Identification method and information processing device

    公开(公告)号:US10348743B2

    公开(公告)日:2019-07-09

    申请号:US15193264

    申请日:2016-06-27

    申请人: FUJITSU LIMITED

    IPC分类号: H04L29/06

    摘要: A method includes executing a determination process that determines that a setting value is a search key, the setting value being for an item from among a plurality of items in a record identified in a plurality of records, the plurality of records relating to a plurality of pieces of log information that are collected from a plurality of computers; executing a first identification process that identifies, as the record, another record including the search key from among the plurality of records; executing a second identification process that identifies, as the item, a new item from among the plurality of items, the new item being different from an item used to identify the another record in the executing of the first identification process; repeating executing of the processes; and outputting information on at least one computer that is suspected of a cyber-attack, based on the identified records.

    IDENTIFICATION METHOD AND INFORMATION PROCESSING DEVICE
    4.
    发明申请
    IDENTIFICATION METHOD AND INFORMATION PROCESSING DEVICE 审中-公开
    识别方法和信息处理设备

    公开(公告)号:US20170070515A1

    公开(公告)日:2017-03-09

    申请号:US15193264

    申请日:2016-06-27

    申请人: FUJITSU LIMITED

    IPC分类号: H04L29/06 G06F17/30

    CPC分类号: H04L63/1416

    摘要: A method includes executing a determination process that determines that a setting value is a search key, the setting value being for an item from among a plurality of items in a record identified in a plurality of records, the plurality of records relating to a plurality of pieces of log information that are collected from a plurality of computers; executing a first identification process that identifies, as the record, another record including the search key from among the plurality of records; executing a second identification process that identifies, as the item, a new item from among the plurality of items, the new item being different from an item used to identify the another record in the executing of the first identification process; repeating executing of the processes; and outputting information on at least one computer that is suspected of a cyber-attack, based on the identified records.

    摘要翻译: 一种方法包括执行确定设置值是搜索关键字的确定处理,所述设置值是针对在多个记录中识别的记录中的多个项目中的项目,所述多个记录涉及多个 从多台计算机收集的日志信息; 执行从多个记录中识别包括搜索关键字的另一记录作为记录的第一识别处理; 执行第二识别处理,其从所述多个项目中识别来自所述项目的新项目,所述新项目不同于在执行所述第一识别过程中用于识别所述另一记录的项目; 重复执行过程; 并基于所识别的记录,在涉嫌网络攻击的至少一台计算机上输出信息。