We work on R&D for cybersecurity techniques to cope with sophisticated cyberattacks and unknown and potential threats, such as ones for emerging IoT devices.
We also work to automate countermeasures against cyberattacks by collecting, accumulating, and analyzing large amounts of information on diversified cyberattacks, including indiscriminate and targeted ones. Moreover, we verify the effectiveness of our research outcomes by applying them to our own cyberattack analysis, and then disseminate them to society.
Advanced cybersecurity technologies
In order to reinforce the capabilities for responding to cyberattacks against governments or critical infrastructures, we work on R&D for visualization-driven security operation techniques, security techniques for IoT devices, etc. in addition to the active and exhaustive monitoring, machine-learning based analysis, and analysis across multiple information sources.
Cybersecurity Universal Repository
We are building a cybersecurity universal repository to accumulate a large amount of cybersecurity related information, which enables us to securely share the information in a convenient and usable manner. We also conduct R&D on automated countermeasure techniques using the repository. Moreover, we are building a semi-open research platform using technology to assist the development of security personnel.
Techniques for the use of the Security Verification Platform
In order to facilitate R&D on cybersecurity technologies, we are building a verification platform that reproduces cyberattacks within a secure environment and that verifies secure protection techniques. We also work on techniques for using mock environments and information as well as security testbed techniques.