Advanced Firewall Protection to Thwart AI-based Cyber Attacks

September 5, 2017 | By admin
1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, 5.00 / 5
Loading...

Cyber experts ponder whether next generation firewalls (NGFW) would be able to block cyber attacks involving artificial intelligence (AI) and machine learning. The methods and tools for cyber security have evolved over the years, and so have the threats, technologies, and sophistication in attacks. It is feared that AI + machine learning would be able to breakthrough NGFWs.

firewall protection

Affordable Artificial Intelligence

AI, which was prohibitively expensive earlier has become comparatively more affordable, so that not only well-funded nation-state actors but even moderately funded cyber criminal groups are able to have a go. Penetrating through the firewall defenses of an enterprise network maybe just getting through a layer of defense. But, it is like breaching a fort.

Firewalls typically provide protection at the network layer. Cyber criminals are now utilizing transport layer security (TLS) and focussing their attacks on the application layer to hide their connections. These malicious connections are not detectable by most Firewalls.

Nowadays, it is not very difficult to build an AI hacking platform. The software required – such as OpenAI or TensorFlow – are quite easily available, and computing power can be stolen from compromised computers. Utilizing these resources, the threat actors focus their attacks on the application layer. They now attempt to exploit even known vulnerabilities using application security scanners.

HTTPS-Wrapped Attacks

Threat actors have resorted to sending traffic over TCP, wrapped in HTTPS, to thwart detection. Since it is https, most networks will allow it. Further, the cyber criminals run their command and control server from a legitimate (but compromised) website. To thwart these types of attacks, enterprise IT security administrators install web application firewalls. However, cyber criminals seem to have found out ways to penetrate these firewalls.

Hackers are employing numerous methods such as phishing attacks, spear phishing attacks, and drive-by-downloads to infiltrate an enterprise network. Penetrating the network and infecting an endpoint gives a foot-hold for the attacker. Once inside they are able to spread within the network and infect other endpoints. Removing an attacker and the malware from the endpoints is a cumbersome task. As always, prevention is better than cure. The use of public Wi-Fi by mobile employees to access the enterprise network on their devices (laptops, smartphones, etc…,) is a grave risk, which is capitalized by the attackers.

The Importance of Endpoint Security

This is where endpoint security (an antivirus solution) is of paramount importance. A robust endpoint security can detect real-time malicious activity based on behavioral monitoring.

How to Stay Secure

  • Get an advanced firewall protection – web application firewalls (WAF) -that can detect and block AI + machine learning-based attacks
  • Get robust endpoint point security

comodo antivirus

comodo antivirus

Related Resources

Free Firewall

FAQ Pages

Load More

1. Get an advanced firewall protection – web application firewalls (WAF) -that can detect and block AI + machine learning-based attacks

2. Get robust endpoint point security.

  • admin Neville says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    Hello very cool site!! Guy .. Beautiful .. Superb .. Ӏ’ll bookmark your site and take the fseds also? I’m satisfied to seek out so many usefuⅼ info here in the put up, we need ɗevelop extra strtategies in thiѕ regaгd, thanks for ѕharing. . . . . . Also visit my page :: osteopath poole
  • admin pHqghUme says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    1
  • admin Rusty says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    I don’t even know the way I ended up right here, but I assumed this post used to be great. I do not understand who you might be but certainly you’re going to a well-known blogger when you aren’t already. Cheers! My page: NFL tickets
  • admin Mahnoordanish says:
    Your comment is awaiting moderation. This is a preview; your comment will be visible after it has been approved.
    block hacker
  • Comment on this FAQ

    Your email address will not be published. Required fields are marked *

    Load More

    Spread the love

    Add new comment

    Your name
    Comment

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

    Comodo Complete Antivirus Icon
    The World's Only Complete Antivirus for $29.99/yr

    Protect Your PC Against All Threats with Enterprise-Grade Technology for Home.

    Got more than 1 PC? Get 3 Licenses for $39.99