Paper Abstract and Keywords |
Presentation |
2005-03-11 15:45
Study of a distributed processing type intrusion detection system method Takao Kurahashi, Teruyuki Soba, Kazuo Kitamura (NTT SL Lab.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Recently, IDS(Intrusion Detection System) is paid to attention as a security system to diversified unlawful computer access. However, IDS has the problem. Because new unlawful computer access has increased as for IDS, a high ability is necessary as the user equipment.
As for this examination, it thinks about IDS for the consumer. It is because of the idea that IDS for an economical consumer is necessary in the future.
First of all, it proposes the concept of "a distributed processing type IDS method" for the achievement of economical IDS. Afterwards, the processing performance is evaluated. And, the processing performance value of "a distributed processing type IDS" was clarified. Moreover, the problem of "a distributed processing type IDS" was clarified as a result. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Security method / Load-balancing / IDS(Intrusion Detection System) / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 104, March 2005. |
Paper # |
|
Date of Issue |
2005-03-04 (TM) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
ICM |
Conference Date |
2005-03-10 - 2005-03-11 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Ishigaki City Hall |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Management Technologies on Next Generation Telecom Environment, etc. |
Paper Information |
Registration To |
ICM |
Conference Code |
2005-03-TM |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Study of a distributed processing type intrusion detection system method |
Sub Title (in English) |
|
Keyword(1) |
Security method |
Keyword(2) |
Load-balancing |
Keyword(3) |
IDS(Intrusion Detection System) |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takao Kurahashi |
1st Author's Affiliation |
NTT Cyber Solutions Laboratories (NTT SL Lab.) |
2nd Author's Name |
Teruyuki Soba |
2nd Author's Affiliation |
NTT Cyber Solutions Laboratories (NTT SL Lab.) |
3rd Author's Name |
Kazuo Kitamura |
3rd Author's Affiliation |
NTT Cyber Solutions Laboratories (NTT SL Lab.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2005-03-11 15:45:00 |
Presentation Time |
25 minutes |
Registration for |
ICM |
Paper # |
TM2004-114 |
Volume (vol) |
vol.104 |
Number (no) |
no.707 |
Page |
pp.73-77 |
#Pages |
5 |
Date of Issue |
2005-03-04 (TM) |