SG10201706430PA - Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus - Google Patents

Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus

Info

Publication number
SG10201706430PA
SG10201706430PA SG10201706430PA SG10201706430PA SG10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA SG 10201706430P A SG10201706430P A SG 10201706430PA
Authority
SG
Singapore
Prior art keywords
cyber
attack analysis
analysis supporting
recording medium
attack
Prior art date
Application number
SG10201706430PA
Inventor
Yamada Koji
Yoshimura Kunihiko
Tanabe Kouta
SATOMI Toshitaka
Masuoka Ryusuke
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Publication of SG10201706430PA publication Critical patent/SG10201706430PA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
SG10201706430PA 2016-08-26 2017-08-07 Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus SG10201706430PA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2016166294A JP6786960B2 (en) 2016-08-26 2016-08-26 Cyber attack analysis support program, cyber attack analysis support method and cyber attack analysis support device

Publications (1)

Publication Number Publication Date
SG10201706430PA true SG10201706430PA (en) 2018-03-28

Family

ID=59626450

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201706430PA SG10201706430PA (en) 2016-08-26 2017-08-07 Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus

Country Status (4)

Country Link
US (1) US10476904B2 (en)
EP (1) EP3287928A1 (en)
JP (1) JP6786960B2 (en)
SG (1) SG10201706430PA (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9043903B2 (en) * 2012-06-08 2015-05-26 Crowdstrike, Inc. Kernel-level security agent
US10289405B2 (en) 2014-03-20 2019-05-14 Crowdstrike, Inc. Integrity assurance and rebootless updating during runtime
US10958667B1 (en) 2016-06-03 2021-03-23 Mcafee Llc Determining computing system incidents using node graphs
US10277735B2 (en) * 2017-03-10 2019-04-30 Neustar, Inc. Individual telephone number assignment
US10798112B2 (en) 2017-03-30 2020-10-06 Fireeye, Inc. Attribute-controlled malware detection
US10848397B1 (en) * 2017-03-30 2020-11-24 Fireeye, Inc. System and method for enforcing compliance with subscription requirements for cyber-attack detection service
US10791138B1 (en) 2017-03-30 2020-09-29 Fireeye, Inc. Subscription-based malware detection
US10785239B2 (en) * 2017-12-08 2020-09-22 Mcafee, Llc Learning maliciousness in cybersecurity graphs
US10740459B2 (en) 2017-12-28 2020-08-11 Crowdstrike, Inc. Kernel- and user-level cooperative security processing
JP6977625B2 (en) * 2018-03-07 2021-12-08 富士通株式会社 Evaluation program, evaluation method and evaluation device
KR102118187B1 (en) * 2018-05-25 2020-06-02 국방과학연구소 Method and apparatus for cyber threat intelligence classification
KR102117696B1 (en) * 2018-06-08 2020-06-01 아주대학교산학협력단 Method and apparatus for security vulnerability quantification using game theory
WO2020080047A1 (en) * 2018-10-17 2020-04-23 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Incursion location identification device and incursion location identification method
US11741196B2 (en) 2018-11-15 2023-08-29 The Research Foundation For The State University Of New York Detecting and preventing exploits of software vulnerability using instruction tags
JP7243329B2 (en) * 2019-03-15 2023-03-22 日本電気株式会社 Computer program, event anomaly detection method, and computer
US11431734B2 (en) * 2019-04-18 2022-08-30 Kyndryl, Inc. Adaptive rule generation for security event correlation
US11736498B1 (en) * 2019-08-29 2023-08-22 Trend Micro Incorporated Stateful detection of cyberattacks
CA3168656A1 (en) * 2020-01-22 2021-07-29 Siemens Industry, Inc. Real-time and independent cyber-attack monitoring and automatic cyber-attack response system
JP7359002B2 (en) * 2020-01-23 2023-10-11 株式会社デンソー Cyber attack analysis support device
CN111343161B (en) * 2020-02-14 2021-12-10 平安科技(深圳)有限公司 Abnormal information processing node analysis method, abnormal information processing node analysis device, abnormal information processing node analysis medium and electronic equipment
CN111988322B (en) * 2020-08-24 2022-06-17 北京微步在线科技有限公司 Attack event display system
JP7408530B2 (en) 2020-11-13 2024-01-05 株式会社日立製作所 Security management system and security management method
US11907873B1 (en) * 2021-01-12 2024-02-20 Wells Fargo Bank, N.A. Systems and methods for business syndicate geolocated skill matching
CN114785579B (en) * 2022-04-14 2022-11-25 福建实达集团股份有限公司 Network attack analysis method and server applied to cloud side-end computing

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7246156B2 (en) 2003-06-09 2007-07-17 Industrial Defender, Inc. Method and computer program product for monitoring an industrial network
US20070140131A1 (en) * 2005-12-15 2007-06-21 Malloy Patrick J Interactive network monitoring and analysis
US7530105B2 (en) * 2006-03-21 2009-05-05 21St Century Technologies, Inc. Tactical and strategic attack detection and prediction
JP4773332B2 (en) 2006-12-28 2011-09-14 三菱電機株式会社 Security management apparatus, security management method, and program
US9746985B1 (en) * 2008-02-25 2017-08-29 Georgetown University System and method for detecting, collecting, analyzing, and communicating event-related information
US9760697B1 (en) * 2013-06-27 2017-09-12 Interacvault Inc. Secure interactive electronic vault with dynamic access controls
US9870465B1 (en) * 2013-12-04 2018-01-16 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US9886581B2 (en) 2014-02-25 2018-02-06 Accenture Global Solutions Limited Automated intelligence graph construction and countermeasure deployment
CN106105112B (en) 2014-03-19 2019-08-27 日本电信电话株式会社 Analysis rule adjusts device, analysis rule adjustment system and analysis rule method of adjustment
US9686308B1 (en) * 2014-05-12 2017-06-20 GraphUS, Inc. Systems and methods for detecting and/or handling targeted attacks in the email channel
JP6258189B2 (en) 2014-12-24 2018-01-10 日本電信電話株式会社 Specific apparatus, specific method, and specific program
US10061824B2 (en) * 2015-01-30 2018-08-28 Splunk Inc. Cell-based table manipulation of event data
US9699205B2 (en) * 2015-08-31 2017-07-04 Splunk Inc. Network security system
DE102015115672A1 (en) * 2015-09-17 2017-03-23 Peter Kämper Pre-Crime procedure and system for predictable defense against hacker attacks
US11558407B2 (en) * 2016-02-05 2023-01-17 Defensestorm, Inc. Enterprise policy tracking with security incident integration

Also Published As

Publication number Publication date
JP6786960B2 (en) 2020-11-18
EP3287928A1 (en) 2018-02-28
US10476904B2 (en) 2019-11-12
JP2018032355A (en) 2018-03-01
US20180063177A1 (en) 2018-03-01

Similar Documents

Publication Publication Date Title
SG10201706430PA (en) Non-transitory recording medium recording cyber-attack analysis supporting program, cyber-attack analysis supporting method, and cyber-attack analysis supporting apparatus
SG11202002740SA (en) Face pose analysis method and apparatus, device, storage medium, and program
SG11201802985PA (en) Method and apparatus for initiating an operation using voice data
EP3324183A4 (en) Image analysis device, image analysis method, image analysis system, image analysis program, and recording medium
GB2527883B (en) Information processing apparatus, method therefor, and measurement apparatus
SG10201510145YA (en) Liquid processing method, liquid processing apparatus and recording medium
SG11201701125SA (en) Image processing apparatus, image processing method, recording medium, and program
KR102217253B9 (en) Apparatus and method for analyzing behavior pattern
SG10201408497VA (en) Evaluation method, evaluation apparatus, and recording medium
HK1252835A1 (en) Service support apparatus, service support method and program
GB201617760D0 (en) Video processing apparatus, video processing method, program, and medium
EP3382610A4 (en) Data analysis apparatus, method, and program
GB201808922D0 (en) Device, method, and recording medium
HK1248900A1 (en) Data analysis apparatus and data analysis method
GB2549642B (en) Image processing device and method, program, and record medium
PL3098813T3 (en) Linear predictive analysis apparatus, method, program and recording medium
GB201814927D0 (en) Analysis device, analysis method and storage medium which stores program
SG11201802898PA (en) Method and apparatus for address analysis
PL3462453T3 (en) Linear predictive analysis apparatus, method, program and recording medium
PL3648103T3 (en) Decoding method, decoding apparatus, corresponding program and recording medium
HK1232331A1 (en) Program, information processing apparatus, control method, and recording medium
HK1232330A1 (en) Program, information processing apparatus, depth definition method, and recording medium
GB2565954B (en) Method and apparatus for analyzing biomolecules
SG11202004732QA (en) Analysis method, analysis device, analysis program, and recording medium for recording analysis program
GB201502447D0 (en) Method and apparatus for sample analysis