Presentation 2015-10-15
Intrusion Path Prediction of Advanced Persistent Threat
Yasuhiro Teramoto, Bo Hu, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recent year, Cyber targeted attack becomes more sophisticated and threaten the organizations in the world. The targeted attack is difficult to protect on the border of network because attackers often try to compromise endpoint equipment via email or HTTP web site. Furthermore once an endpoint equipment is compromised, the attacker tries to expand the compromised area of network. So once the trace of targeted attack is detected by security devices, security operator have to immediately response the incident. The purpose of incident response in early stage isthe deterrence of current attack and next attacker's action until forensic analyzation using the information of security equipment's alert. In this paper, we suggest the novel approach to modelize the attack phase and to guess the past and future attack path from security alerts.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Security / Security Orchestration / Targeted Attack
Paper # IN2015-54
Date of Issue 2015-10-08 (IN)

Conference Information
Committee IN
Conference Date 2015/10/15(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Osaka University
Topics (in Japanese) (See Japanese page)
Topics (in English) Contingency Plan/BCP, Robustness, Security and Privacy, Authentication/ID management, Web Service/SOA/ROA Platform, Social Networking Service (SNS), etc.
Chair Hidetsugu Kobayashi(NTT)
Vice Chair Katsunori Yamaoka(Tokyo Inst. of Tech.)
Secretary Katsunori Yamaoka(NTT)
Assistant Yuichi Sudo(NTT) / Kunitake Kaneko(Keio Univ.)

Paper Information
Registration To Technical Committee on Information Networks
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Intrusion Path Prediction of Advanced Persistent Threat
Sub Title (in English)
Keyword(1) Security
Keyword(2) Security Orchestration
Keyword(3) Targeted Attack
1st Author's Name Yasuhiro Teramoto
1st Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
2nd Author's Name Bo Hu
2nd Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
3rd Author's Name Toshiharu Kishi
3rd Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
4th Author's Name Yukio Nagafuchi
4th Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
5th Author's Name Takaaki Koyama
5th Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
6th Author's Name Hideo Kitazume
6th Author's Affiliation Nippon Telegraph and Telephone Corporation(NTT)
Date 2015-10-15
Paper # IN2015-54
Volume (vol) vol.115
Number (no) IN-252
Page pp.pp.7-12(IN),
#Pages 6
Date of Issue 2015-10-08 (IN)