Top of Page
In this report, we give an overview of analysis using the Data Analytics Platform.
Here, we describe two methods of detecting malware communications caused by malware and by exploit kits in the huge volumes of logs generated by commonly used devices such as firewalls and Web proxy servers.
This report describes the design of the IIJ's large-scale email system, particularly its delivery system, along with some background to the revisions.
End of the page.