Paper Abstract and Keywords |
Presentation |
2015-03-03 15:40
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, complicated and advanced, it is absolutely essential to collect variety of cyber-attack information and to effectively analyze the cyber-attack information from the different sources in order to achieve a proactive response against cyber-attacks based on the correlation analysis.
However, under the existing analysis environment, cyber-attack information from the multiple sources are not normalized and not suitable for correlation analysis.
Therefore, we propose a method to add tag information for correlation and integrated analysis for cyber-attack information. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Cyber-Attack Information / Tag / Normalization / PRACTICE / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 114, no. 489, ICSS2014-69, pp. 37-42, March 2015. |
Paper # |
ICSS2014-69 |
Date of Issue |
2015-02-24 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2014-69 |
Conference Information |
Committee |
ICSS |
Conference Date |
2015-03-03 - 2015-03-04 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Meio Univiersity |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Communication Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2015-03-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique |
Sub Title (in English) |
|
Keyword(1) |
Cyber-Attack Information |
Keyword(2) |
Tag |
Keyword(3) |
Normalization |
Keyword(4) |
PRACTICE |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Taichi Hata |
1st Author's Affiliation |
Japan Datacom Co., Ltd/Nissin inc., (JDC/Nissin) |
2nd Author's Name |
Manabu Inuma |
2nd Author's Affiliation |
Josai University (Josai Univ.) |
3rd Author's Name |
Junji Shikata |
3rd Author's Affiliation |
Yokohama National University (Yokohama National Univ.) |
4th Author's Name |
Shin Takeuchi |
4th Author's Affiliation |
Japan Datacom Co., Ltd/Nissin inc., (JDC/Nissin) |
5th Author's Name |
Koji Nakao |
5th Author's Affiliation |
National Institute of Information and Communications Technology (NICT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-03-03 15:40:00 |
Presentation Time |
25 minutes |
Registration for |
ICSS |
Paper # |
ICSS2014-69 |
Volume (vol) |
vol.114 |
Number (no) |
no.489 |
Page |
pp.37-42 |
#Pages |
6 |
Date of Issue |
2015-02-24 (ICSS) |
|