Installation of security policy into Kumamoto University and DNS based detection of security incidents in the campus network (技術と社会・倫理)
スポンサーリンク
概要
- 論文の詳細を見る
In Kumamoto University, we created policies and standards through August 2001 to February 2003, and procedures through March 2003 to March 2004 for the campus information security policy. Afterward, the information security policy was officially installed into the university and it has been taken effect since September 2004. On the other hand, we can be keeping to detect efficiently the security incidents in the campus network system by only watching the domain name resolution traffic since 2004 and can easily take various incident responses. This is because the security policy had been already installed in 2004, we can easily implement the prototype detection system, we can get friendly support from the users of the campus network. We can report how to smoothly install a security policy into a national university corporation and how to use the security policy efficiently to take countermeasures to fix the security incidents in the campus network system.
- 社団法人電子情報通信学会の論文
- 2009-02-26
著者
-
MUSASHI YASUO
Center for Multimedia and Information Technologies, Kumamoto University
-
Musashi Yasuo
Center For Multimedia And Information Technologies (cmit) Kumamoto University
関連論文
- Entropy study on A resource record DNS query traffic from the campus network (技術と社会・倫理)
- Entropy study on A resource record DNS query traffic from the campus network (インターネットアーキテクチャ)
- Entropy study on A resource record DNS query traffic from the campus network (インターネットと運用技術)
- Installation of security policy into Kumamoto University and DNS based detection of security incidents in the campus network (技術と社会・倫理)
- Installation of security policy into Kumamoto University and DNS based detection of security incidents in the campus network (インターネットアーキテクチャ)
- Installation of security policy into Kumamoto University and DNS based detection of security incidents in the campus network (インターネットと運用技術)
- Detection of DNS Cache Poisoning Attack in DNS Standard Resolution Traffic
- Euclidian- and Cosine-Distances based Detection of Distributed Host Search Attacks
- Euclidian- and Cosine-Distances based Detection of Distributed Host Search Attacks
- DNS ANY Request Cannon in Total Inbound ANY Resource Record DNS Query Request Packet Traffic
- DNS ANY Request Cannon in Total Inbound ANY Resource Record DNS Query Request Packet Traffic
- Euclidian- and Cosine-Distances based Detection of Distributed Host Search Attacks