To detect cyber attacks efficiently.SOLUTION: A blacklist setting device 10 acquires cyber attack information from an attack source IP address observed on the Internet and calculates a time series attack frequency for each attack source IP address from the acquired cyber attack information. The black list setting device 10 predicts the attack frequency after a predetermined time from the current for each attack source IP address on the basis of the calculated attack frequency and selects the attack source IP address to be set in the blacklist of network equipment in accordance with the predicted attack frequency,.SELECTED DRAWING: Figure 1
展开▼