Monday, February 19, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Microsoft Reveals Windows 10 on ARM Limitations
Fujitsu to Showcase Quantum-Inspired, Digital Annealer Computational Architecture at Mobile World Congress 2018
Investors and Consumers Sued Intel Over Meltdown and Spectre CPU Security Flaws
Belgian Court Fines Facebook Over Users Tracking
Beocreate 4 Channel Amplifier Will Make Your Vintage Speakers Smart
Qualcomm is Seeking for a Better Offer From Broadcom
Uber Introduces New Safety Features
Apple to Fix the Telugu Bug in iPhones
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > NEC Use...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 16, 2016
NEC Uses Artificial Intelligence to Automatically Detect Unknown Cyber-attacks


NEC Corp. has developed a "system operations-visualization and anomaly-analysis technology" that uses artificial intelligence (AI) to automatically detect unknown cyber-attacks against social infrastructure and enterprise systems.

The new technology learns (through machine learning) the normal state of OS-level operations (program start-up, file access, communications, etc.) for entire ICT systems, including PCs and servers. It then carries out real-time comparisons and analysis of current operations in the system's normal state and automatically isolates particular points that deviate from the normal state by using system operation tools and Software-Defined Networking (SDN).

Further, a detailed knowledge of the system behavior makes it possible to identify the extent of damage 90% faster than the time required in conventional manual investigation. Accurate anomaly detection and quick specification of damaged areas by the new technology minimize the damage from cyber-attacks and enable recovery without stopping an entire user-system.

"It is remarkably difficult for current cyber-attack countermeasures, which are carried out based on known attack methods, to protect systems against unknown attacks. The new technology, which is based only on subtle changes observed in OS-level behavior as a consequence of attacks, rather than on the attack methods, enables an innovative approach to deal with completely new cyber-attacks," said Motoo Nishihara General Manager, Cloud System Research Laboratories, NEC Corporation.

NEC conducted trials of the technology on its in-house ICT system and found that it was able to detect all simulated attacks. Going forward, NEC will carry out trials on systems serving critical infrastructure, such as power plants and factories, aiming to commercialize the technology by the end of FY2016.



Previous
Next
Samsung to Buy Joyent to Expand Cloud Services        All News        Napster Returns as Rhapsody Rebrands
Samsung to Buy Joyent to Expand Cloud Services     General Computing News      Napster Returns as Rhapsody Rebrands

Get RSS feed Easy Print E-Mail this Message

Related News
U.S. Takes Down Cybercriminal Enterprise Responsible for More than $530 Million in Losses
HARMAN and Samsung Unveil Connectivity and Autonomous Driving Technology at CES 2018
Atomic Switches Pave The Way For Neuromorphic Chipsets
Samsung is Launching Samsung Connect Home Smart Wi-Fi System
TAG Heuer Connected Modular 45 Smartwatch Costs $1,600, Has An Intel Mobile Chip Inside
Sophisticated Cybercriminal Ad-Fraud Rakes in Millions Per Day
U.S. To Review Cyber Attacks Beyond 2016 Election
Avalanche Network Dismantled in Cyber Operation
Internet Disruptions Were Caused By Attacked Connected Devices
Europol Says Ransomware Is A Top Cybercrime Threat
Minecraft: Education Edition will launch November 1
Fujitsu Technology Analyzes Cyber Attacks

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .