摘要:
An optical fiber manufacturing method includes placing, inside a glass pipe constituting a cladding portion, a first holding member, which is one of a pair of holding members made of glass and having a plurality of holes formed thereon, and a core rod, which includes a core forming portion serving as the core portion and includes a cladding forming portion constituting the cladding portion, in such a way that the core rod is supported by the first holding member; includes filling glass particles in the gap between the inner wall face of the glass pipe and the core rod; includes placing a second holding member of the pair of holding members inside the glass pipe and holding the core rod in a sandwiched manner in between the first holding member and the second holding member; includes sealing one end portion of the glass pipe and manufacturing an intermediate object; and includes manufacturing an optical fiber using the intermediate object. The bulk density of the first holding member and the second holding member is set to be within a predetermined range with reference to the bulk density of the filling portion filled with the glass particles, and the predetermined range is determined according to the permissible variation range for the core diameter in the longitudinal direction of the optical fiber.
摘要:
An attack countermeasure determination (10) includes a domain name input unit (11) that receives any domain name as input, and acquires setting information corresponding to the domain name, registration information corresponding to the domain name, and external information corresponding to an internet protocol (IP) address corresponding to the domain name, as feature information on the domain name, an attack countermeasure determination unit (16) that specifies a pre-designated category for the domain name on the basis of the feature information and determines, in a stepwise manner, an attack countermeasure against the domain name in accordance with the specified category, and an attack countermeasure information output unit (15) that outputs attack countermeasure information corresponding to the attack countermeasure.
摘要:
A dynamically-loaded code analysis device includes a memory unit, an extraction unit, and a specification unit. The memory unit memorizes dynamically-loaded code information indicating a class structure of a dynamically-loaded code and call method information in which tag information added to user information is associated with a class structure of a code performed for the user information, for each of the dynamically-loaded codes acquired via a network. The extraction unit detects transmission of user information to another device and specifies tag information that matches the tag information added to the user information from the call method information memorized in the memory unit, to extract a class structure associated with the tag information. The specification unit searches the memory unit for dynamically-loaded code information indicating the class structure, to specify a dynamically-loaded code corresponding to the dynamically-loaded code information.
摘要:
A network standpoint feature value creating unit (112) classifies access data collected at observation points into each detection target access source and creates network standpoint feature values for each of the detection target access sources. An access source detection unit (113) detects, based on the network standpoint feature value, an access source performs a predetermined continuous access. A point standpoint feature value creating unit (114) creates detection target standpoint feature values that are feature values for each access data collected at an observation point and training standpoint feature values that are feature values for each access data of the access source detected by the access source detection unit (113). An access detection unit (115) detects access data in which the similarity between the detection target standpoint feature value and the training standpoint feature value is not less than a predetermined value as access data by the predetermined continuous access.
摘要:
A program analysis unit (273) of a browser emulator manager (23) exhaustively searches a code by performing syntax analysis of a code included in web content to search a transfer code to another site or a content acquisition code, and specifies at least any of an object and a function and a property of the object used in the code found as a result of the search. Further, the program analysis unit (273) extracts a code having a dependence relationship with the transfer code or the content acquisition code based on at least any of the object and the function and the property of the object thus specified.
摘要:
A dynamically-loaded code analysis device includes a memory unit, an extraction unit, and a specification unit. The memory unit memorizes dynamically-loaded code information indicating a class structure of a dynamically-loaded code and call method information in which tag information added to user information is associated with a class structure of a code performed for the user information, for each of the dynamically-loaded codes acquired via a network. The extraction unit detects transmission of user information to another device and specifies tag information that matches the tag information added to the user information from the call method information memorized in the memory unit, to extract a class structure associated with the tag information. The specification unit searches the memory unit for dynamically-loaded code information indicating the class structure, to specify a dynamically-loaded code corresponding to the dynamically-loaded code information.
摘要:
An analysis apparatus (10) has a transfer path matching unit (151) that is provided with a real browser log La and a browser emulator log Lb as input and identifies, as a specific transfer path, a transfer path that is not transferred to a malicious URL on a pseudo-browser where the transfer path is transferred to the malicious URL on a real browser, based on the malicious URL information in a malicious URL database (14), and an analysis avoidance code identification unit (152) that identifies an analysis avoidance code that avoids analysis by utilizing a browser-specific function or an implementation difference between the real-browser and the pseudo-browser, among script codes that are executed on a website, based on the specific transfer path.
摘要:
An access classification device (10) includes a tree construction unit (13), a node association unit (14), a similarity calculation unit (15), and a classification unit (16). The tree construction unit (13) creates a plurality of trees in each of which at least a first destination and a second destination are set as nodes, content information corresponding to the nodes is added to the nodes, and an instruction to transfer a series of accesses from the first destination to the second destination is set as an edge. For the plurality of trees, the node association unit (14) associates nodes of the plurality of trees with each other, based on similarity between local structures of the trees. The similarity calculation unit (15) calculates similarity between the nodes associated with each other, based on the content information, and calculates similarity between the plurality of trees using the calculated similarity between the nodes. The classification unit (16) classifies the accesses into a set with similar features, based on the calculated similarity.