APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • News
    Editor's Pick (1 - 4 of 8)
    left
    The Organization's Responsibility for its Own Protection

    Michael Wallmannsberger, Chief Information Security Officer, Wynyard Group

    Don't Rush to Hire an Anti-DDoS Expert!

    Barry Greene, Co-founder and Chief, Technical Officer, GETIT

    Attaining the Needs of Infrastructure Investment

    Yong Chiang Neo, CIO

    Constructing a Marketing IT Collaboration

    Jenny Williams,

    The Organic Adaptability of IT

    Pedro Sttau,

    The Weakest Link Is Your Strongest Security Asset

    Christian Anschuetz, CIO & Security Practitioner, UL

    Achieving Greater Business Value with Innovation

    Denise A. Saiki, CIO& VP Enterprise Business Services, Lockheed Martin

    Using Data Analytics for Loss Prevention

    Jonathan Lowsley, CIO, ADrive

    right

    Fujitsu's High-Speed Forensic Technology to Analyze Cyber Attack Impacts

    apacciooutlook | Thursday, May 19, 2016

    Tweet

    KAWASAKI, JP: Fujitsu announces the development of a new technology that responds by analyzing the damage and Impact of a cyber attack, immediately after the attack is detected. The technology analyzes the status of a targeted cyber-attack in a short period of time and shows the whole picture at a glance.

    Cyber attacks have increased in recent times, targeting specific organization or individuals. Cyber criminals are infecting organizations with malware, which they later use to leak confidential information which is dangerous to both the organization as well as its partners. Preventing these sorts of malware attacks is extremely difficult resulting in a mounting need for countermeasures to be formulated against malware intrusion.

    Traditional methods used to assess the damage created by malware attacks on a particular organization require analyzing all sorts of logs on networks and PCs. This method is time consuming and is unable to give a complete picture of the severity of the attack as only fragmentary information can be gained by each log. Other methods include collecting and analyzing network communications constantly but due to the enormous volume of data involved, it is difficult to collect and analyze the data.

    Taking the above challenges into consideration Fujitsu Laboratories has now developed technology to quickly analyze the status of a targeted cyber-attack and show the whole picture at a glance. The key features of the technology include Trace collection technology and Attack progress status extraction technology.

    Check Out: Top Digital Forensics Service Companies

    Trace collection technology

    This technology collects communications data flowing through the network, and then, by inferring from the communications data the commands carried out on the PC, it abstracts the huge volume of communications data at the operation level and compresses it. Furthermore, by efficiently connecting command operations with specified user information, it can identify who executed what type of remote control and collect trace information about command operations. This enables communications data flowing through a network to be compressed to about 1/10,000th the scale for storage.

    Attack progress status extraction technology

    Analyzing the trace information collected with the above technology by distinguishing between communications generated by ordinary tasks and communications with a high probability of being attacks on the basis of defined actions characteristic of targeted cyber-attacks, this technology can extract the state of progress of an attack in a short period of time.

     By installing an analysis system incorporating these technologies into an internal network with a high volume of communications, it becomes possible to extract a series of command operations from a specific PC from amongst a day's worth of communication trace logs in a few seconds or a few tens of seconds, for example. In this way, users of this newly developed analysis system can constantly collect and investigate these traces, so when a targeted cyber-attack is detected, PCs related to the attack can be extracted one after another, and because the attack status is automatically drawn as a bird's-eye view, it is possible to grasp the whole picture of the attack at a glance.

    Implementing this newly developed technology, security incident analysis can be performed by non-experts as compared to experts previously. This technology also saves time by responding with the required countermeasures to be made before the damage caused by the cyber-attack spreads.

    tag

    cyber criminals

    cyber attack

    Weekly Brief

    loading
    ON THE DECK
    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    High-Performance Computing Fuels APAC’s AI Breakthroughs

    Navigating the Future of Digital Transformation in APAC’s Diverse Business Landscape

    Managing Internal and External API's for Business Excellence

    Highly-Functional Material Week Osaka 2025 Positions Japan at the Centre of Global Innovation, To Unveil the Future of Materials

    Enhancing Cyber Defense with Predictive Analytics and AI

    The Upcoming Shift in Wireless Connectivity with Wi-Fi 7

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/fujitsu-s-highspeed-forensic-technology-to-analyze-cyber-attack-impacts-nwid-2016.html