Budget Amount *help |
¥5,460,000 (Direct Cost: ¥4,200,000、Indirect Cost: ¥1,260,000)
Fiscal Year 2015: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2014: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2013: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2012: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
|
Outline of Final Research Achievements |
The goal of this study clarify activities of threats. It also clarify that what we need to prevent leakage of secret information, when malware which is used to APT (Advanced Persistent Threat) intrude into practical information systems. Parallel and distributed computation will be effective to reduce elapse time of simulation of behavior of malware on practical information systems. In this study, we make models of attacking methods, models of information systems, notation methods of them. We implement and evaluate them. We also apply the threat tracer to the security training.
|