摘要 |
PROBLEM TO BE SOLVED: To provide a method and a system for processing communication log, with which unauthorized access or the like can be discovered without requesting application or experience to a security manager. SOLUTION: This method has a process (a) for converting each of analysis object log files outputted by an application capable of recording a plurality of communication logs to a prescribed format as needed, a process (b) for merging a plurality of analysis object logs converted into the prescribed format and a process (c) for judging the presence/absence of the unauthorized access by analyzing the merged log. |