Presentation 2013-07-19
Network Observation and Analysis Report on nicter : Malware infection to Embedded Systems
Junji NAKAZATO, Junpei SHIMAMURA, Masashi ETO, Daisuke INOUE, Koji NAKAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In this paper, we reported events of network incident using a large-scale traffic which can be obtained with the darknet that is observed in the nicter project. Bot-net that infects the router in Feb. 2012 became a hot topic, and we took a interest in malware infection to the embedded systems. In recent years, a lot of systems is connected to the Internet, it is important to prevent such a threat. In this paper, we report events that made the scanning activity like a bot-net by embedded systems with malware infection.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Incident analysis / Malware / Dynamic Analysis
Paper # ISEC2013-48,SITE2013-43,ICSS2013-53,EMM2013-50
Date of Issue

Conference Information
Committee SITE
Conference Date 2013/7/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Network Observation and Analysis Report on nicter : Malware infection to Embedded Systems
Sub Title (in English)
Keyword(1) Incident analysis
Keyword(2) Malware
Keyword(3) Dynamic Analysis
1st Author's Name Junji NAKAZATO
1st Author's Affiliation National Institute of Information and Communications Technology()
2nd Author's Name Junpei SHIMAMURA
2nd Author's Affiliation clwit Inc.
3rd Author's Name Masashi ETO
3rd Author's Affiliation National Institute of Information and Communications Technology
4th Author's Name Daisuke INOUE
4th Author's Affiliation National Institute of Information and Communications Technology
5th Author's Name Koji NAKAO
5th Author's Affiliation National Institute of Information and Communications Technology
Date 2013-07-19
Paper # ISEC2013-48,SITE2013-43,ICSS2013-53,EMM2013-50
Volume (vol) vol.113
Number (no) 136
Page pp.pp.-
#Pages 5
Date of Issue