Illegal communication detector, illegal communication detector control method, and storage medium storing program for illegal communication detector control
First Claim
1. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
- a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; and
a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication,wherein the illegal communication standard rule is formulated according to a number of an item of method information included in the recorded information.
2 Assignments
0 Petitions
Accused Products
Abstract
An illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector including: a recording unit that records at least part of information transmitted from the external devices to the protection-targeted device; a determination unit that regards one of the external devices as a device of interest; and a communication control unit that detects, if the determination means conclude that at least part of the recorded information complies with the predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, and performing a predetermined process concerning the communication with the device of interest.
-
Citations
16 Claims
-
1. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, wherein the illegal communication standard rule is formulated according to a number of an item of method information included in the recorded information.
-
-
2. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, wherein the illegal communication standard rule is formulated according to a number of request count for each type of URI included in the recorded information.
-
-
3. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, wherein the illegal communication detector further comprises a memory that stores information identifying protection information that is at least part of information transmittable by the protection-targeted device, wherein the illegal communication standard rule is formulated according to a number of accesses to the protection information identified by the stored information.
-
-
4. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; a memory that stores information about conditions for the communication from each of the specific devices; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with the information about the conditions for the communication, that the contents of communication are derived from an illegal communication, wherein the information about the conditions for the communication includes a group information of IP addresses.
-
-
5. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; a memory that stores information about conditions for the communication from each of the specific devices; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with the information about the conditions for the communication, that the contents of communication are derived from an illegal communication, wherein the information about the conditions for the communication includes information indicating an access time.
-
-
6. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; a memory that stores information about conditions for the communication from each of the specific devices; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with the information about the conditions for the communication, that the contents of communication are derived from an illegal communication, wherein the information about the conditions for the communication is set by extracting information from the communication history.
-
-
7. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication; and a communication controller that performs a predetermined process concerning the communication with the device of interest. - View Dependent Claims (8, 9, 10, 11)
-
-
12. An illegal communication detector that is mounted in a communication path between specific devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, wherein the detector determines, in accordance with the information transmitted from the device of interest and recorded that prevails after authenticating a user transmitting information from the device of interest, whether a predetermined illegal communication standard rule is complied with.
-
-
13. An illegal communication detector that is included in a system providing communication between a first network and a second network to monitor contents of communications delivered from a device in the first network to a protection-targeted device that is in the second network, the illegal communication detector comprising:
-
a recorder that records at least part of information transmitted from the specific devices to the protection-targeted device; and a detector that regards one of the specific devices as a device of interest and detects, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, wherein the illegal communication standard rule is formulated according to a number of an item of method information included in the recorded information.
-
-
14. A method for controlling an illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the method comprising:
-
recording at least part of information transmitted from the external devices to the protection-targeted device; regarding one of the specific devices as a device of interest; and detecting, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, wherein the illegal communication standard rule is formulated according to a number of an item of method information included in the recorded information.
-
-
15. A method for controlling an illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the method comprising:
-
recording at least part of information transmitted from the specific devices to the protection-targeted device; regarding one of the specific devices as a device of interest; detecting, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication; and performing a predetermined process concerning the communication with the device of interest.
-
-
16. A storage medium readable by a computer, the storage medium storing a program of instructions executable by the computer, which causes an illegal communication detector mounted in a communication path between external devices and a protection-targeted device for monitoring contents of communications delivered to the protection-targeted device to perform a function, the function comprising:
-
recording at least part of information transmitted from the external devices to the protection-targeted device; regarding one of the specific devices as a device of interest; and detecting, when at least part of the recorded information transmitted from the device of interest complies with a predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication.
-
Specification