Thursday, September 20, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Nintendo Switch Online has Arrived
Cadence Tensilica DNA 100 Processor IP for On-Device AI
ASUS RoG Announces ROG Delta and ROG Delta Core Headsets
Fitbit Launches Fitbit Care Health Platform for Wellness and Disease Management
China Plans to Strengthen Security of Internet of Things With Laws and New OS
GIGABYTE Releases New NVMe M.2 SSDs
Toshiba Memory Accelerates 96-layer 3D flash Memory Production, Sticks with IPO Plans
New Sony PlayStation Classic Comes With 20 Pre-Loaded Games
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Fujitsu...
Last 7 Days News : SU MO TU WE TH FR SA All News

Saturday, May 14, 2016
Fujitsu Technology Analyzes Cyber Attacks


Fujitsu has developed a new technology that rapidly analyzes damage status after detexting a cyber attack against businesses.

In the event of malware attacks, it was previously necessary to analyze a range of logs on networks and devices to clarify attack status. However, in order to grasp the whole picture of the attack, analysis by an expert over the course of many hours was required.

By automating and improving the efficiency of the information collection components necessary for attack status analysis via network communications analysis, Fujitsu Laboratories has developed forensics technology to analyze the status of a targeted cyber-attack in a short period of time and show the whole picture at a glance.

Fujitsu's technology collects data flowing through the network, and then, by inferring from the communications data the commands carried out on the PC, it abstracts the huge volume of communications data at the operation level and compresses it. Furthermore, by efficiently connecting command operations with specified user information, it can identify who executed what type of remote control and collect trace information about command operations. This enables communications data flowing through a network to be compressed to about 1/10,000th the scale for storage.

Analyzing the trace information collected with the above technology by distinguishing between communications generated by ordinary tasks and communications with a high probability of being attacks on the basis of defined actions characteristic of targeted cyber-attacks, this technology can extract the state of progress of an attack in a short period of time.

By installing an analysis system incorporating these technologies into an internal network with a high volume of communications, it becomes possible to extract a series of command operations from a specific PC from amongst a day's worth of communication trace logs in a few seconds or a few tens of seconds, for example. In this way, users of this newly developed analysis system can constantly collect and investigate these traces, so when a targeted cyber-attack is detected, PCs related to the attack can be extracted one after another, and because the attack status is automatically drawn as a bird's-eye view, it is possible to grasp the whole picture of the attack at a glance.

Fujitsu will continue to improve this technology's functions, aiming for a practical implementation in fiscal 2016 and incorporation into services provided by Fujitsu Limited after fiscal 2016.



Previous
Next
Anti-Counterfeit Group Suspends Alibaba Membership        All News        French Distributor Says New Sony PS4 NEO Console Will Launch This Fall
Anti-Counterfeit Group Suspends Alibaba Membership     General Computing News      Sony To Resume Wafer Processing Operations After Earthquake

Get RSS feed Easy Print E-Mail this Message

Related News
These Are The Post-K's A64FX CPU Specifications
UMC Buys Mie Fujitsu Semiconductor
Fujitsu Launches Quantum-Inspired Digital Annealer Cloud Service
U.S. Sanctions Russian Cyber Actors for Cyber-Attacks
Peer-to-peer App Kicked off Dofoil Coin Miner Outbreak
Fujitsu Releases with the new 2 in 1 Tablet STYLISTIC Q738
U.S. Takes Down Cybercriminal Enterprise Responsible for More than $530 Million in Losses
Fujitsu to Sell Stake in Mobile Phone Unit to Polaris
Fujitsu in Talks to Sell Mobile Phone Business
Fujitsu Unveils Next-Generation ETERNUS All-Flash and Hybrid Storage Systems
Fujitsu Releases New Enterprise Tablet and PC Models
Fujitsu and The Shinano Mainichi Shimbun Create AI-Based System to Automate Article Summaries

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .