Cyber ​​Solutions, Inc. has been actively promoting research and development since its founding, with the philosophy of realizing technology that can be used around the world and contribute to society. We have been participating in cutting-edge research and development projects based on the keywords of Internet technology, giving back to society the results of our research, a comprehensive research and development system, and collaboration between industry, academia, and government.


R&D Project List

2011

● Research and development of next-generation network management technology that realizes power saving in information systems.

Sponsored by: Ministry of Internal Affairs and Communications, ICT Green Innovation Promotion Project ( PREDICT )
Researchers: Tohoku University, Nippon Telegraph and Telephone East Corporation, Tohoku Institute of Technology, Cyber ​​Solutions
Period: 2011-2013
Overview:
 The Internet currently consumes as much energy as the automobile manufacturing industry, and is expected to consume as much energy as the airline industry by 2020. Therefore, in this proposal, based on next-generation network monitoring and management technology, we will develop and evolve the entire network system to achieve power saving (greening). We will be the first in the world to research and develop "oriented network management technology."
2009

● Safe and open embedded software lifecycle management technology

Sponsored by: NEDO Innovation Promotion Project (Industrial Technology Practical Development Cost Subsidy Project)
Researcher: Tohoku University, Cyber ​​Solutions
Period: 2009-2010
Overview:
  Embedded software in home appliances, automobiles, medical equipment, industrial machinery, etc. is becoming more sophisticated and networked, but management has not been taken into consideration. In particular, they lack interoperability with standard systems when connected to networks, leading to risks such as unaddressed security vulnerabilities and various inefficiencies. To solve this problem, this project will develop lifecycle management technology for embedded software with secure and open communication functions.
2007

● Research and development on a new generation ubiquitous network monitoring framework that supports network mobility

Sponsor: Ministry of Internal Affairs and Communications, Strategic Information and Communications Research and Development Promotion Program (SCOPE) New Generation Network Technology
Researcher: Tohoku University, Cyber ​​Solutions
Period: 2007-2009
Overview:
 The movement of the network itself across various networks is called network mobility (NEMO). Network mobility is a completely new form of network, which requires a new network management framework, and as a first step, there is an urgent need to develop a monitoring framework. In this research, we are the first in the world to develop a new generation ubiquitous network monitoring framework that supports network mobility, based on the network monitoring technology that we have been promoting mainly for wired and wireless networks. Specifically, we examined the requirements for monitoring network mobility, and based on the results of this study, we designed and implemented a Management Information Base (MIB) and developed an SNMP manager. Furthermore, we conducted demonstration experiments in small and medium-sized network environments using the developed MIB and SNMP manager, and succeeded in international standardization of the developed NEMO-MIB at the IETF (RFC 5488, April 2009).

●Development of highly reliable collection and management technology for network event records aimed at ensuring security

Sponsored by: Ministry of Internal Affairs and Communications/Strategic Information and Communications Research and Development Promotion Program (SCOPE) International Technology Acquisition R&D
Researchers: Tohoku University, Tohoku Institute of Technology, Cyber ​​Solutions
Period: 2007-2008
Overview:
 Internet operation and security management is based on the collection and analysis of network event records (logs). However, due to its ancient origins, the currently widely used log collection protocol SYSLOG has many problems with reliability, security, and scalability. This is a global issue that requires urgent response. In this research and development, we will create a technology that will become the foundation of a secure network that can reliably collect logs from all targets and can be used for operational and security management, as well as system auditing. Through this research and development, we will contribute to updating SYSLOG and aim to standardize SYSLOG remote management technology internationally.
2006

● Research and development of scalable next-generation intranet terminal connection management technology that can safely manage mobile terminals.

Sponsor: National Institute of Information and Communications Technology (NICT)
Researcher: Cyber ​​Solutions
Period: 2006
Overview:
 The fundamental problem with mobile terminal management is that there are situations where network managers are not paying close attention. Furthermore, in the case of mobile terminals, there are two types of network administrators. One is the administrator of the mobile terminal, which is the administrator of the network to which it originally belongs, and the other is the administrator of the receiving network to which the mobile terminal connects after moving.
In this research and development, we will establish a secure terminal management technology that takes into account the movement of terminals and changes in network configuration, and will realize a next-generation terminal connection management system that can handle changes in terminal and network configurations.

2005

● Development of wide-area incident information sharing and analysis technology (IODEF)

Sponsor: Information-technology Promotion Agency (IPA)
Researcher: Cyber ​​Solutions
Period: 2005
Overview:
 In order to respond to new security incidents that occur one after another on the Internet as a social infrastructure, there is an active movement to strengthen global collaboration, and a new security system that can collaborate across countries and ISPs (wide-area collaboration) is needed. has been done.
 For these wide-area collaborations, standardized communication methods that are independent of language or specific applications are essential. Therefore, for the purpose of sharing vulnerability information, a standard was proposed for CERTs around the world to collaborate, and this is the message exchange standard (IODEF: Incident Object Description Exchange Format).
 In this technology development, by applying the implementation technology of the IODEF standard draft and the existing systems owned by the applicants, we will create a ``wide area unauthorized access tracking system'' and ``wide area incident analysis/warning system'' based on wide area cooperation. system" was developed.
Additionally, feedback will be provided to the IODEF standard draft through development.
2004

● Demonstration experiment of intelligent cluster creation project product sensor management system

Sponsored by: Sendai City 2004 Industry-Academia Research Follow-up Subsidy System
Period: 2004-2005

● Research and development of IPv6 applied technology that will contribute to improving nursing care services in the ubiquitous era

Sponsor: National Institute of Information and Communications Technology (NICT)
Period: 2004-2005
Overview:
 Along with the implementation of the long-term care insurance system, each local government is distributing and accumulating information based on the standardization of its own care and welfare information database. If such information can be shared and utilized, it will be extremely beneficial for caregivers, families, care recipients themselves, service providers, volunteer groups, etc., and it will be possible to safely accumulate service monitoring statistical data such as nursing care service evaluations. If provided quickly, it could be extremely useful for countries implementing long-term care insurance systems and local governments managing and directing long-term care services. Based on this, we developed a nursing care service monitoring data system.

● Secure SYSLOG process monitoring and management framework technology and product development

Sponsored by: Miyagi Prefecture Regional Core IT Company Growth Support Project
Period: 2004-2005

● Market development and sales promotion business for NetSkateKoban Practical consulting and sales promotion using portable simple audits

Sponsored by: Miyagi Prefecture 2004 Research Results Market Formation Promotion Project
Period: 2004-2005

● Research and demonstration network monitoring and security evaluation related to the realization of secure wireless networks that contribute to the advancement of local medical care.

Sponsor: Ministry of Internal Affairs and Communications
Period: 2004-2005
Overview:
  This research study aims to develop a secure wireless network that contributes to medical cooperation between hospitals and clinics and to the advancement of local medical care in emergency medical care in order to realize the enrichment and sophistication of local medical care required in the aging Tohoku region. In order to realize this, we are examining the functions required and the challenges to achieving it.

● ICAR

Sponsored by: 2004 Standards Certification Research Project
Period: 2004-2005
Researchers: Keio University, Japan Automobile Research Institute (JARI), Cyber ​​Solutions

● Research on advanced agent networks for health and welfare

Sponsor: Ministry of Internal Affairs and Communications
Period: April 2004 to March 2007

● Research and development on event detection for network management based on traffic analysis on ultra-high-speed networks

Sponsored by: JGN2 Tohoku Research Center JGNⅡ Monitoring Project
Period: April 2004 to March 2005

● Security measures research and development project Contract contract for “technical research for protecting Internet information infrastructure”

Sponsor: Information-technology Promotion Agency (IPA)

● Development of system for JaNI publication

Sponsor: TAO-JaNI

2003

● Technical survey on high traffic observation and analysis methods

Sponsor: Information-technology Promotion Agency (IPA)
Period: 2003/11/17 ~ 2003/11/28

● Research on monitoring framework for next-generation ubiquitous networks

Sponsor: Ministry of Internal Affairs and Communications-MIPv6
Period: 2003/10/20 ~ 2004/3/31
In order to contribute to the effective management and operation of new generation ubiquitous networks, we will research and develop fundamental technologies for monitoring frameworks in new generation ubiquitous networks, including mobile networks that have developed network monitoring technologies such as Mobile IPv6-MI.

● Research and development of IPv6 applied technology that contributes to improving nursing care services in the ubiquitous era

Sponsor: National Institute of Information and Communications Technology (NICT)
Period: August 2003 - March 2007

● Research on next generation network (JGN IPv6) management

Sponsor: Ministry of Internal Affairs and Communications-IPv6
Period: 2003/4/30 ~ 2004/3/31
Overview: IPv6 compatible development (net-snmp IPv6 compatible development)
IPv6 compatible development of NET-SNMP, the most widely used open source SNMP package. The results are reflected in the latest NET-SNMP. net-snmp homepage
2002

● Intelligent net security management

Sponsored by: Ministry of Education, Culture, Sports, Science and Technology Intellectual Cluster Creation Project
Period: August 2002 - March 2007

● Technical research for protecting Internet information infrastructure

Sponsor: Information-technology Promotion Agency (IPA)

2000

● Technology development of sensor array system for wide area security management

Sponsor: Information-technology Promotion Agency (IPA)
Researchers:
NTT Data Corporation Tohoku Branch
Sendai Applied Informatics Research Foundation
Tohoku University Graduate School of Information Science
Cyber ​​Solutions Co., Ltd
Overview:

We conducted research and development with the aim of establishing a technology that significantly increases monitoring density and detection accuracy by deploying a large number of compact sensors in a wide area network. Through the development of this technology, a technology has been established to deploy a large number of sensors over a wide area and manage and operate them in a distributed and integrated manner. We also showed that a large number of sensors is a useful method for understanding trends in unauthorized access. 
The operational cost, which was thought to be a problem when increasing the number of sensors, has been made more realistic by deploying a group of lightweight and compact sensors, and by defining and implementing management information for operation, remote control is possible. Sensor control has become scalable.
Since it is a system for security, it is quite possible that it could become the target of an attack, but the sensor array security system established through the development of this technology is based on the fact that a group of sensors autonomously monitor each other, a technology has been established that can significantly reduce management costs and create a monitoring network without specific critical points.

● Modeling of an information counseling center for the elderly and disabled and techniques for handling nursing care and welfare information

Sponsor: National Institute of Communications and Broadcasting (currently National Institute of Information and Communications Technology “NICT”)

● JANI system development

Sponsor: National Institute of Communications and Broadcasting (currently National Institute of Information and Communications Technology “NICT”)
Period: 2000/2/22 ~ 2001/3/31
1999

● Research on highly sensitive detection of unauthorized access and global warning mechanism

Sponsor: Information-technology Promotion Agency (IPA)
Researchers:
NTT Data Corporation Tohoku Branch
Fukushima Prefectural University of Aizu
Tohoku University Graduate School of Information Science
Cyber ​​Solutions Co., Ltd.
Overview: Project Indeglo

● Joint research related to gigabit networks for research and development

Sponsored by: National Institute of Communications and Broadcasting (currently National Institute of Information and Communications Technology “NICT”)
Period: 1999/9/20 ~ 2000/3/31
Researcher: Tohoku University
    Cyber ​​Solutions

● IPA Consignment of work related to highly sensitive detection of unauthorized access and research on global vigilance mechanisms

Consignor: NTT Data Communications Corporation
Period: 1999/7/23 ~ 2000/2/21
1997

● Research on map construction methods that allow internet orienteering

Sponsor: Ministry of Internal Affairs and Communications
Period: April 1997 - March 1999
Overview:
Research on map construction methods that allow internet orienteering
Techniques for generation of maps for Internet orienteering CHArting the INternet
 
Network maps provide important foundational information for network management, operation, and planning. This map plays an essential role in ensuring the privacy, security, and trustworthiness of all applications currently or in the future running on the Internet. However, the lack of a usable database of network configuration information poses serious problems in network management and operation. Existing network maps are done using primitive methods, which are manual, making them difficult to update, unable to accommodate network changes or expansions, and, as a result, unusable.
This research aims to develop a new algorithm to automatically collect network information, and based on this, to establish a general technology for synthesizing network configuration information to create a global network map. There is. Furthermore, we will also conduct research on representation methods (virtual reality and Netland) for providing configuration information to users, as well as research and development of applications that utilize configuration information. In addition, the network configuration information that is synthesized needs to be handled in a distributed manner, and we will also research how this works.
 
This research was conducted as part of the Information-technology Promotion Agency's Creative Information Technology Development Project.
Deliverables
  • 1998 IPA technology presentation paper materials
  • 1997 Deliverable Prototype
Participating organizations
  • NTT Data Communications Corporation
  • Nihon University College of Engineering
  • Tohoku University Graduate School of Information Science, Nemoto Laboratory, Network Research Group
  • Miyazaki Laboratory, Graduate School of Information Science, Tohoku University
  • Cyber ​​Solutions Co., Ltd.
Related literature
  1. Network Cartographer; Glenn Mansfield et.al., ACM conf. on Multimedia apps.Decitber,1996, Boston, USA.
  2. Techniques for Automated Network Map Generation Using SNMP; G. Mansfield et. al, IEEE InfoCom96, March 1996.
  3. Mapping Communication Networks in the Directory; G. Mansfield et.al, Comp. Networks and ISDN Sys.,Vol.26-3, 1993.
  4. Improving Performance of Wide Area Distributed Client-Server Applications; G. Mansfield, Int.J. of Comp. & Engg. Mgmt. Vol. 2-3, 1994.
  5. Non-Broadcast network fault-Monitoring based on Systit level Diagnosis ;Elias Procopio DuarteJr., Glenn Mansfield et.al.
  6. A Study on FTP Traffic:Estimation of the Non-Optimality; Thomas Johannsen, Glenn Mansfield,International Journal of Network Management, Vol. 4, No. 4, Dec. 1994.
  7. RFC 1608 - Representing IP Information in the X.500 Directory; T. Johannsen, G. Mansfield, M. Kosters & S. Sataluri.
  8. RFC1609 - Charting Networks in the X.500 Directory; G. Mansfield, T. Johannsen & M. Knopper
  9. RFC 1657 - X.500 Directory Monitoring MIB; Glenn Mansfield et. al.
  10. RFC 1804 - Schema Publishing in the X.500 Directory; Glenn Mansfield et.al