NormShield Blog

machine learning

Machine Learning in Cyber Security Domain – 7: IDS/IPS with ML

Machine Learning IDS/IPS with ML; Intrusion Detection and Intrusion Prevention Systems (IDS / IPS) basically analyze data packets and determine whether it is an attack or not. After analyzing part, the system is able to take some precautions according to the result. IDS/IPSs can be considered as two main categories based on operational logic; (1) […]

machine learning

Machine Learning in Cyber Security Domain – 6: False Alarm Rate Reduction

Machine Learning False Alarm Rate Reduction; In some cases, IDS / IPS Systems may classify an event correctly or falsely. Classified events are evaluated in four categories in literature. True Positives (TP): intrusive and anomalous, False Negatives (FN): Not intrusive and not anomalous, False Positives (FP): not intrusive but anomalous, True Negatives (TN): Intrusive but […]

Machine Learning

Machine Learning in Cyber Security Domain – 5: Captcha Bypassing

Machine Learning Captcha Bypassing; Before we explain how captcha mechanism can be bypassed, we want to give you a brief introduction about what captcha mechanism is and how it works. The main purpose of captcha mechanism is to provide secure authentication for users with asking some questions which are easy for human, however tough for […]

Machine Learning

Machine Learning in Cyber Security Domain – 4

Machine Learning in Cyber Security Domain; As a dictionary term, Authentication (or Verification) is independent procedures that are used together for checking that a product, service, user or system meets requirements and specifications and that it fulfills its intended purpose. User verification is a mechanism which gives permission to user to log in applications or […]

Machine Learning

Machine Learning in Cyber Security Domain -3: Fraud Detection

Machine Learning in Cyber Security Domain; Fraud is one of the ancient thing in human history. As there is always people who is fraudulent, there is also people who defrauded. The money e.g. credit cards are well-known targets for being targeted by fraudulent activities. With the development of e-marketing sector, the count of fraudulent activities […]

Machine Learning, Cyber Incident Forecasting

Machine Learning in Cyber Security Domain -2: Rating and Incident Forecasting

Machine Learning in Cyber Security Domain; Before starting to explain how rating and forecasting mechanism works and which machine learning algorithms can be used in it, we want to give you brief introduction about why we need cyber security rating, where it can be used in real world, and how these informations can be useful […]

Machine Learning

Machine Learning in Cyber Security Domain -1: Fundamentals

Machine Learning in Cyber Security Domain; In recent years, attackers have been developing more sophisticated ways to attack systems. Thus, recognizing these attacks is getting more complicated in time. Most of the time, network administrators were not capable to recognize these attacks effectively or response quickly. Therefore, there is a lot of software has been […]

Free Intelligence Service

Free Intelligence Service

NORMSHIELD FREE INTELLIGENCE SERVICE AGAINST CYBER THREATS! NormShield Cyber Intelligence service continuously monitors potential cyber threats globally and has started to publish freely phishing fraudulent domain names abused actively by ransomware malware operators starting from June 1 2016. The first phase aims to handle threats specific to Turkey, however, the focus will be shifted to […]

Botnet Detection, Malicious Javascript Code

Botnet Detection

Botnet Detection; Criminals often use trojans to infect a large number of computers for creating their zombie or bot networks. These bot or zombie computers form a network named botnet. As a keylogger, botnets are being used to steal a wide range of information, including tens of thousands of login credentials, generally for financial accounts, […]

NormShield Threat Vulnerability Orchestration

Unified Vulnerability Management

Unified Vulnerability Management; Security professionals usually apply penetration testing once a year but there are ~13000 new vulnerabilities discovered every year. Besides developers deploy new applications almost every month, 20K+ personally identifiable information (PII) leaks every week, hundreds of hackers scan every single possible port on entire Internet every day! Even a small mistake or […]