NEC Technology Automatically Identifies Cyberattack Risks for ICT Systems and Important Infrastructure
TOKYO, Nov, 06 2018 - (JCN Newswire) - NEC Corporation (TSE: 6701) today announced the development of a technology for automatically identifying the risk of cyberattacks. The new technology uses simulations in order to create a comprehensive evaluation of cyberattack risks for ICT systems and important infrastructure, such as electricity, gas, water, and transport facilities.
This technology collects information about components and complex network settings that are particular to control systems, as well as information on data flow, including information about isolated environments, from actual systems and reproduces a virtual model based on that information. The virtual model is used to run cyberattack simulations that enable the automatic identification of a variety of cyberattack risks.
Cyberattack simulations are created using analysis knowledge based on attacks utilizing e-mail and the Web, data falsification, spoofing, and attacks on isolated networks utilizing a USB and other techniques, in addition to knowledge(1) about software vulnerability and attack techniques that are extremely sophisticated and hard to understand. This makes it possible to create an exhaustive range of realistic attack simulations.
"This technology can identify potential attack paths and the scope of their influence, making it possible to implement the necessary security measures with a minimum of system outages," said Mikiya Tani, General Manager, Security Research Laboratories, NEC Corporation. "Moreover, the technology bolsters the security of social infrastructure and ICT systems for enterprises, while contributing to the safety of communities and the development of economic activity."
NEC aims to provide this technology commercially within the 2019 fiscal year.
Primary features of the new technology include the following:
1. Creation of a virtual model for accurate security risk analysis
NEC developed a technique to create a virtual model by collecting detailed system information necessary for risk analysis, such as the hardware information of components (programmable logic controller [PLC] and others) peculiar to control systems, communications settings, such as packets and protocols, and data flow.
This makes it possible to visualize the entire configuration of complicated systems and data flow, which has conventionally been difficult to understand, even for specialists with extensive experience and advanced skills in status analysis. With this technique, NEC achieves an immediate, accurate understanding of the areas of vulnerability in risk analysis.
2. Analysis of realistic attack scenarios utilizing an attack database
NEC created a database of analysis knowledge that is used to produce simulations with a computer. The database consists of information on software vulnerabilities and attack technique data(1), such as CVE and CAPEC, which are widely disclosed around the world, but can only be understood by specialists. By structuring and creating a database of common characteristics, such as the conditions under which attacks become feasible, the status of attackers, and the change in the status of systems that occurs when attacks succeed, a series of attack simulations, from the starting point to the goal of attacks, can be automatically and accurately created at high speed.
Further, because the database of analysis knowledge encompasses a variety of attack forms, such as attacks utilizing e-mail and the Web, data falsification, spoofing, as well as attacks on an isolated network utilizing a USB or other techniques, it is possible to create more realistic attack scenarios.
With this technology, an attack can be understood visually and automatically. Further, because the effectiveness of security when measures are taken can be repeatedly confirmed, potential security risks can also be found.
NEC will showcase this technology at the "C&C user forum & iEXPO 2018" held by the NEC Group at the Tokyo International Forum on Thursday, November 8 and Friday, November 9.
For more information, please visit: https://www.nec.com/en/event/uf-iexpo/
(1) A worldwide database that discloses information about a variety of software vulnerability and attack techniques collected by US-based companies.
About NEC Corporation
NEC Corporation is a leader in the integration of IT and network technologies that benefit businesses and people around the world. The NEC Group globally provides "Solutions for Society" that promote the safety, security efficiency and fairness of society. Under the company's corporate message of "Orchestrating a brighter world," NEC aims to help solve a wide range of challenging issues and to create new social value for the changing world of tomorrow. For more information, visit NEC at https://www.nec.com.
Source: NEC Corporation
Sectors: Enterprise IT, Security/Biometrics
Copyright ©2019 JCN Newswire. All rights reserved. A division of Japan Corporate News Network.
More Latest Release >>
NTT DOCOMO Ventures Invests in Lovegraph Photographer-dispatch Service
Feb 15, 2019 16:50 JST
Mitsubishi Motor's New Delica D:5 All-round Minivan Goes on Sale
Feb 15, 2019 14:12 JST
Mitsubishi Corporation to Invest in UK Energy Technology Company OVO Group
Feb 15, 2019 10:59 JST
Mitsubishi Motors Helps Build New Elementary School Building in the Philippines
Feb 14, 2019 21:35 JST
Showa Denko Announces 2018 Consolidated Financial Results
Feb 14, 2019 15:00 JST
SDK Records Impairment Loss (Extraordinary Loss)
Feb 14, 2019 15:00 JST
Mitsubishi Motors to Globally Unveil 2020 ASX Compact SUV at Geneva International Motor Show
Feb 13, 2019 19:59 JST
Fujitsu Launches "Healthcare Personal service Platform" to Manage Health and Medical Information
Feb 13, 2019 18:01 JST
MHPS Is Global Market Share Leader in 2018 for Heavy Duty Gas Turbines by McCoy Reports
Feb 13, 2019 15:05 JST
Eisai Submits Application in Europe Seeking Approval for Fycompa as Treatment for Pediatric Patients With Epilepsy
Feb 13, 2019 09:29 JST
NEC Provides Traffic Management Solution to Serbia's Largest Mobile Telecommunications Carrier
Feb 12, 2019 17:06 JST
MHI: Six More Cars to be Delivered for "New Shuttle" AGT Line in Saitama
Feb 12, 2019 12:35 JST
Sapporo Medical University and Fujitsu in Joint R&D for Diabetes Treatment that Uses AI-based Machine Learning
Feb 12, 2019 11:50 JST
App Square: Enjoy the blockchain DApp 'store' on Infinito Wallet, version 2.4
Feb 11, 2019 15:00 JST
Fundamental Technology to Support the Early Diagnosis of Neurodevelopmental Disorders from Brain Response at First Medication
Feb 11, 2019 07:10 JST
The A.Ka Project : A collaboration of Japanese craftsmen creating extraordinary quality traditional red underwear!
Feb 09, 2019 14:00 JST
TOYOTA GAZOO Racing sets sights on Swedish snow success
Feb 08, 2019 19:55 JST
Mazda Unveils MX-5 Miata 30th Anniversary Edition in Racing Orange
Feb 08, 2019 15:48 JST
Toyota Updates its THUMS Virtual Crash Dummy Software
Feb 08, 2019 13:55 JST
NEC Technology Recognizes People based on Partial Images
Feb 08, 2019 11:07 JST