JDR Vol.12 No.5 pp. 1050-1059
doi: 10.20965/jdr.2017.p1050


Proposal on Measure Against Cyberattack on the Basis of Recent Trend

Naoshi Sato

Research and Development Institute, Chuo University
1-13-27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan

Corresponding author

December 1, 2016
July 13, 2017
Online released:
September 27, 2017
October 1, 2017
cyberattack, DoS, information theft, impersonation, internet user qualification system

In this paper, we discuss the current situation and problems of cyberattacks from multiple viewpoints, and propose a guideline for future countermeasures. First, we provide an overview of some trends in cyberattacks using various survey data and reports. Next, we examine a new cyberattack countermeasure to control Internet use and propose a specific guideline. Specifically, we propose an Internet user qualification system as a policy to maintain cyber security and discuss ways to realize the system, the expected effects, and problems to be solved.

Cite this article as:
N. Sato, “Proposal on Measure Against Cyberattack on the Basis of Recent Trend,” J. Disaster Res., Vol.12 No.5, pp. 1050-1059, 2017.
Data files:
  1. [1] N. Sato, “Latest trends on cyber security,” J. of Safety Engineering, Vol.54, No.6, pp. 417-423, Dec. 2015 (in Japanese).
  2. [2] National Institute of Information and Communications Technology (NICT), “NICTER monitoring report 2016,” Apr. 2017 (in Japanese).
  3. [3] NORSE IPViking Live, [accessed July 22, 2017]
  4. [4] S. Fukasawa and N. Sato, “Correlation analysis of darknet traffic,”IPSJ technical reports, Vol. 2015-DPS-162(20), pp.1-7, Feb. 2015 (in Japanese).
  5. [5] K. Yoshioka, “Current status and countermeasures of IoT malware mass infection,” Nikkei Computer, Vol.2016-8-18, pp. 78-81, Aug. 2016 (in Japanese).
  6. [6] H. Ozawa and N. Sato, “A survey result of cyber attacks against mutifunctional copiers with EWS,” 2016 IEICE Society Conf. B-7-1, Sep. 2016 (in Japanese).
  7. [7] T. Jordan and P. Taylor “Hacktivism and Cyberwars: Rebels with a Cause?,” Routledge, July 2004.
  8. [8] Information-technology Promotion Agency (IPA), “Survey on 2014 Information Security Event Damage – Report –,” Jan. 2015 (in Japanese).
  9. [9] K. Wilhoit, “Who’s really attacking your ICS equipment?,” Trendmicro incorporated research paper 2013, [accessed July 22, 2017]
  10. [10] NATO Cooperative Cyber Defence Centre of Excellence, “Tallinn Manual,” [accessed July 22, 2017]
  11. [11] Japan nation, “The Basic Act for Cyber Security,” [in Japanese, accessed July 22, 2017]
  12. [12] Japan Computer Emergency Response Team/Coordination Center (JPCERT/CC), [accessed July 22, 2017]
  13. [13] IPA, “Basic research on Training information security personnel,” [in Japanese, accessed July 22, 2017]
  14. [14] Institute of Information Security, “enPiT-Security(SecCap),” [in Japanese, accessed July 22, 2017]
  15. [15] The Eucation Newspaper, “Improve consciousness by simulated attack experience in Cyber security class,” /news/20161116_04/ [in Japanese, accessed Nov. 22, 2016]
  16. [16] LAC, “Guidance for targeted attack countermeasure (1st edition),” [in Japanese, accessed July 22, 2017]
  17. [17] N. Sato and Y. Okada, “Proposal of introducing Internet user qualification system based on information security level,” 2007 JSIS&JASI joint conference, II-3, Sep. 2007 (in Japanese).
  18. [18] Huawei Marine Networks, “Submarine Cable Map,” [accessed July 22, 2017]

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on Jun. 03, 2024