精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

Geyecloud's Technology Director Explains How Artificial Intelligence Assists in Detection of

原創 精選
Techplur
In this article, we invited Mr. Fu Jixiang, Technology Director of Geyecloud.com, to share his insights on how artificial intelligence can help to tackle security issues that used to be challenging to

Advanced persistent threats (APT) are hard to be detected because of their variability and strong invisibility. To combat them, enterprises have been seeking methods such as adopting artificial intelligence to solve this problem more efficiently and accurately.

In this article, we invited Mr. Fu Jixiang, Technology Director of Geyecloud.com, to share his insights on how artificial intelligence can help to tackle security issues that used to be challenging to resolve with traditional feature detection methods.


Challenges of APT detection

Generally, advanced persistent threats refer to cyberattacks carried out by an organized team that uses the information they have to build corresponding weapons and attack means, which are utilized in long-term continuous cyberattacks.

Several stages could be involved in the attack chain, including:

scanning detection,

attempted attacks,

exploiting vulnerabilities,

Trojans in downloads,

gaining remote control,

horizontal penetration,

harvesting operations,

Complex and highly sophisticated in terms of methods and payloads, these attacks are those viewed as advanced persistent threats by professionals in the security field.

As part of the defending process, it is necessary to determine the attack mechanisms to respond to and dispose of them. Unfortunately, traditional feature detection techniques are not well-suited to dealing with these higher-level threats.

Usually, when a new threat arises, defenders have to obtain a sample of it first. Then they need to update the network security equipment to detect or defend against it based on the analysis of the sample.

The problem, however, is that there is a defense vacuum for unknown threats before upgrading security protections or detection appliances. Today we could see variants of malicious code, such as malevolent samples and Trojan horses, and attackers will allow the sample to bypass defenses and detections. In this manner, an attacker can hide or obfuscate features that the antivirus software may have detected. Thus, the antivirus, the file hash code, or the signature code will no longer be able to see these threats effectively.

Through the entire process of the attack chain, some behaviors can be easily found by specific means such as detection engines. Despite this, there will also be hidden parts of the process that will be difficult to discover, which are equally important to assess the attacking circle. Currently, many cyberattacks use encryption techniques, and in the entire network traffic, we can only see handshakes and certificate information. With only this information, it will be impossible to determine whether there is a problem with the encrypted traffic load or whether a Trojan or malicious attack is taking place.

Upon completion of the intrusion, the computer will connect to its command and control (C&C) server to maintain communication and receive the attacker's following instructions. Today, firewalls are common network security appliances that do not intercept or deeply examine popular protocols such as DNS, HTTP, and ICMP. Therefore, using standard network protocols for C&C communication in the above back-connection process is advisable if you desire covert communication.

Cryptographic agents that are malicious will encrypt the entire session. Browsers that offer dark web access, such as Onion, can mask content and access behaviors. It is also possible to hide the communication behavior using an open VPN service. These clues may provide the key to identifying the entire attack chain.


AI application in APT detection

Protocols control how behaviors interact in a network. Multiple interactions occur between the client and server in the network whenever a client visits a website or sends an email. In this process, the information returned from the website end is usually greater than the request information sent. The process can be visualized, and the network behavior can be modeled.

Data leaking by Trojans also involves multiple rounds of data interaction. This creates a dominant pattern based on the distribution of session data in time and packet size. It is necessary to construct a pattern for all traffic to identify it, and a model of AI can be employed to learn this pattern.

This scenario would benefit from the use of artificial intelligence. For example, Apple's virtual assistant Siri captures speeches, converts them into digital signals, and then extracts linear parameters to construct feature vectors by combining multidimensional data. Later, it is given to an artificial intelligence algorithm for modeling. As soon as the model is constructed, the speech can be effectively recognized.

Likewise, network traffic patterns can be identified using a similar process. Samples of uplink and downlink bidirectional network session packets are collected first, and the packet content will be digitized. After that, the message content will be parsed by different ways, such as protocol parsing at the network, transport, and application layers. The packets can also be counted in this process, and then the data can be learned through pre-modulated algorithms and applied to network security appliances.

A key component of the above process is identifying the data source. There are many Trojan horses on the Internet that send encrypted traffic. As a result, Trojan samples can be captured and placed within a sandboxed cluster environment to generate Internet traffic and capture encrypted PCAP traffic. In addition, many websites or academic institutions will disclose some encrypted PCAP traffic and malicious encrypted traffic, which are valuable data sources.

It should be noted that not all original traffic or files can be applied directly. Once the data capture has been completed, it must be analyzed to determine the data quality and filtered accordingly. A standard or security appliance engine is used to parse the traffic and extract statistics and feature data. AI engineers analyze the acquired data by applying various models or algorithms to classify it into several categories.

Classification begins by determining whether there are other protocol traffic flows. There are many Trojans that simulate normal web browsing behaviors to avoid detection. In this case, we could capture the DNS context associated with the session and then analyze and extract the data.

Furthermore, to gather different kinds of interaction data, the session must first be authenticated with TLS.

The practice can be analyzed based on the two dimensions mentioned above: whether DNS is associated and its authentication is complete. By dividing the data into four groups and using these data to train models, different models can effectively identify the data in the corresponding categories.

Once the data has been classified, the features will need to be extracted to construct feature vectors.

First, it can distinguish what data it will extract based on whether DNS-associated data is present. If no DNS-associated data exists, its statistics and TLS protocol data are extracted.

Second, take note of the encryption certificate data. These data are converged together to generate feature vectors. As for the DNS association data, we should consider extracting DNS-related fields such as domain length, domain suffix, and TTL to form feature vectors.

Lastly, before training and modeling, it is necessary to conduct visualized dimensionality reduction analysis to determine whether AI algorithms can classify data effectively. In terms of the dimensionality reduction graph, this is more like identifying a curve or surface that will enable us to evaluate whether the AI algorithms are capable of accurately categorizing the data. Many algorithms are available for dimensionality reduction, e.g., the PCA algorithm, and different algorithms will be appropriate for various practical purposes.

Modeling is the next step in the process. Deep learning has recently gained popularity as an alternative to traditional machine learning. A better identification effect and accuracy of malicious encrypted traffic can be achieved through ensemble learning algorithms, which use multiple machine learning algorithms within one model or in conjunction with one machine learning algorithm to build multiple submodels.

Some rapidly-changed variants of malicious files are also advanced threats. The traditional feature codes have difficulty keeping up with the production of new variants of the samples. By transforming the file into an image, the file can be indirectly identified by a convolutional neural network capable of recognizing the image. Convolutional neural networks for image recognition are not as computationally intensive as traditional feature detection algorithms.

Specifically, the malicious code needs to be mapped as a grayscale image and extracted features. Then, the features are used for clustering, and clustering results are used to identify malicious code families. The next step is to build a CNN model and set up the network structure and training parameters. A convolutional neural network is then trained with grayscale image sets from the malicious code family to build the detection model. Finally, the detection model can detect malicious code families and variants.

Currently, many malicious programs communicate with external entities of the enterprises through covert channels. DNS covert channels allow leaky data to be encoded in BASE64 as a subdomain and transmitted through the firewall using the DNS protocol to the controlled server. Requests and responses can also be sent using a DNS 'text' (TXT) record. Similarly, hackers register the domain's resolution server to retrieve the desired data.

The ICMP channel is one of the most commonly used methods. Generally, it uses the ICMP packets of Echo and Reply to locate the fields within them and then populate them with data. Similarly, it may be transformed into another form by encoding or encryption before being sent out repeatedly in multiple frequencies to a controlled server.

Another common covert channel is HTTP, which is an application layer protocol. After it establishes a channel, we can use it to transmit some data on the transport layer or TCP/IP layer, i.e., data is carried through the upper application layer. When this occurs, a firewall is unable to intercept the information effectively.

We must obtain the corresponding tool traffic or real channel traffic to solve the problem. Following this, the DNS and other protocol traffic feature vectors are extracted. This includes both the content of the protocol itself as well as the statistical feature values, which form the feature vector. Finally, it is used as the basis for training a machine learning or ensemble learning model. With the trained model, the previously mentioned tools can identify traffic patterns.

Several methods can be used to improve the accuracy of the models discussed above. In utilizing AI, we can establish models based on different classes of data related to a specific issue using various algorithms. It is then possible to integrate these models and make them worthwhile. In addition, the same algorithm may be trained with different data to set up models that can be used in parallel. Blacklists and whitelists can also be considered alternatives to the AI approach for improving the model's accuracy.

Modeling involves a large number of processes and tools, and the entire process can be incorporated through modeling platforms and tool scripts. Many algorithms and libraries are currently available for application, such as TensorFlow and MLlib. Furthermore, the model can be continuously improved through multiple rounds of iteration to make it more adaptable to new sample categories or to reduce its false alarm rates.


Case studies and practical results

The trained model can be put into the appliance if the data input source is traffic. The original network traffic can be provided so that the appliance can use the built-in parsing engine to perform protocol parsing and feature vector extraction on the traffic, which can then be passed to the AI model for detection.

For the training of neural network-like deep learning algorithms requiring high computing power, you can use multiple devices or GPUs. While machine learning algorithms do not ask for high computing power. Alternatively, a distributed architecture can be used to apply the model, with the front-end appliance analyzing traffic protocols and generating metadata; the back-end appliance extracts feature vectors and pass them to the model.

Besides AI models, other detection methods can also be used in threat detection. For example, antivirus engines, Yara, features, threat intelligence, etc., can be combined with other applications to create a comprehensive solution. Furthermore, malicious encrypted traffic gives rise to another difficulty in the production environment; that is, if a problem is discovered, it is hard to determine whether it exists, which may be verified through other indirect means.

Consider the following scenario. An internal host accessed an external server and triggered an alarm on malicious encrypted traffic. Thus, we could assess the original host and attempt to make sure whether it has recently been attacked, whether there are harmful samples or Trojans, and whether it has been compromised successfully. On the remote end, we can identify whether there is a problem with the remote server by using IP or domain name intelligence. There is a greater chance of the event being malicious if both ends of the chain are risky.

A web-based attack can be evaluated by extracting its payload. For example, if it had experienced SQL injection, the injected content can be extracted in the traffic, allowing the injected statements to be seen after decoding. Webshell can also identify whether the content inside is abnormal access, much like XSS and other threats.

A complete attack process could be like the below image: a ransomware program is delivered to an asset of internal concern. The asset parses DNS and obtains an IP address, and then covert HTTP channels occur. All events are recorded in raw format. Additionally, the system automatically combines different events to form a more advanced alert. The entire process can also be visually and dynamically displayed, making it easy to understand and retrace which assets, external IP addresses, or devices have been connected to our network.

Upon threat detection with AI algorithms, it is possible to associate threats with different dimensions, such as the asset we are concerned about, the network behavior of the asset, and external threat intelligence. Then, a dynamic knowledge graph can be created. By relating form data intelligently, we will be able to improve the analysis efficiency, traceability, and ultimately, our daily operations.


Guest Introduction

Mr. Fu Jixiang is a graduate of Northeastern University with a degree in Information Security. Prior to joining Geyecloud.com as the technology director and pre-sales leader, he worked for KDDI China, Huawei, and WebRAY. As a network security expert with over ten years of experience, he specializes in applying artificial intelligence, big data, and network traffic analysis to detect advanced persistent threats.

Previously Mr. Fu was invited as a guest speaker at the Information Security Conference and the XFocus Information Security Conference (Xcon). Besides being interviewed, he also gave an impressive speech at the release conference of the 'Enterprise Advanced Threat Protection Guide' by one of China's leading cybersecurity media outlets aqniu.com.

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2022-08-31 16:38:34

AISummitAI

2021-01-15 12:56:36

人工智能人工智能應用

2021-09-26 12:00:58

AI創新Gartner

2009-12-24 10:16:19

Systems Dir

2012-09-13 09:47:16

CA收購PGTI

2012-05-29 09:44:30

戴爾Wyse Techno云計算

2014-10-15 14:07:40

思科UCS

2011-03-11 09:34:23

VMware vClo

2012-08-16 09:32:19

VMware

2011-08-01 16:52:00

ibmdwAIX

2012-09-13 11:17:22

IBMdw

2012-06-27 09:47:05

ibmdw

2010-12-29 10:25:07

VMControl

2013-02-21 10:07:28

vFabric AppVMware云平臺

2012-05-09 11:34:48

JavaScriptMotion Dete

2011-04-19 13:48:55

vCloud Dire

2018-08-10 08:45:10

2011-04-19 13:32:52

2022-08-30 19:53:54

cognitiveAINLP

2011-09-07 01:03:01

ibmdwDB2
點贊
收藏

51CTO技術棧公眾號

久激情内射婷内射蜜桃| 欧美最猛性xxxxx亚洲精品| 999这里有精品| 成人影音在线| 久久亚洲影视婷婷| 国产日本欧美一区二区三区在线| 青娱乐av在线| 国产一区二区三区探花| 3atv一区二区三区| 久久美女福利视频| 麻豆免费在线视频| 白白色 亚洲乱淫| 国产精品网站视频| 日韩 欧美 亚洲| 成人羞羞网站入口免费| 精品成人免费观看| 高清av免费看| jk漫画禁漫成人入口| 亚洲精品日韩综合观看成人91| 精品久久久久久一区二区里番| 中文文字幕一区二区三三| 欧美日韩调教| 日韩在线观看成人| 人人妻人人澡人人爽人人精品 | 自拍偷拍21p| 97人人爽人人澡人人精品| 国产精品久久久久久户外露出| 精品一区二区不卡| 精品国产999久久久免费| 青青草一区二区三区| 2019中文字幕在线免费观看| 九九热最新地址| 精品美女久久久| 日韩av网址在线| 一区二区三区人妻| 亚洲热av色在线播放| 91久久精品一区二区三区| 男人添女人下部视频免费| 日本电影在线观看网站| 国产欧美日韩激情| 欧美二区在线| 亚洲色图欧美视频| k8久久久一区二区三区| 亚洲在线免费看| 国产免费黄色大片| 麻豆国产精品一区二区三区 | 96sao精品免费视频观看| 色婷婷久久久综合中文字幕| 成年人网站免费视频| 蜜臀av在线播放| 一级精品视频在线观看宜春院| 国产欧美综合一区| 国产h视频在线播放| 欧美精品手机在线| av片中文字幕| 九色porny视频在线观看| 欧美激情欧美| 91精品国产综合久久久久久| 人人干人人干人人| 欧美三级电影网址| 欧美午夜精品一区| 久久久久久久久久一区| 欧美一级在线| 制服丝袜在线91| 曰本三级日本三级日本三级| 免费一区二区三区在线视频| 日韩欧美在线1卡| wwwxxxx在线观看| 国内精品国产成人国产三级粉色| 精品国精品自拍自在线| 久久久久久久人妻无码中文字幕爆| 爱爱精品视频| 亚洲精品国产精品国产自| 97人妻天天摸天天爽天天| 爽爽窝窝午夜精品一区二区| 亚洲偷欧美偷国内偷| 国产精品国产三级国产专业不| 成人一区二区| 久久久国产影院| 久热精品在线观看| 香蕉亚洲视频| 国产日韩在线视频| 亚洲成人77777| 99视频一区二区| 亚洲国产日韩美| 色www永久免费视频首页在线| 婷婷国产在线综合| 天美星空大象mv在线观看视频| 99视频这里有精品| 亚洲成人久久一区| 一级黄色录像毛片| 婷婷综合五月| 欧美亚洲伦理www| 一区二区不卡视频在线观看| 成人h动漫精品一区二区| 日本不卡一区二区三区视频| 成人免费看片| 欧美日韩一区二区精品| 国产性生活一级片| 亚洲97av| 欧美丰满少妇xxxxx做受| 丁香六月婷婷综合| 国产专区综合网| 欧美精品一区二区三区久久| 黄色片免费在线观看| 富二代精品短视频| 久久艹这里只有精品| 同性恋视频一区| 欧美国产日本高清在线| 国产99久久久久久免费看| 国产suv一区二区三区88区| 色综合久久久久久久久五月| www成人免费观看| 7777精品伊人久久久大香线蕉的 | 久久久久人妻精品一区三寸| 国产免费av国片精品草莓男男| 亚洲精品v欧美精品v日韩精品| 黄色录像免费观看| 免费在线亚洲欧美| 不卡日韩av| 免费超碰在线| 欧美在线观看你懂的| 国产艳俗歌舞表演hd| 欧美一区成人| 国产视频福利一区| 成年人免费在线视频| 精品福利免费观看| 欧美一级片在线免费观看| 久久成人综合| 国产精品久久久亚洲| 五月激情婷婷网| 亚洲综合色在线| 久久久九九九热| 91麻豆国产自产在线观看亚洲| 欧洲成人在线观看| 香蕉视频网站在线| 亚洲成人精品在线观看| 中文字幕人妻无码系列第三区| 日韩综合网站| 国产精品一二三视频| xxxxx日韩| 欧美在线观看禁18| 亚洲综合第一区| 日韩激情视频网站| 色涩成人影视在线播放| 日韩成人av电影| 亚洲欧美在线一区| 日本黄色一级视频| 国产亚洲一区二区三区四区| 欧美日韩在线中文| 最新亚洲精品| 国产mv免费观看入口亚洲| 欧美高清电影在线| 色又黄又爽网站www久久| 中文字幕一区二区三区人妻电影| 国产视频一区在线观看一区免费| 韩国成人动漫在线观看| 51漫画成人app入口| 亚洲激情 国产| 一级片中文字幕| 久久久久久免费网| 国产自偷自偷免费一区| 成人影院在线| 亚洲直播在线一区| 国产精品69xx| 日韩成人激情视频| 草莓视频18免费观看| 国产精品素人一区二区| 亚洲精品手机在线观看| 亚洲成人三区| 国产精品国色综合久久| 丝袜老师在线| 亚洲无限av看| 国产免费一区二区三区免费视频| 亚洲激情一二三区| 99re久久精品国产| 老司机一区二区| 精品免费久久久久久久| 林ゆな中文字幕一区二区| 人九九综合九九宗合| 91这里只有精品| 精品欧美乱码久久久久久1区2区| 久久精品国产亚洲av香蕉| 久久人人超碰精品| 久国产精品视频| 99在线观看免费视频精品观看| 日韩电影大全在线观看| 精品国模一区二区三区欧美| 欧美亚洲成人免费| 成人77777| 精品国产a毛片| 天堂免费在线视频| 亚洲伦理在线精品| 全黄一级裸体片| 国产精品一区在线| 亚洲乱码中文字幕久久孕妇黑人| 精品不卡在线| 国产精品久久久久久av公交车| 国语自产精品视频在线看一大j8 | www.五月天色| 日韩午夜在线| 欧美 国产 精品| 欧美精品一二| 国产精品国产一区二区| 日韩免费在线电影| 5566成人精品视频免费| 国产激情在线视频| 亚洲色图偷窥自拍| 黄色av中文字幕| 91精品国产综合久久福利| 午夜精品一区二| 亚洲成人自拍网| 中国一级片在线观看| 国产性天天综合网| 国产真实乱人偷精品| 国产一区不卡视频| 91网址在线播放| 亚洲尤物在线| 僵尸世界大战2 在线播放| 99久久精品费精品国产| 老司机精品福利在线观看| 亚洲一区二区电影| 91精品久久久久久综合乱菊 | 一区二区精品免费| 成人国产视频在线观看| 欧美国产在线一区| 美女精品一区二区| 99视频精品免费| 新67194成人永久网站| 轻点好疼好大好爽视频| 日韩成人精品一区| 欧美一区二区三区电影在线观看| 国产精品欧美大片| 高清国产在线一区| 视频成人永久免费视频| 亚洲一区二区三区在线免费观看| 激情中国色综合| 国产精品人成电影| 国产亚洲一区二区手机在线观看 | 精品久久ai电影| 99re在线视频观看| 中文字幕日韩在线| 4444kk亚洲人成电影在线| 精品成人18| 亚洲综合在线小说| 在线精品自拍| 国产精品国产一区二区| 大奶在线精品| 精品久久中出| 亚洲精品白浆高清| 久久国产一区二区| 美女毛片一区二区三区四区| 欧美凹凸一区二区三区视频| 亚洲毛片免费看| 日本一区网站| 久久免费大视频| 最近免费观看高清韩国日本大全| 91久久国产| 毛片av在线播放| 亚洲精品色图| 国产福利视频在线播放| 日本在线不卡视频一二三区| 色多多视频在线播放| 黄色小说综合网站| 人妻体体内射精一区二区| 成人中文字幕电影| 久久久午夜精品福利内容| 91色九色蝌蚪| 18啪啪污污免费网站| 亚洲男女一区二区三区| 久久久综合久久| 色综合久久久久网| 在线播放成人av| 日韩网站在线看片你懂的| 欧美少妇bbw| 亚洲欧美日韩精品久久亚洲区| 成年人视频在线免费观看| 欧美理论电影在线观看| av资源中文在线| 日韩av手机在线观看| 深夜福利亚洲| 国产美女精品在线观看| 精品视频亚洲| 国产91视频一区| 久久久天天操| 免费成人黄色大片| 91亚洲精华国产精华精华液| 色欲AV无码精品一区二区久久| 亚洲精选一二三| 欧美日韩综合在线观看| 欧美人伦禁忌dvd放荡欲情| 蜜桃在线一区二区| 中文字幕在线亚洲| av蜜臀在线| 成人激情视频网| 美女呻吟一区| 在线一区日本视频| 亚欧成人精品| 永久看看免费大片| 国产精品区一区二区三| 你懂的国产视频| 在线91免费看| 日韩二区三区| 欧美精品18videos性欧美| 丁香婷婷久久| 欧美精品一区二区三区久久| 欧美视频福利| 99中文字幕在线| 久久久久高清精品| 国产一国产二国产三| 欧美精品国产精品| 国产一级在线观看| 海角国产乱辈乱精品视频| 97精品资源在线观看| 色一情一乱一伦一区二区三欧美| 亚洲精品麻豆| 亚洲国产欧美日韩在线| 中文字幕在线不卡国产视频| 一级一片免费看| 亚洲精品成人免费| 欧洲中文在线| 亚洲一区二区三区乱码aⅴ蜜桃女| 精品美女久久| 青青青国产在线视频| 2023国产精品| 欧美精品亚洲精品日韩精品| 日韩欧美中文字幕一区| 男人天堂手机在线| 国产精品久久久久久av福利| 伊人春色精品| 狠狠爱免费视频| 97成人超碰视| 男女啊啊啊视频| 日韩精品福利在线| 免费成人在线电影| 极品日韩久久| 亚洲激情影院| 日本少妇xxxx| 精品久久久久久久久久久久| 欧美一区二不卡视频| 国内揄拍国内精品| 女同另类激情重口| 日韩av三级在线| 91玉足脚交白嫩脚丫在线播放| 国产一级特黄aaa大片| 精品国产露脸精彩对白| 国产在线拍揄自揄拍视频| 国产精品二区三区四区| 亚洲经典三级| 中文字幕在线播放视频| 欧美性生活大片免费观看网址| 亚洲精品一区二区三区蜜桃| 久久久久久尹人网香蕉| 黑人久久a级毛片免费观看| 熟女少妇在线视频播放| 91蜜桃传媒精品久久久一区二区| 日本熟女毛茸茸| 一区二区三区国产视频| 欧美网站免费| av久久久久久| 成年人网站91| 黄色一级视频免费看| 中文字幕欧美视频在线| 成人在线精品| 国产91沈先生在线播放| 91在线精品秘密一区二区| 一级片免费在线播放| 在线免费观看羞羞视频一区二区| 亚洲美女色播| 日本黄大片在线观看| 91亚洲精品久久久蜜桃网站| www.亚洲激情| 色综合色综合久久综合频道88| 国产精品毛片av| 校园春色 亚洲色图| 亚洲另类在线一区| 天堂成人在线观看| 国产免费观看久久黄| 亚洲精品在线观看91| 中出视频在线观看| 在线精品视频一区二区| av免费在线观| 牛人盗摄一区二区三区视频 | 喷水视频在线观看| 欧美丝袜丝交足nylons| 人交獸av完整版在线观看| 欧美日韩一区二区三区在线观看免 | 91综合久久爱com| 国产精品视频黄色| 亚洲最大的成人av| av在线播放网站| 国产精品一区免费观看| 美腿丝袜在线亚洲一区| 国产精品不卡av| 社区色欧美激情 | 精品中国亚洲| 天天操精品视频| 在线看国产一区| rebdb初裸写真在线观看| 一区二区三区欧美在线|