Presentation | 2014-06-05 Threat and Countermeasure Against the Targeted Attack Satoru TORII, |
---|---|
PDF Download Page | ![]() |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attacks, a new approach is needed because the way of exploit has evolved. For discussing new approach, the attack scenario that can be reproduced as a reference model is needed. In this presentation the reproducible attack scenario of the targeted attack is described. This attack scenario is effective for the evaluation and the verification from various sides to the measures technology against the targeted attack. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | targeted attack / targeted mail / RAT |
Paper # | IA2014-2,ICSS2014-2 |
Date of Issue |
Conference Information | |
Committee | IA |
---|---|
Conference Date | 2014/5/29(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Internet Architecture(IA) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Threat and Countermeasure Against the Targeted Attack |
Sub Title (in English) | |
Keyword(1) | targeted attack |
Keyword(2) | targeted mail |
Keyword(3) | RAT |
1st Author's Name | Satoru TORII |
1st Author's Affiliation | Fujitsu Laboratories Ltd.() |
Date | 2014-06-05 |
Paper # | IA2014-2,ICSS2014-2 |
Volume (vol) | vol.114 |
Number (no) | 70 |
Page | pp.pp.- |
#Pages | 2 |
Date of Issue |