This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2015-113385, filed on Jun. 3, 2015, the entire contents of which are incorporated herein by reference.
The embodiment discussed herein is related to a computer-readable storage medium, an abnormality detection device and an abnormality detection method.
A person managing security in a business or an organization (hereinafter also referred to simply as a worker) not only performs detection, quarantine, and destruction of computer viruses according to a virus definition file, but also detects, may suppress spreading, and the like of activity by malware other than computer viruses.
Malware is a general term for software having malicious intent, including computer viruses. Specifically, malware infects a terminal (hereinafter, also referred to as a management target terminal) which is used by a business or an organization, for example, and performs activities in order to enable unauthorized access from outside.
Therefore, the worker not only detects the infection of a management target terminal by malware, but also preferably detects unauthorized access (hereinafter also referred to as an abnormal work) that uses the management target terminal (for example, Japanese Laid-open Patent Publication No. 2010-182019, International Publication Pamphlet No. WO 2006/035928, and Japanese National Publication of International Patent Application No. 2010-512035).
According to an aspect of the invention, a computer-readable medium which stores an abnormality detection program causes a computer to execute processes including detecting, when a work corresponding to a process on the computer has been executed, at least one event that is associated with the process on the computer, the at least one event including at least one first event which respectively occurs in response to at least one input for the process by using the input device and determining whether the work is abnormal or not based on whether the at least one detected event matches at least one stored event in a storage unit or not.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
The worker performs detection of unauthorized access or the like in which the management target terminal is used by performing analysis of a log (hereinafter also referred to as an event log) which is output from the management target terminal.
However, it is preferable to save the logs relating to all access including logs relating to ordinary access in order to analyze the log which is output from the management target terminal. Therefore, the worker may save a large amount of logs in order to perform the detection of unauthorized access.
There is a case in which the analysis of such a large amount of logs takes an excessive amount of time. Therefore, in this case, the worker may be unable to perform the detection of unauthorized access in which the management target terminal is used in real time.
Therefore, an object of one aspect is to efficiently perform detection of an abnormal work.
Configuration of Information Processing System
For example, a business system (the dotted line portion of
The worker terminal 2 is a terminal which may be operated by a worker. The worker carries out maintenance works or the like of the business system by accessing the information processing device 1 via the worker terminal 2. Specifically, the worker accesses the information processing device 1 and performs works such as acquiring operational information relating to the operation of the business system, and creation or deletion of files. Note that, the worker may perform maintenance works of the business system by directly operating the information processing device 1.
The information processing device 1 includes a storage section is for storing logs which are output accompanying the operations of the business system, for example. Specifically, the storage section 1a accumulates logs which are output from the business system in a case in which there is access to the information processing device 1, for example. The storage section is accumulates the logs which are output accompanying the operations of the application or the OS, each of which operates as a portion of the business system, for example.
Infection of Worker Terminal by Malware
Next, description will be given of the infection of the worker terminal 2 by malware.
In addition to the information processing device 1 and the worker terminal 2 illustrated in
The firewall device 3 is a device which limits access from an external terminal 11. Specifically, the firewall device 3 monitors the mail or the like which is transmitted from the external terminal 11, for example, and determines whether or not the mail or the like is infected with a virus such as malware. In a case in which the firewall device 3 determines that the mail or the like which is transmitted from the external terminal 11 is infected by a virus, the firewall device 3 discards the mail or the like without sending the mail or the like to the recipient (for example, the worker terminal 2 or the like) of the mail.
However, in recent years the number of types of malware is only accelerating, and examples exist which appear, at first glance, to pose no problem, such as malware included in an attached file of a mail. Therefore, there is a case in which the firewall device 3 may be unable to detect the malware that is attached to the mail which is transmitted from the external terminal 11, for example, and transmits the mail to the recipient (the worker terminal 2c in the example illustrated in
Subsequently, as illustrated in
Therefore, it is preferable that the worker performs the detection of the unauthorized access which is carried out on the information processing device 1, for example. Specifically, the worker performs analysis of the log (for example, the log relating to the access that is performed via the worker terminal 2) which is output to the storage section 1a. Accordingly, it becomes possible for the worker to detect that the information processing device 1 has been subjected to unauthorized access.
However, it is preferable that the worker saves the logs relating to all access including logs relating to ordinary access in order to analyze the log which is output from the information processing device 1. Therefore, the worker may save a large amount of logs in order to perform the detection of unauthorized access.
There is a case in which the analysis of such a large amount of logs takes an excessive amount of time. Therefore, in this case, the worker may be unable to perform the detection of unauthorized access on the information processing device 1 in real time.
There is a case in which the worker terminal 2 which is infected with malware performs similar operations to the worker terminal 2 which is operated by the normal user (for example, access to system resources). Therefore, there is a case in which the worker may be unable to perform the detection of unauthorized access using log analysis.
Therefore, in the present embodiment, the information processing device 1 creates (generates) work identification information which accompanies the work which accompanies the execution of each process based on the correspondence information in which events are associated with every process which is executed on the information processing device 1, and accumulates the work identification information in the storage section 1a. In a case in which a new work (hereinafter also referred to as the first work) is performed, the information processing device 1 determines that the first work is abnormal in a case in which the work identification information which is created from the first work is different from the work identification information that is stored in the storage section 1a.
In other words, the normal worker (the worker that is permitted to execute works on the information processing device 1) performs a work for executing the process of the information processing device 1 on the worker terminal 2 in advance, for example. The information processing device 1 creates the correspondence information for every process based on the events which are generated by the normal worker performing works. The information processing device 1 accumulates the work identification information which identifies the works which are performed by the normal worker in the storage section is based on the created correspondence information.
Subsequently, in a case in which the first work is performed on the information processing device 1, the work identification information (hereinafter also referred to as the new work identification information) which is created from the first work is compared with the work identification information which is accumulated in the storage section 1a in advance. In a case in which the work identification information of the same content as the new work identification information which is created from the first work is accumulated in the storage section 1a, the information processing device 1 determines that the person that performed the first work is a normal worker. Meanwhile, in a case in which the work identification information of the same content as the new work identification information which is created from the first work is not accumulated in the storage section 1a, the information processing device 1 determines that the person that performed the first work is not a normal worker.
Accordingly, it becomes possible for the information processing device 1 to perform detection of works which may be abnormal works (for example, unauthorized access to the information processing device 1) among the works which are performed on the information processing device 1. It becomes possible for the worker to perform a detailed investigation of the detected works.
Hardware Configuration of Management Device
Next, description will be given of the configuration of the information processing system 10.
The information processing device 1 includes a CPU 101 which is a processor, a memory 102, an external interface (an I/O unit) 103, and a storage medium 104. These elements are connected to each other via a bus 105.
The storage medium 104 stores a program 110 (hereinafter also referred to as the abnormality detection program 110) for performing a process (hereinafter also referred to as the abnormality detection process) which performs detection of an abnormal work in a program storage region (not illustrated) within the storage medium 104.
As illustrated in
The storage medium 104 includes an information storage region 130 (hereinafter also referred to as the storage section 130) which stores information that is used when performing the abnormality detection process, for example. The external interface 103 performs communication with the worker terminal 2. Note that, the information storage region 130 corresponds to the storage section is described in
Software Configuration of Information Processing Device
Next description will be given of the software configuration of the information processing device 1.
The correspondence information creation section 111 creates the correspondence information 131. The correspondence information 131 is information which is created by associating the events that are generated accompanying the execution of a plurality of processes which are executed on the information processing device 1 with every process. The correspondence information 131 is created from information (hereinafter also referred to as the access information) indicating that access to the system resources (for example, the application and the OS which operate on the worker terminal 2 and the information processing device which receive the input of information) of the information processing device 1 has occurred, for example.
A process or the like which is executed in a case in which there is input of a command to the OS which operates on the information processing device 1 instructing the OS to create a new file, for example, corresponds to a process that is executed on the information processing device 1.
The event which occurs accompanying the execution of a process is an event which occurs in order to bring about a state change in the business system, for example. Specifically, a system call for calling a function of the OS, receipt of input of the input device 2, notification which is generated between processes, or the like corresponds to an event. Description of a specific example of the correspondence information 131 will be given later.
The work identification information creation section 112 performs creation of the work identification information 132 which is information that identifies a work in which a process is executed. This work is a grouping of operations (operations performed by the worker via the input device 2) for causing the business system to execute a predetermined process. Specifically, the work identification information creation section 112 refers to the correspondence information 131 which is created by the correspondence information creation section 111, and creates the work identification information 132 from the events that are associated with the process corresponding to each work for every work in which processes are executed. Description of a specific example of the work identification information 132 will be given later.
The information management section 113 stores the work identification information 132 which is created by the work identification information creation section 112 in the information storage region 130. The information management section 113 stores the correspondence information 131 which is created by the correspondence information creation section 111 in the information storage region 130, for example.
The abnormality detection section 114 waits until the first work in which the process (hereinafter also referred to as the first process) that is executed on the information processing device 1 is executed. In a case in which the first work is performed, the abnormality detection section 114 determines whether or not the new work identification information which is created from the first work is different from the work identification information 132 relating to the first process among the work identification information 132 that is accumulated in the information storage region 130. As a result, in a case in which the new work identification information is different from the work identification information 132 that is accumulated in the information storage region 130, the abnormality detection section 114 determines that the first work is an abnormal work. In other words, in this case, the abnormality detection section 114 detects that there is a possibility that the first work is a work that is performed by an attacker. Note that, in a case in which the first work is performed, the abnormality detection section 114 may create new work identification information by causing the correspondence information creation section 111 and the work identification information creation section 112 to execute processes, for example.
The coincidence calculation section 115 calculates each item of the coincidence information 133 (hereinafter also referred to as the first value) between the information contained in the new work identification information which is created by the abnormality detection section 114 and the information contained in the work identification information 132 that is accumulated in the information storage region 130. In a case in which the coincidence information 133 which is calculated by the coincidence calculation section 115 is less than a predetermined threshold (hereinafter also referred to as the threshold information 134), the abnormality detection section 114 determines that the first work is abnormal. Description of a specific example of the coincidence information 133 will be given later. Note that, in this case, the information management section 113 stores the coincidence information 133 which is calculated by the coincidence calculation section 115 in the information storage region 130, for example.
The threshold information creation section 116 determines the threshold information 134. Specifically, the threshold information creation section 116 determines whether or not the timestamp (hereinafter also referred to as the first timestamp) at which the work identification information of the same content as the work identification information 132 that is accumulated in the information storage region 130 is previously created is a timestamp earlier than a predetermined timestamp (for example, one month earlier than the present timestamp), for example. In a case in which the first timestamp is a timestamp earlier than the predetermined timestamp, the threshold information creation section 116 determines a lower value than in a case in which the first timestamp is later than the predetermined timestamp as the threshold information 134. Description of a specific example of the threshold information 134 will be given later.
Note that, description of the aggregated information 135, the feature point information 136, and the correction coefficient information 137 will be given later.
Outline of First Embodiment
Next, description will be given of an outline of the first embodiment.
Process During Accumulation of Work Identification Information 132 in Information Storage Region 130
Initially, description will be given of the processes during the accumulation of the work identification information 132 in the information storage region 130. As illustrated in
In a case in which the information acquisition timing is reached (YES in S1), the information processing device 1 creates the correspondence information 131 in which the events that occur accompanying the execution of the process which is executed on the information processing device 1 are associated with every process (S2). Next, the information processing device 1 refers to the correspondence information 131 which is created in S2 and creates the work identification information 132 from the events that are associated with the processes corresponding to each work for every work for executing processes on the information processing device 1 (S3). Subsequently, as illustrated in
In other words, the features of the work (the operation) which is performed on the worker terminal 2 are different depending on the person (including the worker and the attacker) that performs the work. Specifically, for example, when performing a work on the worker terminal 2, there is a person that frequently uses shortcut keys of the keyboard and a person that does not. Information relating to the work content and the work time which is performed on the worker terminal 2 is included in the event that is generated accompanying the execution of a process. Therefore, a normal worker performs a work for executing a process of the information processing device 1 on the worker terminal 2 in advance. The information processing device 1 creates the work identification information 132 and accumulates the work identification information 132 in the information storage region 130 in advance based on the events that occur accompanying the execution of the work of the normal worker.
Accordingly, in a case in which the first work is performed, it becomes possible for the information processing device 1 to determine that there is a possibility that the first work is performed by an attacker in a case in which work identification information of the same content as the new work identification information that is created from the first work is not accumulated in the information storage region 130. Therefore, in this case, it becomes possible for the information processing device 1 to perform a detailed investigation of the first work.
The information processing device 1 creates the work identification information 132 based on only the information for identifying each work, for example. Therefore, it becomes possible for the information processing device 1 to shorten the processing time when determining whether or not the person that performed the first work is a normal worker. Therefore, in a case in which the first work is performed, it becomes possible for the information processing device 1 to determine whether or not the person that performed the first work is a normal worker in real time, for example.
Process During Determination of whether or not to Determine First Work Abnormal
Next, description will be given of the process during the determination of whether or not to determine that the first work is abnormal. As illustrated in
In a case in which the first work is performed (YES in S11), as illustrated in
Next, in a case in which work identification information of the same content as the new work identification information is not accumulated in the information storage region 130 (NO in S12), the information processing device 1 determines whether or not the first work is an abnormal work (S13). In other words, in this case, the information processing device 1 determines that the features of the first work are different from the features of the work which is performed in advance by a normal worker. Therefore, it becomes possible for the information processing device 1 to determine that the first work may be a work (an abnormal work) that is performed by a person (for example, an attacker) that is not a normal worker.
Meanwhile, in a case in which work identification information of the same content as the new work identification information is accumulated in the information storage region 130 (YES in S12), the information processing device 1 does not perform the determination of whether or not the first work is an abnormal work (S14). In other words, in this case, the information processing device 1 determines that the first work is a work which is performed by a normal worker. Description of a specific example of the process of S12 will be given later.
In this manner, according to the first embodiment, the information processing device 1 creates the correspondence information 131 in which the events that occur accompanying the execution of the plurality of processes which are executed on the information processing device 1 are associated with every process based on the access information in relation to the system resources of the information processing device 1. The information processing device 1 refers to the correspondence information 131, creates the work identification information 132 which identifies each work from the events that are associated with the processes corresponding to each work for every work in which processes are executed, and accumulates the work identification information 132 in the information storage region 130.
In a case in which the first work which executes the first process that is executed on the information processing device 1 is performed, the information processing device 1 determines that the first work is abnormal in a case in which the work identification information that is created from the first work is different from the work identification information 132 relating to the accumulated first process.
Accordingly, it becomes possible for the information processing device 1 to perform detection of works which may be abnormal works among the first works which are performed on the information processing device 1. It becomes possible for the worker to perform a detailed investigation of the detected works, for example.
Details of First Embodiment
Next, detailed description will be given of the first embodiment.
Process During Accumulation of Work Identification Information 132 in Information Storage Region 130
Initially, description will be given of the processes during the accumulation of the work identification information 132 in the information storage region 130. As illustrated in
The first event is an event which occurs accompanying the execution of the processes that are executed according to the input of the information to the worker terminal 2, for example. Specifically, the first event is an event which occurs when the worker inputs information using a keyboard or a mouse of the worker terminal 2 in order to access the information storage region 130, for example.
The second event is an event which occurs accompanying the execution of the processes which are executed according to the occurrence of access to an application that runs on the information processing device 1, for example. Specifically, the second event is an event which occurs when an application transmits a command for requesting the execution of a process to the OS corresponding to the worker inputting information via the worker terminal 2, for example.
The third event is an event which occurs accompanying the execution of the processes which are executed according to the occurrence of access to the OS that runs on the information processing device 1, for example. Specifically, the third event is an event which occurs when the OS executes a process based on a command which is received from an application, for example.
Specific Examples of First Events, Second Events, And Third Events
Next, description will be given of specific examples of the first events, the second events, and the third events.
Specifically, in the first events illustrated in
In the first events illustrated in
Next, description will be given of specific examples of the second events.
The second events illustrated in
Specifically, in the second events illustrated in
Next, description will be given of specific examples of the third events.
The third events illustrated in
Specifically, in the third events illustrated in
Specific Examples of Correspondence Information 131
Next, description will be given of specific examples of cases in which the correspondence information creation section 111 creates the correspondence information 131. The correspondence information creation section 111 creates the correspondence information 131 corresponding to each of the first events, the second events, and the third events by classifying each item of information contained in each of the first events, the second events, and the third events for each process, for example. Hereinafter, the correspondence information 131 will be described as containing a first correspondence information 131a corresponding to the first events, a second correspondence information 131b corresponding to the second events, and a third correspondence information 131c corresponding to the third events.
First, description will be given of the specific examples of the first correspondence information 131a.
Specifically, in the first correspondence information 131a illustrated in
Next, description will be given of the specific examples of the second correspondence information 131b.
Specifically, in the second correspondence information 131b illustrated in
Next, description will be given of the specific examples of the third correspondence information 131c.
Specifically, in the third correspondence information 131c illustrated in
In other words, the first correspondence information 131a, the second correspondence information 131b, and the third correspondence information 131c illustrated in
Returning to
Specific Examples of First Work Identification Information 132a
Specifically, in the first work identification information 132a illustrated in
In the first work identification information 132a illustrated in
In the first work identification information 132a illustrated in
Note that, in a case in which information is not set in “cursor position” of the first event information illustrated in
In the first work identification information 132a illustrated in
In this manner, the work identification information creation section 112 extracts the information for identifying the features of the works which a worker performs on the worker terminal 2 from the information contained in the first events, the second events, and the third events, and creates the work identification information 132. As described later, the abnormality detection section 114 and the coincidence calculation section 115 determine whether or not there is a possibility that the first work is an abnormal work using the created work identification information 132 instead of the log that is output from the business system, or the like. Accordingly, as described later, it becomes possible for the abnormality detection section 114 and the coincidence calculation section 115 to swiftly perform the detection of a work that has a likelihood of being an abnormal work.
Specific Example of First Aggregated Information 135a
Next, description will be given of specific examples of the first aggregated information 135a. The first aggregated information 135a is information for determining the information to be set in “signature ID” of the first work identification information 132a described in
Specifically, in the first aggregated information 135a illustrated in
For example, in a case in which, of the first work identification information 132a illustrated in
Specifically, in the first work identification information 132a illustrated in
In this case, the work identification information creation section 112 specifies the information from the first aggregated information 135a illustrated in
As a result, the work identification information creation section 112 specifies the information from the first aggregated information 135a illustrated in
Specific Examples of Determining Information set in “Bit String”
Next, description will be given of specific examples of determining the information to be set in “bit string” contained in the first work identification information 132a illustrated in
By referring to the first aggregated information 135a illustrated in
Accordingly, as described later, the abnormality detection section 114 and the coincidence calculation section 115 may determine whether or not to determine that the first work is abnormal by only performing a comparison of the bit strings that are set in “bit string” of the first work identification information 132a or the like. In other words, in this case, since the abnormality detection section 114 and the coincidence calculation section 115 may not have to refer to the other information contained in the first work identification information 132a or the like, it becomes possible to reduce the processing load expended when determining whether or not to determine that the first work is abnormal. Therefore, it becomes possible for the worker to determine whether or not to determine that the first work is abnormal in real time, for example. Hereinafter, description will be given of specific examples of cases in which the information to be set in “bit string” contained in the first work identification information 132a is determined.
For example, as illustrated in
Next, the work identification information creation section 112 associates the information which is acquired by referring to the first aggregated information 135a with the information which is set in “occurrence time” of the first work identification information 132a.
Hereinafter, the minimum unit of the horizontal axis of the graph of
Specifically, “occurrence time” of the information in which “data ID” is “4” in the first work identification information 132a illustrated in
Therefore, in this case, as illustrated in
Similarly, for example, as illustrated in
Next, the work identification information creation section 112 replaces the horizontal axis in
In this case, “09:20:12:483”, which is “occurrence time” of the information in which “data ID” is “4” in the first work identification information 132a, is included between “09:20:12:480” and “09:20:12:500”. The value “09:20:12:480” on the horizontal axis of the graph of
The work identification information creation section 112 creates the information to be set in “bit string” of the first work identification information 132a illustrated in
The work identification information creation section 112 sets “0000000000000101”, which is “5” in binary notation, at bit positions in the bit string illustrated in
Subsequently, the work identification information creation section 112 sets the created bit string (the bit string illustrated in
In other words, the work identification information creation section 112 includes the bit string obtained by converting the information contained in the first work identification information 132a in the first work identification information 132a. Accordingly, as described later, it becomes possible for the abnormality detection section 114 and the coincidence calculation section 115 to perform the comparison between the new work identification information which is created from a first work and the work identification information 132 which is stored in the information storage region 130 using only a comparison of the information which is set in “bit string”. Therefore, as described later, it becomes possible for the abnormality detection section 114 and the coincidence calculation section 115 to swiftly determine whether or not to determine that the first work is abnormal. Therefore, it becomes possible for a worker to determine whether or not a work which is performed on the information processing device 1 is performed by an attacker in real time, for example.
Specific Examples of Second Work Identification Information 132b
Next, description will be given of specific examples of the second work identification information 132b.
The second work identification information 132b illustrated in
Specifically, in the second work identification information 132b illustrated in
In the second work identification information 132b illustrated in
Specific Examples of Second Aggregated Information 135b
Next, description will be given of specific examples of the second aggregated information 135b. The second aggregated information 135b is information for determining the information to be set in “signature ID” of the second work identification information 132b described in
Specifically, in the second aggregated information 135b illustrated in
For example, in a case in which, of the second work identification information 132b illustrated in
Specifically, in the second work identification information 132b illustrated in
In this case, the work identification information creation section 112 specifies the information from the second aggregated information 135b illustrated in
Specific Examples of Determining Information set in “Bit String”
Next, description will be given of specific examples of determining the bit string to be set in “bit string” of the second work identification information 132b illustrated in
For example, as illustrated in
Next, in the same manner as in the case described in
Specifically, “occurrence time” of the information in which “data ID” is “3” in the second work identification information 132b is “09:20:13:797”. The “signature ID” of the information in which “data ID” is “3” in the second work identification information 132b is “A008”, and “signature value” of the information in which the “signature ID” is “A008” in the second aggregated information 135b is “8”.
Therefore, in this case, as illustrated in
In the same manner as the case described in
In the same manner as the case described in
Specific Examples of Third Work Identification Information 132c
Next, description will be given of specific examples of the third work identification information 132c.
The third work identification information 132c illustrated in
Note that, description of specific examples of cases in which the information to be set in “signature ID” and the information to be set in “bit string” of the third work identification information 132c of
Returning to
Note that, the work identification information creation section 112 may further create the feature point information 136 in which each item of information set in “bit string” of the first work identification information 132a, the second work identification information 132b, and the third work identification information 132c is associated with every work. Accordingly, in a case in which a first work is performed, as described later, it becomes possible for the abnormality detection section 114 and the coincidence calculation section 115 to determine whether or not to determine that the first work is abnormal without referring to each of the first work identification information 132a, the second work identification information 132b, and the third work identification information 132c. Hereinafter, description will be given of specific examples of the feature point information 136.
Specific Examples of Feature Point Information 136
The feature point information 136 illustrated in
Note that, the unit of “occurrence frequency” and “threshold information” is percent (%), for example. The “threshold information” in the feature point information 136 of
Specifically, in the feature point information 136 illustrated in
In the information in which “data ID” is “1”, “occurrence count” is set to “6”, “final occurrence timestamp” is set to “2015/01/18 02:10:17:310”, and “threshold information” is set to “90 (%)”. Information (a bit string) obtained by concatenating the information that is set in “bit string” of the information in which “data ID” is “1” in the first work identification information 132a of
In other words, this indicates that the information in which “data ID” is “1” in the feature point information 136 illustrated in
Process During Determination of whether or not to Determine First Work Abnormal
Next, description will be given of the process during the determination of whether or not to determine that the first work is abnormal. Note that, hereinafter, the correspondence information which is created when the first work is performed will also be referred to as correspondence information 231. Hereinafter, the new work identification information which is created when the first work is performed will also be referred to as work identification information 232 (first work identification information 232a, second work identification information 232b, and third work identification information 232c).
As illustrated in
In other words, as described later, the abnormality detection section 114 and the coincidence calculation section 115 determine whether or not to determine that the first work is abnormal by performing a comparison between the work identification information 232 based on the events which occur due to the first work being performed, and the work identification information 132 which is stored in the information storage region 130. Therefore, in the same manner as in the case described in
Next, the coincidence calculation section 115 of the information processing device 1 calculates the coincidence information 133 which is the coincidence between the information contained in the work identification information 232 which is created in S33 and the information contained in the work identification information 132 which is accumulated in the information storage region 130 (S34).
Specifically, the coincidence calculation section 115 acquires “signature ID” contained in each of the first work identification information 232a, the second work identification information 232b, and the third work identification information 232c which are created in S33, for example. The coincidence calculation section 115 refers to the feature point information 136 illustrated in
Meanwhile, in a case in which the information containing all of the acquired “signature IDs” is present, the coincidence calculation section 115 acquires the bit strings which are set in “bit string” contained in each of the first work identification information 232a, the second work identification information 232b, and the third work identification information 232c which are created in S33, for example. The coincidence calculation section 115 concatenates each acquired bit string (hereinafter, the concatenated bit strings will also be referred to as a first bit string). In this case, the coincidence calculation section 115 acquires the bit string (hereinafter, also referred to as a second bit string) which is set in “bit string” contained in the information which is present in the feature point information 136, for example. The coincidence calculation section 115 calculates the coincidence information 133 (for example 80 (%)) which is a proportion of bits in which the information matches by performing a comparison between the first bit string and the second bit string, for example.
Accordingly, it becomes possible for the coincidence calculation section 115 to calculate the coincidence information 133 used for determining whether or not it is preferable for the abnormality detection section 114 to determine that the first work is abnormal by only performing a comparison of the bit strings contained in each item of information. Therefore, it becomes possible for the abnormality detection section 114 and the coincidence calculation section 115 to swiftly determine whether or not to determine that the first work is abnormal.
Note that, when acquiring the second bit string, the coincidence calculation section 115 may acquire the bit strings which are set in “bit string” contained in each of the first work identification information 132a, the second work identification information 132b, and the third work identification information 132c, and may concatenate the acquired bit strings. The information management section 113 may store the coincidence information 133 which is calculated in S34 in the information storage region 130.
Next, as illustrated in
Specifically, in the correction coefficient information 137 illustrated in
In other words, by using the correction coefficient information 137, it becomes possible for the coincidence calculation section 115 to perform the calculation of the coincidence information 133 in a form that reflects the occurrence count of the work identification information of the same content as the work identification information 232 which is created in S33. Therefore, for example, it becomes possible for the coincidence calculation section 115 to perform adjustments such as suppression of the value of the coincidence information 133 which is calculated in S34 more the greater the occurrence count of the work identification information of the same content as the work identification information 232 which is created in S33. Hereinafter, description of a specific example of a case in which the work identification information 232 which is created in S33 corresponds to the information in which “data ID” is “3” in the feature point information 136 of
In this case, the coincidence calculation section 115 acquires “20” which is the information that is set in “occurrence count” of the information in which “data ID” is “3” in the feature point information 136 of
Returning to
Specifically, the abnormality detection section 114 acquires “90 (%)” which is the information that is set in “threshold information” of the information in which “data ID” is “3” in the feature point information 136 of
Note that, in a case in which information including all “signature IDs” of the first work identification information 232a, the second work identification information 232b, and the third work identification information 232c is present in the feature point information 136, for example, the information management section 113 may increase “occurrence count” of the information in which the feature point information 136 is present. In this case, the information management section 113 may increase the information that is set in “occurrence count” of the feature point information 136 limited to a case in which the abnormality detection section 114 determines that the first work is not abnormal (YES in S41, S43).
The coincidence calculation section 115 may perform the comparison of the first bit string with all of the bit strings contained in the feature point information 136 illustrated in
Process During Updating of Threshold Information 134
Next, description will be given of the process (hereinafter also referred to as the threshold information update process) which is executed when updating the threshold information 134. The threshold information creation section 116 of the information processing device 1 waits until the threshold information creation timing is reached (NO in S51). The threshold information creation timing may be a regular timing such as once per week, for example.
Subsequently, in a case in which the threshold information creation timing is reached (YES in S51), the threshold information creation section 116 refers to the feature point information 136 which is accumulated in the information storage region 130 (S52). Specifically, the threshold information creation section 116 refers to the information that is set in “final occurrence timestamp” contained in the feature point information 136 illustrated in
The threshold information creation section 116 determines whether or not the information that is set in “final occurrence timestamp” is earlier than a predetermined timestamp (S53). In other words, the threshold information creation section 116 determines whether or not the timestamp (hereinafter also referred to as the first timestamp) at which the work identification information 232 corresponding to each item of information contained in the feature point information 136 is previously generated is earlier than a predetermined timestamp. As a result, in a case in which the information that is set in “final occurrence timestamp” is earlier than the predetermined timestamp (YES in S53), the threshold information creation section 116 determines the information to be set in “threshold information” of the feature point information 136 which is referenced in S52 to be the first threshold (S54). Meanwhile, in a case in which the information that is set in “final occurrence timestamp” is later than the predetermined timestamp (NO in S53), the threshold information creation section 116 determines the information to be set in “threshold information” of the feature point information 136 which is referenced in S52 to be the second threshold which is a higher value than the first threshold (S55).
In other words, the threshold information creation section 116 performs adjustment of the value that is set in the feature point information 136 based on the features of the work which the worker performs on the information processing device 1. Accordingly, it becomes possible for the information processing device 1 to determine whether or not to determine that the first work is abnormal in a form that reflects the occurrence state of each work.
Specifically, in a case in which the present timestamp is 0:00, Apr. 1, 2015 and the predetermined timestamp is “3 months earlier than the present timestamp”, the “final occurrence timestamp” of the information in which “data ID” is “4” and “6” in the feature point information illustrated in
Therefore, in the example indicated by the feature point information 136 of
In a case in which the acquisition of all the information contained in all of the feature point information 136 has not been performed (NO in S56), the threshold information creation section 116 executes the processes of S52 onward again. Meanwhile, in a case in which the acquisition of all the information contained in the feature point information 136 is completed (YES in S56), the threshold information creation section 116 ends the threshold information update process.
In this manner, according to the first embodiment, the information processing device 1 creates the correspondence information 131 in which the events that occur accompanying the execution of the plurality of processes which are executed on the information processing device 1 are associated with every process based on the access information in relation to the system resources of the information processing device 1. The information processing device 1 refers to the correspondence information 131, creates the work identification information 132 which identifies each work from the events that are associated with the processes corresponding to each work for every work in which processes are executed, and accumulates the work identification information 132 in the information storage region 130.
Subsequently, in a case in which the first work for executing the first process that is executed on the information processing device 1 is performed, the information processing device 1 determines that the first work is abnormal in a case in which the new work identification information that is created from the first work is different from the work identification information 132 which is accumulated.
Accordingly, it becomes possible for the information processing device 1 to perform detection of works which may be abnormal works among the first works which are performed on the information processing device 1. It becomes possible for the worker to perform a detailed investigation of the detected works, for example.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment of the present invention has been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2015-113385 | Jun 2015 | JP | national |