Abstract
This paper introduces the high-speed forensics technology that promptly analyzes the damage after the targeted cyber attack had been detected and visualizes the whole picture of the attack by binding the communication packets and users’ logs.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
1 Introduction
The targeted attacks to aim to steal information from government and municipal offices and specific enterprises and individuals keep increasing every year, and the way of the attack is becoming clever more and more. In the targeted attacks the attacker obstinately attacks the target after investigating it enough beforehand and the risk that the malware (malicious and illegal codes) intrude into an internal network rises. Therefore, there is a pressing need for countermeasures predicted on malware intrusion. It is important to detect the attack activity as soon as possible and make a suitable response to suppress damage to the minimum before the attack extends. To achieve appropriate response, the authors developed the high-speed forensics technology that promptly analyzes the situation of damage after the attack had been detected. Up to now it had taken long time for the analysis of the security incident and accident, but it is able to do it by applying the high-speed forensic technology in a short time and take inclusive measures promptly before damage expands.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Unno, Y., Oikawa, T., Furukawa, K., Morinaga, M., Takenaka, M., Izu, T. (2018). High-Speed Forensic Technology Against Targeted Cyber Attacks (Extended Abstract). In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_85
Download citation
DOI: https://doi.org/10.1007/978-3-319-65521-5_85
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65520-8
Online ISBN: 978-3-319-65521-5
eBook Packages: EngineeringEngineering (R0)