Profile cover photo
Profile photo
NormShield Solution
About
Posts

Post has attachment
Machine Learning in Cyber Security Domain - 7: IDS/IPS with ML
Intrusion Detection and Intrusion Prevention Systems (IDS / IPS) basically analyze data packets and determine whether it is an attack or not. After analyzing part, the system is able to take some precautions according to the result. IDS/IPSs can be consider...

Post has attachment
Machine Learning in Cyber Security Domain - 6: False Alarm Rate Reduction
In some cases, IDS / IPS Systems may classify an event correctly or falsely. Classified events are evaluated in four categories in literature. True Positives (TP): intrusive and anomalous, False Negatives (FN): Not intrusive and not anomalous, False Positiv...

Post has attachment
Machine Learning in Cyber Security Domain - 5: Captcha Bypassing
Before we explain how captcha mechanism can be bypassed, we want to give you a brief introduction about what captcha mechanism is and how it works. The main purpose of captcha mechanism is to provide secure authentication for users with asking some question...

Post has attachment
Machine Learning in Cyber Security Domain - 4: Secure User Authentication
As a dictionary term, Authentication ( or Verification) is independent procedures that are used together for checking that a product, service, user or system meets requirements and specifications and that it fulfills its intended purpose. User verification ...

Post has attachment
Machine Learning in Cyber Security Domain - 3: Fraud Detection
Fraud is one of the ancient thing in human history. As there is always people who is fraudulent, there is also people who defrauded. The money e.g. credit cards are well-known targets for being targeted by fraudulent activities. With the development of e-ma...

Post has attachment
Machine Learning in Cyber Security Domain - 2: Cyber Security Rating and Incident Forecasting
Before starting to explain how rating and forecasting mechanism works and which machine learning algorithms can be used in it, we want to give you brief introduction about why we need cyber security rating, where it can be used in real world, and how these ...

Post has attachment
Machine Learning in Cyber Security Domain - I: Fundamentals
In recent years, attackers have been developing more sophisticated ways to attack systems. Thus, recognizing these attacks is getting more complicated in time. Most of the time, network administrators were not capable to recognize these attacks effectively ...

Post has attachment
Free Intelligence Service
NORMSHIELD FREE INTELLIGENCE SERVICE AGAINST CYBER THREATS! NormShield Cyber Intelligence service continuously monitors potential cyber threats globally and has started to publish freely phishing fraudulent domain names abused actively by ransomware malware...

Post has attachment
Botnet Detection
Criminals often use trojans to infect a large number of computers for creating their zombie or bot networks. These bot or zombie computers form a network named botnet. As a keylogger, botnets are being used to steal a wide range of information, including te...

Post has attachment
Unified Vulnerability Management
Security professionals usually apply penetration testing once a year but there are ~13000 new vulnerabilities discovered every year. Besides developers deploy new applications almost every month, 20K+ personally identifiable information (PII) leaks every we...
Wait while more posts are being loaded