Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Machine Learning Is Helping to Combat Cyberthreats

CenturyLink’s Black Lotus Labs Shows Importance of DNS Monitoring

Domain Name Server (DNS) tunneling remains a popular method used for cyberattacks because too many organizations allow DNS traffic to go unmonitored. In a new blog, technology leader CenturyLink shares insights from its threat research and operations team, Black Lotus Labs, about the security risk posed by lax attitudes toward monitoring.

Read More: Google Cloud and VMware Extend Strategic Partnership

Among the dangers of DNS tunneling is it can be used to encode data in subdomains of a query or response, allowing unabated network access to extract data, subvert security controls or send arbitrary traffic. On average, Black Lotus Labs monitors 771 million queries globally each day for tunneling activity and other potentially malicious behavior. The team uses machine learning techniques to flag suspicious domains, evaluate them and protect CenturyLink and its customers against them. Left undetected, this covert channel for communication can cause significant impact to businesses.

Related Posts
1 of 41,052

“CenturyLink operates one of the largest resolution services on the internet. This gives us the unique ability to identify and enumerate malicious infrastructure changes as they propagate,” said Mike Benjamin, head, Black Lotus Labs. “The concern is, not enough is being done to monitor queries so we hope this information helps to bring awareness of the risk to more people.”

Read More: tZERO Crypto App to Add Ravencoin as Third Cryptocurrency

Steps to Subvert This Popular Attack Method:

  • Implement protocols to monitor DNS traffic and logs for anomalies that may indicate malicious use of DNS
  • Embed security in the network and leverage an agile threat environment that includes the ability to automatically terminate malicious queries
  • Evaluate what constitutes a trusted network environment and practice good cyber hygiene

Read More: ANSYS and Edge Case Research Transform Autonomous Vehicle Artificial Intelligence

3 Comments
  1. Copper scrap market transparency Copper scrap annealing Scrap metal legal compliance
    Copper cable scrap purchasing, Metal scrap bundling, Copper scrap exporters

  2. Iron waste reclaiming says

    Scrap metal reprocessing facility Ferrous material industry research Iron scrap baling services

    Ferrous material value addition, Iron scrap reclaiming services, Scrap metal salvaging

  3. kaizenaire.com says

    Thanks for your article. Another element is that being photographer includes not only problem in taking award-winning photographs and also hardships in getting the best photographic camera suited to your requirements and most especially situations in maintaining the quality of your camera. This really is very real and clear for those photographers that are straight into capturing a nature’s engaging scenes – the mountains, the actual forests, the actual wild or seas. Visiting these amazing places absolutely requires a camera that can live up to the wild’s nasty surroundings.

Leave A Reply

Your email address will not be published.