Presentation 2014-10-07
Recent cyber attack methodology and protection : The Consideration based on Interop Tokyo 2014 ShowNet Security
Kenichiro HASHIMOTO, Takashi TOMINE, Yuji SEKIYA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes, not only cyber war between countries, but also everything connected to the Internet has been encountered by cyber attack, damage of personal information and stolen intellectual properties has been increased and very serious. In this paper, with the data from ShowNet security system, recent cyber security methodology, the counter technology and how advanced security systems are considered and should be built with multiple technologies in multiple layers. Cyber attack with IPv6 protocol was also seen to start during the trade show. From the threat on the infrastructure in the trade show in short term, the daily threat from the Internet is guessed, future trend of threat and significant defense methodologies of cyber security are considered.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cyber attack / Advance Persistent Threat / APT / IPv6 / defense of depth / Dark Net / Scan
Paper # IA2014-33
Date of Issue

Conference Information
Committee IA
Conference Date 2014/9/30(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Recent cyber attack methodology and protection : The Consideration based on Interop Tokyo 2014 ShowNet Security
Sub Title (in English)
Keyword(1) Cyber attack
Keyword(2) Advance Persistent Threat
Keyword(3) APT
Keyword(4) IPv6
Keyword(5) defense of depth
Keyword(6) Dark Net
Keyword(7) Scan
1st Author's Name Kenichiro HASHIMOTO
1st Author's Affiliation FireEye, K. K.()
2nd Author's Name Takashi TOMINE
2nd Author's Affiliation National Institute of Information and Communications Technology
3rd Author's Name Yuji SEKIYA
3rd Author's Affiliation Information Technology Center, The University Tokyo
Date 2014-10-07
Paper # IA2014-33
Volume (vol) vol.114
Number (no) 236
Page pp.pp.-
#Pages 6
Date of Issue