To subscribe, advertise or contribute articles to www.asiamanufacturingnewstoday.com contact publisher@xtra.co.nz
  • Home
  • Advertise
  • Subscribe
  • Archives
Asia Manufacturing News
The official site for the Asia Manufacturing News magazine
  • Home
  • AI
  • Analysis
  • Aviation
  • Big Data
  • Business News
  • Calendar
  • Case Studies
  • Change the Conversation
  • Climate Change
  • Covid-19
  • Developments
  • Energy
  • Engineering
  • Events
  • Manufacturing Technology
  • Innovators
  • IoT
  • Manufacturing Technology
  • News
  • Product News
  • Smart Manufacturing
  • The Creative Class
  • The Interview
  • Webinars

News Ticker

CeMAT Southeast Asia returns to Singapore 
HRS Heat Exchangers, Stand AJ51, ProPak Asia 2025, Bangkok, Thailand
Embracing Automation: Addressing ASEAN’s Manufacturing Challenges
Operationalising AI for Manufacturing in ASEAN
Sumitomo Rubber Industries selects Rockwell Automation to standardise global plant operations
SANY Empowers Intelligent Port Construction to Achieve Major Breakthrough
Founder Group secures multiple contracts worth approximately US$5.5 million
Malaysia’s nearshoring edge: A gateway to Southeast Asia

Fujitsu develops cyber attack technology

KAWASAKI, Japan- Fujitsu Laboratories Ltd. today announced the development of new technology that, in response to targeted cyber-attacks on specific organizations, rapidly analyses damage status after an attack has been detected.

In the event of malware attacks, which infect organizations to cause a great deal of damage, including information leaks, it was previously necessary to analyse a range of logs on networks and devices to clarify attack status. However, in order to grasp the whole picture of the attack, analysis by an expert over the course of many hours was required.

Now, by automating and improving the efficiency of the information collection components necessary for attack status analysis via network communications analysis, Fujitsu Laboratories has developed forensics technology to analyze the status of a targeted cyber-attack in a short period of time and show the whole picture at a glance.

This means that it has become possible to do security incident analysis, which previously required an expert and took a great deal of time, in a short period without an expert, and come up with rapid and comprehensive countermeasures before the damage spreads.

This technology will be exhibited at Fujitsu Forum 2016, to be held on May 19 and 20 at Tokyo International Forum.

Background

In recent years there has been a sharp rise in increasingly ingenious targeted cyber-attacks that aim to steal particular information from specific organizations or individuals. After having infected an organization, attackers can remotely control their malware, causing important information to be leaked outside the organization. This results in huge damage, not only to the organization attacked but also to its partners and customers.

As this sort of malware attack is extremely difficult to completely prevent, there is a pressing need for countermeasures predicated on malware intrusion.

Issues

At present, the usual method to assess the damage of a malware attack that has infected an organization is to analyze all sorts of logs on networks and PCs. Because only fragmentary information can be gained from each log, however, grasping the whole picture of the damage required an expert to spend a great deal of time analyzing it.

There is also a method in which network communications are collected and analyzed constantly, but because the volume of network communications is so enormous, collecting everything has its own costs. Moreover, even with communications analysis, not only is it not possible-just through this analysis-to determine if an attack communication through malware remote control is an attack or just ordinary communications, efficiently analyzing only those communications related to an attack is extremely difficult as they are hidden in the huge volume of communications from ordinary tasks, such as email and web browsing.

About the Technology

By automatically analyzing massive volumes of network communications for the information collection components necessary for attack damage analysis, Fujitsu Laboratories has now developed technology to quickly analyze the status of a targeted cyber-attack and show the whole picture at a glance.

Key features of the technology are as follows:

1. Trace collection technology

This technology collects communications data flowing through the network, and then, by inferring from the communications data the commands carried out on the PC, it abstracts the huge volume of communications data at the operation level and compresses it. Furthermore, by efficiently connecting command operations with specified user information, it can identify who executed what type of remote control and collect trace information about command operations. This enables communications data flowing through a network to be compressed to about 1/10,000th the scale for storage.

2. Attack progress status extraction technology

Analyzing the trace information collected with the above technology by distinguishing between communications generated by ordinary tasks and communications with a high probability of being attacks on the basis of defined actions characteristic of targeted cyber-attacks, this technology can extract the state of progress of an attack in a short period of time.

By installing an analysis system incorporating these technologies into an internal network with a high volume of communications, it becomes possible to extract a series of command operations from a specific PC from amongst a day’s worth of communication trace logs in a few seconds or a few tens of seconds, for example. In this way, users of this newly developed analysis system can constantly collect and investigate these traces, so when a targeted cyber-attack is detected, PCs related to the attack can be extracted one after another, and because the attack status is automatically drawn as a bird’s-eye view, it is possible to grasp the whole picture of the attack at a glance.

Effects

With this newly developed technology, security incident analysis, which previously had to be entrusted to an expert and which took a great deal of time, can now be done in a short period, even by non-experts. As a result, when suffering a targeted cyber-attack, it has become possible to rapidly and comprehensively take countermeasures before the damage spreads.

Future Plans

Fujitsu Laboratories will continue to improve this technology’s functions, including improving operability, aiming for a practical implementation in fiscal 2016 and incorporation into services provided by Fujitsu Limited after fiscal 2016.

 

Share this:

Related Posts

Online exhibitiom

Manufacturing Technology /

Asia Industrial Online Exhibition 2025

Terrence Lim

Manufacturing Technology /

Driving sustainable manufacturing in ASEAN: The ripple effect of validated net-zero commitments

inter airport

Manufacturing Technology /

inter airport Southeast Asia 2025 sets a new benchmark for attendance

‹ From challenges to opportunities: favourable climate for the plastics industry › Crown’s internal combustion range provides greater choice in Southeast Asia

26th May 2025

Recent Posts

  • Asia Industrial Online Exhibition 2025
  • Secutech 2025 to uncover range of advanced security and fire safety solutions 
  • CeMAT Southeast Asia returns to Singapore 
  • AVEVA partners with ServiceNow to drive Industrial Transformation
  • Driving sustainable manufacturing in ASEAN: The ripple effect of validated net-zero commitments
  • inter airport Southeast Asia 2025 sets a new benchmark for attendance
  • HRS Heat Exchangers, Stand AJ51, ProPak Asia 2025, Bangkok, Thailand
  • Embracing Automation: Addressing ASEAN’s Manufacturing Challenges
  • DigiTech ASEAN Thailand returns this November 
  • SPS – Smart Production Solutions Guangzhou to open on 25 February

Categories

  • AI
  • Analysis
  • Aviation
  • Big Data
  • Business News
  • Calendar
  • Case Studies
  • Change the Conversation
  • Climate Change
  • Covid-19
  • Developments
  • Energy
  • Engineering
  • Events
  • Innovators
  • IoT
  • Manufacturing Technology
  • Manufacturing Technology
  • News
  • Product News
  • Smart Manufacturing
  • The Creative Class
  • The Interview
  • Uncategorized
  • Webinars

Archives

Back to Top

  • Home
  • AI
  • Analysis
  • Aviation
  • Big Data
  • Business News
  • Calendar
  • Case Studies
  • Change the Conversation
  • Climate Change
  • Covid-19
  • Developments
  • Energy
  • Engineering
  • Events
  • Manufacturing Technology
  • Innovators
  • IoT
  • Manufacturing Technology
  • News
  • Product News
  • Smart Manufacturing
  • The Creative Class
  • The Interview
  • Webinars

To subscribe, advertise or contribute articles to asiamanufacturingnewstoday.com contact publisher@xtra.co.nz

(c) Asia Manufacturing News, 2025