NEC Technology uses artificial intelligence to automatically detect unknown attacks - Internet
NEC Corporation today announced the development of a "technology-visualization system operations and anomaly -Analysis "that uses artificial intelligence (AI) to automatically detect unknown cyber attacks against the social infrastructure and enterprise systems.
new technology learns (through machine learning) the normal level of OS operations (starting the program, file access, communications, etc.) for the entire ICT systems, including PCs and servers. It then makes comparisons and analysis of current operations in the normal state of the system in real time and automatically isolates particular points that deviate from the normal state using the system operating tools and Software-Defined Networking (SDN).
Furthermore a detailed knowledge of the system behavior to identify the extent of damage 90% faster than the time required for a conventional manual investigation. accurate detection of anomalies and easy specification of the areas damaged by the new technology to minimize damage from cyber attacks and allow recovery without stopping a complete user system.
"It is remarkably difficult for the cyber attack against measures underway that are made based on known attack methods to protect systems against unknown attacks. The new technology, which is based only subtle changes in the OS level behavior as a result of attacks, rather than the methods of attack allows an innovative approach to face any new cyber attacks, "said Motoo Nishihara General Manager, system cloud Research Laboratories, NEC Corporation.
NEC led the technology of testing its computer system internally and found that it was able to detect all the simulated attacks. In the future, NEC will conduct tests on systems for critical facilities such as power plants and factories, in order to commercialize the technology by the end of FY2016.
As part of its focus on solutions to society, NEC is continuing the development of this technology and other advanced technologies that contribute to improved cyber security measures.
0 comments:
Post a Comment