Unauthorized access detecting system and unauthorized access detecting method
First Claim
Patent Images
1. An unauthorized access detecting system, comprising:
- processing circuitry configured togenerate authentication information that is used to log in to a predetermined server,set the generated authentication information generated on a predetermined analyzing host and cause a program to be analyzed to operate on the predetermined analyzing host, wherein the program is allowed access to the set authentication information,detect unauthorized access to a content at a predetermined server using the authentication information,obtain a program corresponding to the authentication information by referring to a table stored in a memory, the table prescribing correspondence between the authentication information and the program, andidentify, as a program that leaks out information, the program that operates on the predetermined analyzing host set with the authentication information if unauthorized access using the authentication information has been detected.
1 Assignment
0 Petitions
Accused Products
Abstract
In an unauthorized access detecting system, authentication information to be leaked outside is generated. In the unauthorized access detecting system, the generated authentication information is set on an analyzing host, and a program to be analyzed is operated on the analyzing host. In the unauthorized access detecting system, access to a content using the authentication information is detected, and if the access using the authentication information is detected, the access is identified as unauthorized access.
41 Citations
8 Claims
-
1. An unauthorized access detecting system, comprising:
processing circuitry configured to generate authentication information that is used to log in to a predetermined server, set the generated authentication information generated on a predetermined analyzing host and cause a program to be analyzed to operate on the predetermined analyzing host, wherein the program is allowed access to the set authentication information, detect unauthorized access to a content at a predetermined server using the authentication information, obtain a program corresponding to the authentication information by referring to a table stored in a memory, the table prescribing correspondence between the authentication information and the program, and identify, as a program that leaks out information, the program that operates on the predetermined analyzing host set with the authentication information if unauthorized access using the authentication information has been detected. - View Dependent Claims (2, 3, 4)
-
5. An unauthorized access detecting method executed by an unauthorized access detecting system, the unauthorized access detecting method including:
-
a generating step of generating authentication information that is used to log in to a predetermined server; an operating step of setting the authentication information generated by the generating step on a predetermined analyzing host and causing a program to be analyzed to operate on the predetermined analyzing host, wherein the program is allowed access to the set authentication information; a detecting step of detecting unauthorized access to a content at the predetermined server using the authentication information; an obtaining step of obtaining a program corresponding to the authentication information by referring to a table stored in a memory, the table prescribing correspondence between the authentication information and the program, and an identifying step of identifying, if unauthorized access using the authentication information is detected by the detecting step, a program that operates on the predetermined analyzing host set with the authentication information, as a program that leaks out information. - View Dependent Claims (6, 7, 8)
-
Specification