詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "John the Ripper"
5件中 1-5の結果を表示しています
  • Razvan BEURAN, Cuong PHAM, Dat TANG, Ken-ichi CHINEN, Yasuo TAN, Yoichi SHINODA
    IEICE Transactions on Information and Systems
    2018年 E101.D 巻 3 号 740-749
    発行日: 2018/03/01
    公開日: 2018/03/01
    ジャーナル フリー

    Given the worldwide proliferation of cyberattacks, it is imperative that cybersecurity education and training are addressed in a timely manner. These activities typically require trainees to do hands-on practice in order to consolidate and improve their skills, for which purpose training environments called cyber ranges are used. In this paper we present an open-source system named CyRIS (Cyber Range Instantiation System) that supports this endeavor by fully automating the training environment setup, thus making it possible for any organization to conduct more numerous and variate training activities. CyRIS uses a text-based representation in YAML format to describe the characteristics of the training environment, including both environment setup and security content generation. Based on this description, CyRIS automatically creates the corresponding cyber range instances on a computer and network infrastructure, for simultaneous use by multiple trainees. We have evaluated CyRIS in various realistic scenarios, and our results demonstrate its suitability for cybersecurity education and training, both in terms of features and performance, including for large-scale training sessions with hundreds of participants.

  • 大隅 淑弘, 山井 成良, 井上 一郎二
    学術情報処理研究
    2007年 11 巻 1 号 68-73
    発行日: 2007/09/14
    公開日: 2019/04/06
    ジャーナル フリー

    近年,不正アクセスの侵入手口として,SSHのパスワード認証に対する総当たり攻撃や辞書攻撃が多くなっている.計算機によっては,不特定の地域からSSHの接続を受け入れる必要のあるものがあり,また,登録ユーザの中には脆弱なパスワードを使用している者がある.このため,何度もの接続試行によってパスワードを破られ,計算機に不正に侵入される危険がある.本稿では,ログを監視することにより,SSHのパスワード認証に対する総当たり攻撃や辞書攻撃を検知し,不正なアクセスを動的に拒否するとともに,他の機器にも伝達して不正な攻撃を拒否する方式を提案する.

  • 津川 誠司
    社会・経済システム
    2005年 26 巻 81-87
    発行日: 2005/11/12
    公開日: 2017/07/28
    ジャーナル フリー
    As progresses of electronic government systems such as the resident register network system, the electronic application and the others in local governments, electronic risks such as Unauthorized Computer Access, Computer Viruses, Denial of Service Attack and Leakage of the Personal Data is increasing against the local governments, too. Under this situation, local governments must carry out the assessments of assets, threats and risks to maintain the information security levels beyond baseline levels. This is because the useful techniques and examples of risk analysis indispensable to the information security risk management do not exist. Therefore, they make their security policy from the ready-made model, and do not execute the information security audit so much. So in Hyogo Prefectural Government, we constructed the risk management method for guaranteeing safety by the technique consisting mainly of a log analysis and a pseudo attack based on the methods of ISO/IEC 17799 and applied it for three years. As a result, by staff in Hyogo Prefectural Government an effective risk management cycle was able to be constructed in a short term, and the effectiveness of these methods was proved.
  • 加藤 敏幸
    刑法雑誌
    2001年 41 巻 1 号 77-86
    発行日: 2001/07/30
    公開日: 2022/12/30
    ジャーナル フリー
  • Keika MORI, Takuya WATANABE, Yunao ZHOU, Ayako AKIYAMA HASEGAWA, Mitsuaki AKIYAMA, Tatsuya MORI
    IEICE Transactions on Information and Systems
    2020年 E103.D 巻 7 号 1541-1555
    発行日: 2020/07/01
    公開日: 2020/07/01
    ジャーナル フリー

    This work aims to determine the propensity of password creation through the lens of language spheres. To this end, we consider four different countries, each with a different culture/language: China/Chinese, United Kingdom (UK) and India/English, and Japan/Japanese. We first employ a user study to verify whether language and culture are reflected in password creation. We found that users in India, Japan, and the UK prefer to create their passwords from base words, and the kinds of words they are incorporated into passwords vary between countries. We then test whether the findings obtained through the user study are reflected in a corpus of leaked passwords. We found that users in China and Japan prefer dates, while users in India, Japan, and the UK prefer names. We also found that cultural words (e.g., “sakura” in Japan and “football” in the UK) are frequently used to create passwords. Finally, we demonstrate that the knowledge on the linguistic background of targeted users can be exploited to increase the speed of the password guessing process.

feedback
Top