<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DDoS attack Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/ddos-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/ddos-attack/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Tue, 28 Apr 2020 09:31:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Using the Power of Machine Learning to Detect Cyber Attacks</title>
		<link>https://www.aiuniverse.xyz/using-the-power-of-machine-learning-to-detect-cyber-attacks/</link>
					<comments>https://www.aiuniverse.xyz/using-the-power-of-machine-learning-to-detect-cyber-attacks/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 09:31:27 +0000</pubDate>
				<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[DDoS attack]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[ML]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=8398</guid>

					<description><![CDATA[<p>Source: cxotoday.com As the world becomes increasingly digital, we are unlocking more value and growth than ever before. However, a challenge that governments, enterprises and well as <a class="read-more-link" href="https://www.aiuniverse.xyz/using-the-power-of-machine-learning-to-detect-cyber-attacks/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/using-the-power-of-machine-learning-to-detect-cyber-attacks/">Using the Power of Machine Learning to Detect Cyber Attacks</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: cxotoday.com</p>



<p>As the world becomes increasingly digital, we are unlocking more value and growth than ever before. However, a challenge that governments, enterprises and well as individuals leveraging technology are constantly facing is the growing threat of cyberattacks that looms large over us.</p>



<p>Cyber security solutions provider SonicWall’s 2019 report revealed 10.52 billion malware attacks in 2018, a 217% increase in IoT attacks and 391,689 new variants of attack that were identified. What’s more is that cyber criminals today are evolving with technology and upping their game. Such incidents don’t just have the potential to bring businesses to a standstill but can also inflict serious damages to their resources and repute.</p>



<p>With an increasing number of cyberattacks targeting critical networked resources that cannot be detected by traditional network monitoring tools, it becomes critical to explore and leverage sophisticated tools for detection and reporting of such attacks.</p>



<p>Artificial Intelligence (AI) and Machine Learning (ML) are two of the hottest technology trends that have the potential to transform the modern security architecture landscape. Artificial intelligence is any technique that enables computers to mimic human behavior. Machine Learning is the ability to learn without being explicitly programmed. Both these techniques are widely used in various industries like healthcare, banking and storage.</p>



<p><strong>DoS and DDoS attacks</strong></p>



<p>In this blog, we explore an innovative approach to detect Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks – two of the major kinds of attacks plaguing organizations – using ML algorithm by mining application specific logs.</p>



<p>In a DoS attack, the hacker tries to prevent genuine users from using a website by maliciously flooding it with traffic, which can cause the system to crash. The origin of the attack is single, i.e. it is made from one computer or internet connection. With hackers getting more innovative, there are multiple ways of carrying out such attacks. Recently, a specially crafted MP4 file which was circulated on WhatsApp, triggered a DoS attack on individual users. Attackers can take advantage of this vulnerability to deploy malware on the user’s device to steal sensitive files and also use it for surveillance purposes.</p>



<p>When an attacker uses multiple machines to send requests with mischievous intent, trying to take over the target machine’s resources, it is a DDoS attack. In what is said to be one of the most powerful DDoS attacks, GitHub in 2018 received a staggering 1.35 terabits/second of traffic on a particular day for 18 minutes. GitHub, along with their DDoS mitigation service provider Akamai Prolexic, handled the situation and resolved it within 20 minutes.</p>



<p>The reasons for such attacks can be varied – from an intent to steal data or defame an enterprise to using it as a decoy to perform another high impactful attack.</p>



<p>Some of the most high profile cases include the DDoS attack on the Telegram messaging app which hampered its day-to-day communication. Large multinationals such as Paypal, Twitter and Spotify, with some of the most advanced security tools, have also been victims to similar attacks.</p>



<p><strong>Machine learning to tackle attacks</strong></p>



<p>Today, enterprises across are using cloud to build and manage software. Microservices is a widely used software development technique and Application Program Interface (API) is a type of microservice used in various industries such as banking, storage and healthcare. Many instances of microservices automatically start when required. In such a situation, it is not possible for humans to monitor and check if all the instances are genuine. This presents a greater cyber-attack risk.</p>



<p>A system with APIs is designed to fulfill the assumption that each of the routines will be called only limited times per day and this can provide a viable solution to such attacks. But the number of calls might increase due to programmatic retries if the API fails to respond in a timely manner. Also, the number of API calls may increase in situations when debug or trouble-shooting procedures are performed. Even with troubleshooting, the maximum threshold is not expected to go beyond a defined number of calls per day.</p>



<p>Here, we can make a rudimentary assumption – that if an API call is invoked more than 100 times, then it may constitute a DoS/DDoS attack. The ML algorithm can then be trained using logging data to classify if the system is under attack based on certain attributes.</p>



<p>The logs generated by various microservices are continuously monitored using log monitoring tools such as Fluentd. Various attributes, such as client IP address, API request and date and time, are retrieved from the acquired log data.</p>



<p>This information can be fed into a preprocessor in real time, which calculates the number of hits on a certain API for a given date and time, and client IP address. There can be situations where multiple machines are used to attack multiple APIs exposed by a target. Every industry that uses API, especially applications that deal with sensitive information, can be impacted by DoS or DDoS attacks. These attacks are not just used for denying services to a consumer; an attacker can use it for sending malware with the intent of gathering sensitive data.</p>



<p>Machine Learning algorithms can be used to train and detect if there has been a DoS/DDoS attack. As soon as the attack is detected, an email notification can be sent to the security engineers. Any classification algorithm can be used to categorize if it is a DoS/DDoS attack or not. One example of a classification algorithm is Support Vector Machine (SVM) which is a supervised learning method that analyses data and recognizes patterns.</p>



<p><strong>With increase in attacks, early detection is the best solution</strong></p>



<p>According to data by cybersecurity firm Kaspersky, the number of DDoS attacks rose by a third in the third quarter of 2019. In its survey it observed that DDoS attacks are the second most expensive type of cyberattacks targeting small and medium sized businesses, and the average cost of such breaches is estimated to be $138,000.</p>



<p>With cybercrime mushrooming across the world, the players are not just limited to seasoned criminals, and traditional methods are giving way to sophisticated techniques.</p>



<p>Perhaps one of the strongest indicators of the escalation of such activities is the growth of the DoS/DDoS attack solution market, which is estimated to increase from $900 mn in 2019 to $9 billion in 2025.</p>



<p>The most recent DDoS attacks have been observed to hijack connected devices such as webcams, baby phones, routers, vacuum robots, etc. to launch their attacks.</p>



<p>The number of devices remotely controllable via apps is growing exponentially and the&nbsp;Internet of Things (IoT)&nbsp;is expected to easily surpass 20 billion connected devices by the end of 2020.</p>



<p>Current IoT system follows a centralized architecture that makes it more prone to DoS or DDoS attacks. Blockchain technology can be used to enable creation of IoT networks that are peer-to-peer (P2P) and trustless. This removes the possibility of centralized single point of failure. An attacker’s Command &amp; Control server will not be able to gain access to publish the DDoS attack instructions because of the P2P network of blockchain.</p>



<p>Since we cannot control when, where or how an attack may come our way, and absolute prevention against these cannot be guaranteed yet, our best shot for now is early detection which will help mitigate the risk of irreparable damage such incidents can cause.</p>



<p>Organizations can use existing solutions or build their own to detect cyberattacks at a very early stage to minimize the impact. Any system that requires minimal human intervention would be ideal.</p>
<p>The post <a href="https://www.aiuniverse.xyz/using-the-power-of-machine-learning-to-detect-cyber-attacks/">Using the Power of Machine Learning to Detect Cyber Attacks</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/using-the-power-of-machine-learning-to-detect-cyber-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security</title>
		<link>https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/</link>
					<comments>https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Mon, 20 Aug 2018 06:24:48 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoS attack]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[ML techniques]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=2765</guid>

					<description><![CDATA[<p>Source &#8211; analyticsindiamag.com One of the most dangerous aspects looming the computer world is security threats. It is estimated that around three trillion dollars are lost in cyber crimes every <a class="read-more-link" href="https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/">Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; analyticsindiamag.com</p>
<p>One of the most dangerous aspects looming the computer world is security threats. It is estimated that around three trillion dollars are lost in cyber crimes every year. This figure is expected to double by 2021. With all of these threats lurking around, it is difficult to track and eliminate every threat, especially as the number of users is rising exponentially.</p>
<p>The most popular among the existing cyber threats now is the distributed denial of service (DDoS) attack. A DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of the internet traffic. DDoS attacks have adversely affected businesses on a large scale.</p>
<p>Now, with machine learning prevailing in the tech ecosystem, eliminating DDoS attacks has found a new way. In this article, we will lay out a research paper that has used ML techniques to subdue DDoS attacks in systems.</p>
<h3>Session Initiation Protocol (SIP) And Voice Over Internet Protocol (VoIP)</h3>
<p>Z Tsiatsikas and a team from the University of the Aegean, Greece, have published a new research study in countering DDoS in SIP-based VoIP systems through ML. The reason for choosing VoIP systems is its popularity and spread in the hardware ecosystem. With the growing number of digital devices and the abundant availability of the internet, VoIP is the preferred method for voice and multimedia communications.</p>
<p>In order to establish a VoIP session, Session Initiation Protocol (SIP) is the popular means of initiating and these sessions. A simple version of the SIP/VoIP architecture is given below:</p>
<ul>
<li><b>User Agent (UA):</b> The active entities in the session which represent the endpoints of SIP. For example, in the context of voice communications, the caller and the receiver, which denote the endpoints in the session.</li>
<li><b>SIP Proxy Server: An intermediate entity which acts as a client and a server simultaneously during the session. The role of this server is to maintain send and receive requests as well as transfer information to and fro from the users.</b></li>
<li><b></b><strong>Registrar:</strong> This component takes care of authentication and register requests for the UA.</li>
</ul>
<p>All of the SIP communication is logged by the VoIP provider. This is important because it gives out billing and accounting information for service providers based on users’ activity. Interestingly, it can also give out information regarding intrusion or suspicious activity present in the network. This can be a breeding ground for DDoS attacks if left neglected.</p>
<h3>Aggregating ML Techniques In VoIP</h3>
<p>The researchers consider the same SIP VoIP architecture and use five standard ML classifier algorithms in their experiments, which are as follows:</p>
<ol>
<li>Sequential minimal optimisation</li>
<li>Naive Bayes</li>
<li>Neural networks</li>
<li>Decision trees</li>
<li>Random Forest</li>
</ol>
<p>These algorithms are set up for dealing with communications directly in the experiment. Then, classification features are generated once the network is made anonymous using keyed-hash method authentication code (HMAC) for the VoIP communications. The algorithms are tested under 15 DDoS attack scenarios. In order to do this, a ‘test bed’ of DDoS simulations is designed by the researchers which is shown below:</p>
<figure id="attachment_27426" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-27426 size-full" src="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?resize=835%2C591&amp;ssl=1" sizes="(max-width: 835px) 100vw, 835px" srcset="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?w=835&amp;ssl=1 835w, https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?resize=768%2C544&amp;ssl=1 768w, https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?resize=770%2C545&amp;ssl=1 770w" alt="" width="672" height="476" data-attachment-id="27426" data-permalink="https://www.analyticsindiamag.com/machine-learning-chasing-out-ddos-cyber-security/ddos1/" data-orig-file="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?fit=835%2C591&amp;ssl=1" data-orig-size="835,591" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="ddos1" data-image-description="" data-medium-file="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?fit=300%2C300&amp;ssl=1" data-large-file="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?fit=835%2C591&amp;ssl=1" /><figcaption class="wp-caption-text"><em>DDoS simulation test-bed (Image courtesy: Z Tsiatsikas and researchers)</em></figcaption></figure>
<p><i>“Three or four different Virtual Machines (VMs) have been used for the SIP proxy, the legitimate users, and the generation of the attack traffic depending on the scenario. All VMs run on an i7 processor 2.2 GHz machine having 6GB of RAM. For the SIP proxy, we employed the widely known VoIP server </i><i>Kamailio</i><i> (kam, 2014). We simulated distinct patterns for both legitimate and DoS attack traffic using sipp v.3.21 and sipsak2 tools respectively. Furthermore, for the simulation of DDoS attack, the SIPp-DD tool has been used. The well-known Weka tool has been employed for ML analysis.”</i></p>
<p>Training and Testing process for algorithms include both normal traffic and attack traffic. To simulate the attack traffic, they use a range of random high call rates to give a feel of real VoIP whereas the normal traffic has normal, observed call rates.</p>
<p>The training scenario in the experiment is denoted as SN1 and testing scenarios are denoted as SN1.1, SN1.2, SN1.3 etc. A detailed description is given here.</p>
<h3>Performance</h3>
<p>The algorithms fare well compared to non-ML detection. Among the algorithms, Random Forest and decision trees stand top when measured from an intrusion detection viewpoint. The other three fare below them. In addition, as the attack traffic rises, the intrusion detection rate drops, which means DDoS is evident. Ultimately, ML techniques outclass conventional attack detection techniques/methods.</p>
<p>The post <a href="https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/">Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
