The syslog messages of the iplog-2.2.3 packet capture in the DNS servers in Ku mamoto University were statistically investigated when receiving abnormal TCP packets from PC terminals infected with internet worms like W32/Welchia and/or W32/Sasser.D worms. The interesting results are obtained: (1) Initially, the W32/Welchia worm-infected PC terminals for learners (920 PCs) considerably accelerates the total W32/Welchia infection. (2) We can suppress quickly the W32/Sasser.D infection in our university when filtering the access between total and the PC terminal's LAN segments. Therefore, infection of internet worm in the PC terminals for learners should be taken into consideration to suppress quickly the infection.
The "Opengate" system is a network gateway system for the user authentication and usage logging. The "Opengate" system authenticates the user at accessing to the network. But one can use anonymously a public PC without a user authentication until accessing to the network. This causes a risk to be set a trap like a key-logger. This paper proposes the "OpengateLogon" system, an authentication system for a public PC with the "Opengate" system. This system allows us to introduce a startup authentication mechanism and to prevent an anonymous use.
In Kumamoto University, the gigabit network system was introduced to the all campuses by Center for Multimedia and Information Technologies in 2002, it deals with various and higher demands for network. In 2003, PC practice rooms in all campuses were equipped with identical PC practice environment,computing and networking environment for students and staffs in our university was improved more than before. Moreover, preparation of the campus wireless network system has been begun since 2003, wireless network stations are disposed in the whole area of all campuses in 2004. The wireless network system considered in both usefulness for user and network security has been established with user authentication and encrypted network communication. In the whole area of all campuses, computing and networking environment that is available in the same way has been fully equipped. In this paper, we report the construction of ubiquitous computing with campus wireless network system in Kumamoto university.
Various and many incidents, which like infections by the computer virus and leakage of personal information, threat our information society nowadays. The number of organization enacting the security policy for protecting themselves from those threats is rising. At the security policy planning, high cost and manpower are required for investigating their property and assessing their risk. Therefore, we have developed the security policy support database system to decreasing the cost of manpower. In this paper, we describe the requirements to construct a support database system and the results of out construction and operation.
Along with the development of information society, universities are required not only to accumulate precious academic information but also to open them to the whole world. We are developing a general-purpose database system which manages and provides various kinds of information accumulated in our university. One of the most important points in the design of the system is management of the enormous amount of data, which comes up to several tera-bytes in the field of natural science in some cases. In the present study, we constructed a database system on the geospace radio environment obtained by the Akebono satellite. This is a model case of enormous database systems especially in natural science because there are huge and variety kinds of data on the space environment measurement. In order to improve the system performance, we synthetically examined the flow of functions from construction of the database, data retrieval, and data distribution through the computer networks. In the present paper, we introduce the system and evaluate its performance.
World Wide Web is a most important and effective means for presenting and retreating information on the Internet today. Pages on most Web sites are still described in Hyper Text Markup Language. Some newer sites seem to begin utilizing XHTML, developed as an extension to the HTML using XML technology, or native XML, extensible markup language for site description. By describing a web site using XML, representation will become more extensible and flexible and the data processing will be performed more effectively. We developed an XML based web site using existing previous site data written in HTML. This paper discusses how we performed the transition from HTML based to XML based site, from administration and security.