▪ Enormous increase in network traffic in recent years and the resulting security threats are posing many challenges for detecting malicious network intrusions
▪ To address these challenges, Deepcracker based Tensor Knight Cloud Security AI has been implemented
▪ Brute-force attack consists of an attacker submitting many passwords or passphrases
▪ Heartbleed attack – scan for vulnerable applications (e.g., OpenSSL), and exploit them to retrieve the memory of the web server (can include passwords, credit card numbers, private email or social media messages)
▪ Botnet attack via a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Services (DDoS) attacks, steal data,send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software
▪ DoS attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network
▪ In a DDoS attack the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate against this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources
▪ Web attacks – scan a website for vulnerable applications, and conduct SQL injection, command injection, and unrestricted file upload
▪ Infiltration of the network from inside attack – a vulnerable application (e.g., PDF Reader) is sent via a malicious email attachment, and if exploited, it is followed by IP sweep, full port scan, and service enumerations
▪ Deepcracker deep learning algorithm
to detect malicious https flows
▪ Horisontal and vertical port scan detector
▪ Malware control center detector using Deepcracker algorithm
▪ Flow malicious detector
▪ Data leaks detector
▪ Evil IP checker using VirusTotal and RiskIQ
▪ IP information collector
▪ ARP attacks detector
▪ STIX format alerts exporter
▪ Malicious IP blocker
Copyright © 2022-2025 Tensor Engine Cloud Services L.L.C. - All Rights Reserved.
532-07, Al Saaha, Souk Al Bahar
Burj Khalifa, Dubai
The United Arab Emirates
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.