Thursday, July 19, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Comcast Won't Pursuit Fox assets, Focuses on Sky Offer
EU to Probe Qualcomm Over Pricing Case
Google's Project Fuchsia Could Be The Successor of Android Successor to Android
TSMC Cuts Sales, Spending Outlook
Alphabet to Deploy Balloon Internet in Kenya
New Xiaomi Mi Max 3 has a 6.9-inch Screen But Only 1080p
Corning Gorilla Glass 6 Promises Improved Durability for Mobile Devices
Samsung's Foldable Phone Coming Next Year, WSJ Claims
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > NEC Use...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, June 16, 2016
NEC Uses Artificial Intelligence to Automatically Detect Unknown Cyber-attacks


NEC Corp. has developed a "system operations-visualization and anomaly-analysis technology" that uses artificial intelligence (AI) to automatically detect unknown cyber-attacks against social infrastructure and enterprise systems.

The new technology learns (through machine learning) the normal state of OS-level operations (program start-up, file access, communications, etc.) for entire ICT systems, including PCs and servers. It then carries out real-time comparisons and analysis of current operations in the system's normal state and automatically isolates particular points that deviate from the normal state by using system operation tools and Software-Defined Networking (SDN).

Further, a detailed knowledge of the system behavior makes it possible to identify the extent of damage 90% faster than the time required in conventional manual investigation. Accurate anomaly detection and quick specification of damaged areas by the new technology minimize the damage from cyber-attacks and enable recovery without stopping an entire user-system.

"It is remarkably difficult for current cyber-attack countermeasures, which are carried out based on known attack methods, to protect systems against unknown attacks. The new technology, which is based only on subtle changes observed in OS-level behavior as a consequence of attacks, rather than on the attack methods, enables an innovative approach to deal with completely new cyber-attacks," said Motoo Nishihara General Manager, Cloud System Research Laboratories, NEC Corporation.

NEC conducted trials of the technology on its in-house ICT system and found that it was able to detect all simulated attacks. Going forward, NEC will carry out trials on systems serving critical infrastructure, such as power plants and factories, aiming to commercialize the technology by the end of FY2016.



Previous
Next
Samsung to Buy Joyent to Expand Cloud Services        All News        Napster Returns as Rhapsody Rebrands
Samsung to Buy Joyent to Expand Cloud Services     General Computing News      Napster Returns as Rhapsody Rebrands

Get RSS feed Easy Print E-Mail this Message

Related News
NEC Uses AI to Enable 26Tbps Submarine Cable Network
U.S. Sanctions Russian Cyber Actors for Cyber-Attacks
Peer-to-peer App Kicked off Dofoil Coin Miner Outbreak
U.S. Takes Down Cybercriminal Enterprise Responsible for More than $530 Million in Losses
HARMAN and Samsung Unveil Connectivity and Autonomous Driving Technology at CES 2018
Atomic Switches Pave The Way For Neuromorphic Chipsets
Samsung is Launching Samsung Connect Home Smart Wi-Fi System
TAG Heuer Connected Modular 45 Smartwatch Costs $1,600, Has An Intel Mobile Chip Inside
Sophisticated Cybercriminal Ad-Fraud Rakes in Millions Per Day
U.S. To Review Cyber Attacks Beyond 2016 Election
Avalanche Network Dismantled in Cyber Operation
Internet Disruptions Were Caused By Attacked Connected Devices

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .