HTML5 Webook
46/64
44Research Highlightsspond to attacks targeting vulnerabili-ties inherent to specific type of IoT devices such as mobile routers and home routers. These results reflect the increasing sophistication of attacks to-ward loT devices.Director Daisuke Inoue and Execu-tive Technical Researcher Masaki Kubo of the Cybersecurity Laboratory have stated, “It is important that we raise our awareness of the need for applying se-curity measures to IoT devices too, such as by accurately determining what IoT devices are used in the home or workplace and appropriately config-uring and updating them as needed.”NICT is committed to enhancing the use of NICTER monitoring and analysis results and researching and develop-ing security measures for IoT devices to improve security in Japan.NICTER Analysis Report 2017 (detailed versions):Web version: http://www.nict.go.jp/cy-ber/report.htmlPDF version: https://www.nict.go.jp/cyber/report/NICTER_report_2017.pdf Hybrid approach for more ac-curate “one-second”Synergy between optical and microwave clocks, achieving a months-long time scale with high precisionWATCHNational standard times are maintained to be synchro-nized with Coordinated Uni-versal Time (UTC). Since the radiation frequency associated with the cesium hyperfine transition defines the length of “one-second,” maintaining accurate Cs clocks is straightforward to keep time. Optical clocks, on the other hand, have been making rapid progress re-cently and now have much less sys-tematic uncertainty than microwave standards. Nevertheless, nobody has so far generated the real-time signal of a time scale using optical clocks be-Fig.1 : Percentage breakdown of packets by destination port numberPort number 22/TCP, which ranks second in number of packets, includes scan packets to ordinary authentication servers (Secure Shell (SSH) protocol) that are not mobile routers. “Other Ports” in the pie chart also include many packets targeting IoT devices.Footnote*1 NICTER (Network Incident analysis Cen-ter for Tactical Emergency Response)NICTER is an integrated system for rapidly grasping various types of threats to information security over a wide area and deriving eective countermeasures. It has functions for perform-ing correlation analysis of information obtained by observing cyberattacks and collecting mal-ware and for investigating the root causes of security threats.*2 Cyberattack-related network packetsThis is the generic term for packets arriving at the darknet. These include scan packets from malware-infected devices searching for the next target to infect on the Internet and back-scatter packets from servers under denial-of-service (DoS) attacks.
元のページ
../index.html#46