APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Fujitsu's High-Speed Forensic Technology to Analyze Cyber Attack Impacts

    Traditional methods used to assess the damage created by malware attacks on a particular organization require analyzing all sorts of logs on networks and PCs  

    Fujitsu's High-Speed Forensic Technology to Analyze Cyber Attack Impacts

    By

    Apac CIOOutlook | Thursday, May 19, 2016

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    KAWASAKI, JP: Fujitsu announces the development of a new technology that responds by analyzing the damage and Impact of a cyber attack, immediately after the attack is detected. The technology analyzes the status of a targeted cyber-attack in a short period of time and shows the whole picture at a glance.

    Cyber attacks have increased in recent times, targeting specific organization or individuals. Cyber criminals are infecting organizations with malware, which they later use to leak confidential information which is dangerous to both the organization as well as its partners. Preventing these sorts of malware attacks is extremely difficult resulting in a mounting need for countermeasures to be formulated against malware intrusion.

    Traditional methods used to assess the damage created by malware attacks on a particular organization require analyzing all sorts of logs on networks and PCs. This method is time consuming and is unable to give a complete picture of the severity of the attack as only fragmentary information can be gained by each log. Other methods include collecting and analyzing network communications constantly but due to the enormous volume of data involved, it is difficult to collect and analyze the data.

    Taking the above challenges into consideration Fujitsu Laboratories has now developed technology to quickly analyze the status of a targeted cyber-attack and show the whole picture at a glance. The key features of the technology include Trace collection technology and Attack progress status extraction technology.

    Check Out: Top Digital Forensics Service Companies

    Trace collection technology

    This technology collects communications data flowing through the network, and then, by inferring from the communications data the commands carried out on the PC, it abstracts the huge volume of communications data at the operation level and compresses it. Furthermore, by efficiently connecting command operations with specified user information, it can identify who executed what type of remote control and collect trace information about command operations. This enables communications data flowing through a network to be compressed to about 1/10,000th the scale for storage.

    Attack progress status extraction technology

    Analyzing the trace information collected with the above technology by distinguishing between communications generated by ordinary tasks and communications with a high probability of being attacks on the basis of defined actions characteristic of targeted cyber-attacks, this technology can extract the state of progress of an attack in a short period of time.

     By installing an analysis system incorporating these technologies into an internal network with a high volume of communications, it becomes possible to extract a series of command operations from a specific PC from amongst a day's worth of communication trace logs in a few seconds or a few tens of seconds, for example. In this way, users of this newly developed analysis system can constantly collect and investigate these traces, so when a targeted cyber-attack is detected, PCs related to the attack can be extracted one after another, and because the attack status is automatically drawn as a bird's-eye view, it is possible to grasp the whole picture of the attack at a glance.

    Implementing this newly developed technology, security incident analysis can be performed by non-experts as compared to experts previously. This technology also saves time by responding with the required countermeasures to be made before the damage caused by the cyber-attack spreads.

    More in News

    Harnessing Big Data Analytics to Enhance Business Strategies

    Harnessing Big Data Analytics to Enhance Business Strategies

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Impact of Digital Transformation on Retail

    Impact of Digital Transformation on Retail

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/fujitsus-highspeed-forensic-technology-to-analyze-cyber-attack-impacts-nwid-2016.html