The Wayback Machine - https://web.archive.org/web/20171128173710/http://ajax.sys-con.com/node/4201108

Welcome!

Machine Learning Authors: Liz McMillan, Kevin Jackson, Pat Romanski, Peter Davidson, Rene Buest

Related Topics: Machine Learning , @CloudExpo, Cloud Security, SDN Journal

Machine Learning : Blog Post

Top Places to Check for Signs of a Targeted Attack in Your Network | @CloudExpo #Cloud #Security

Targeted attacks on the network of a business can be big trouble. A business should know where to look to stop the attacks

Targeted attacks on the network of a business can be big trouble. A business should know where to look and what to look for to stop the attacks.

Businesses are aware of the dangers of hackers. They know that a hacker can steal private information that hey store on their computer networks. They recognize that hackers can create problems for the business and the business's computer systems through a variety of different ways.

Being aware of the dangers and knowing what to do about them is not the same thing. Unless a business has a big IT department, their ideas about network security are not always correct. They may not realize that they are the target of hackers. They may assume that hackers either try to cast a wide net with the hope of catching someone or they target bigger companies. A smart business recognizes the threats of targeted attacks and knows where and how to look for them and what to do when they find them.

What Are the Threats?
Before a business can learn where to look for the threats of hackers, they need to understand what the threats are. There was a time when hackers had limited tools. Businesses did not rely on their computer systems as much as they do know.

Businesses have changed. They store more and more Information on computer systems and on the cloud. The information is the target of the hackers today. The hackers are not the same they were in the past. They have come up with tools to get past the security systems that businesses have in place. Businesses keep working to improve their security and the hackers keep working to get around it. That is why businesses need to know where the hackers are trying to attack.

7 Points of Attack
While hackers may attack almost anywhere a business uses computers, there are seven places that people can watch that are signs of a potential attack from hackers. A business that knows these places can also put the systems in place to stop a hacker's attack.

1. Domain Name Systems - These are known as the DNS Records. Hackers try to fool people searching for a business on the internet by creating domain names that are similar to the real business domain address. If people make a mistake typing the name of the business they could end up landing on the wrong website and may share information with the hacker instead of the business.

IT security intelligence can check for potential problems from these DNS records. They can search for a variety of things that are signs of hacker's attacks, including unknown domains with specific IPs, Domains that were recently registered that are unknown, domains with random characters or domains that imitate other legitimate domains.

2. Heed the Warnings of Security Systems - Computer systems will send out alerts of possible problems with the security systems and files. A business often assumes that the warnings are false alarms if they recognize the file or information that the threat intelligence services are giving them. It is not always a smart idea to ignore these warnings.

Network security intelligence will help prevent the attacks on a network. It can spot the hackers when they are trying to get into the computer system of a business. The only flaw they have is they require the user of the intelligence services to act on the threats they find.

3. Unknown and Large Files - Hackers plan their attacks in advance. They work to place large unknown files on the computer systems of a business. Regular searches for these types of files with cyber security intelligence software can prevent hackers from ever using them.

4. Watch the Network Log - Audits of the network log for strange or abnormal connections is another way to stop attacks from hackers. This requires someone to understand what the normal activity of the business network looks like. The only way to see activity that is out of the ordinary is by being aware of what is supposed to happen on the network.

5. Check the Logins - Hackers do not always have a password to login to computer systems and business accounts. The login record can show the business failed attempts at a login to the network or the computer systems of the business. Unusual amounts of this type of activity is a sign of a hacker. To maintain the security of a network, the business should do regular audits of these records.

6. Unusual Protocols - Like the unusual connections, spotting abnormal protocols is not easy. Hackers are smart and will try to use protocols based on the way the businesses network operates. Spotting something that is out of the ordinary requires looking past the first layer of the protocol connection and studying the content of the connection.

7. Look at Email Activity - Emails have been around for a long time and are a favorite tool for hackers. Hackers use phishing attacks to get into the networks of a business. Increased email activity is a sign of a possible phishing attack. A business may hope that they have taught their employees how to avoid this type of attack, but they also need to take steps to prevent these attacks from reaching the employees. Auditing email records is one way to do this type of cyber security.

Stopping the Threats
It is very important that a business recognizes the different types of threats from hackers and knows how to search for them. They also need to understand the different ways they can stop the attacks of the hackers. Intelligence software that can perform many of the tasks needed to spot potential threats is one way to do that. There is plenty of technology that businesses can use to put a safety net around their computer network and systems to prevent the attacks from hackers.

Cyber security is similar to insurance. People spend money on insurance with the hope that they never have a need for it. Businesses invest in security for their computer systems and networks with the hopes that a hacker never attempts to get into them. The good news is that hackers are looking for the easiest targets to attack. The businesses that take the time and energy to protect their networks through the use of different threat intelligence services and by learning where to look for threats are the ones that are a target hackers avoid.

More Stories By Peter Davidson

Being a senior business associate, Peter Davidson strives to help different brands and start ups to make efficient business decisions and plan effective business strategies. With years of rich domain expertise, he loves to share his views on the latest technologies and applications through his well researched content pieces. Follow him on Google+ and Twitter.

@CloudExpo Stories
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding busin...
"WineSOFT is a software company making proxy server software, which is widely used in the telecommunication industry or the content delivery networks or e-commerce," explained Jonathan Ahn, COO of WineSOFT, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things’). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing? IoT is not about the devices, it’s about the data consumed and generated. The devices are tools, mechanisms, conduits. In his session at Internet of Things at Cloud Expo | DXWor...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone inn...
Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams. In his session at 22nd Cloud Expo | DXWorld Expo, Daniel Jones, CTO of EngineerBetter, will answer: How can we improve willpower and decrease technical debt? Is the present bias real? How can we turn it to our advantage? Can you increase a team’s effective IQ? How do DevOps & Product Teams increase empathy, and what impact does empath...
"Digital transformation - what we knew about it in the past has been redefined. Automation is going to play such a huge role in that because the culture, the technology, and the business operations are being shifted now," stated Brian Boeggeman, VP of Alliances & Partnerships at Ayehu, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis tool. It is an extremely lightweight tool that can integrate with pretty much any build process right now," explained Andrew Siegmund, Application Migration Specialist for CAST, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that's no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, explored how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He expla...
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With technology insights and real-world examples, in his general session at @DevOpsSummit, at 21st Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, explored how leading organizations use data-driven DevOps to close th...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Digital Transformation (DX) is not a "one-size-fits all" strategy. Each organization needs to develop its own unique, long-term DX plan. It must do so by realizing that we now live in a data-driven age, and that technologies such as Cloud Computing, Big Data, the IoT, Cognitive Computing, and Blockchain are only tools. In her general session at 21st Cloud Expo, Rebecca Wanta explained how the strategy must focus on DX and include a commitment from top management to create great IT jobs, monitor ...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
You know you need the cloud, but you're hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You're looking at private cloud solutions based on hyperconverged infrastructure, but you're concerned with the limits inherent in those technologies. What do you do?
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D