 2002.07.16
申请人 NEC NEXSOLUTIONS LTD 发明人 MORITA MASAO;KOMINE HIKARI
分类号 G06F15/00;G06F21/20;(IPC1-7):G06F15/00 主分类号 G06F15/00
代理机构 代理人
主权项
地址