Top of page
Content Area

Intelligence generation and distribution technologies for malware countermeasures

NTT SPL researches and develops cyber security intelligence generation/distribution technologies to combat sophisticated cyber attacks.

  • (1) Web crawler-type honeypots that emumerate accesible URLs by emulating multiple client environments analyze them using machine learning techniques including deep learning.
  • (2) Domain name reputation technology that uses information independently accumulated by NTT SPL and public information.
  • (3) Domain name categolization technology that presents the granularity of measures against malicious domain names using their generated structure.
  • (4) Platforms for providing security intelligence based on user requests by combining our state-of-the-art technologies

OverviewOverview

LRR: Platform for collaborative cyber defenseLRR: Platform for collaborative cyber defense

Promotion Videos

Related Articles

  • Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto: "Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations", Proceedings of the 18th International Conference on Web Information Systems Engineering (WISE), Oct 2017
  • Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, and Takeshi Yada: "Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities", Proceedings of the 41th Annual IEEE Computer Software and Applications Conference (COMPSAC), July 2017
  • Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, and Shigeki Goto: "DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names", Proceedings of the 41th Annual IEEE Computer Software and Applications Conference (COMPSAC), July 2017
  • Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba, and Takeshi Yada: "Malicious URL Sequence Detection using Event De-noising Convolutional Neural Network", Proceedings of the IEEE International Conference on Communications (ICC), May 2017
  • Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, and Tatsuya Mori: "Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps", Proceedings of the 14th International Conference on Mining Software Repositories (MSR), May 2017
  • Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Youki Kadobayashi: "HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle", International Journal of Information Security 2017, Jan 2017
  • Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, and Shigeki Goto: "DomainProfiler: Discovering Domain Names Abused in Future", Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.491--502, June 2016
  • Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto: "MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks", IEICE Transaction on Information and Systems, Vol.E99--D, No.4, pp.860--872, Apr 2016
  • Mitsuaki Akiyama, Takeshi Yagi, and Takeo Hariu: "Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs", IT Professional 15(4):50-56, July 2013
  • Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, and Mitsutaka Itoh: "Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks", IEICE Transactions on Communications 93-B(5):1131-1139, May 2010
Footer Area

Copyright © 2018 Nippon Telegraph and Telephone Corporation