F5 to Demonstrate Advanced Threat Research at NVIDIA GTC

Lori MacVittie Miniature
Lori MacVittie
Published March 16, 2022
  • Share via AddThis

Traditional cybersecurity methods and tools are not fast enough and rely too heavily on heuristics to keep up with attackers. Cybersecurity must redefine itself and look to a new generation of hardware to leverage AI/ML and analyze telemetry in near real-time to leapfrog attackers and uncover their nefarious schemes sooner.

GTC stats

This is why it’s so important for security companies to conduct advanced threat research and take advantage of technologies like NVIDIA’s Morpheus AI Cybersecurity Framework. Mitigating known attacks and vulnerabilities is important but quickly rooting out hidden exploits and vulnerabilities in systems, software, and infrastructure is critical. Using AI/ML enables real-time detection and mitigation of threats at scale. The NVIDIA Morpheus framework provides a highly scalable, customizable accelerated data processing, training, and inferencing capabilities. These capabilities enable real-time detection in mission-critical cybersecurity use cases.

One such use case is an attack that abuses the nature and reliance of digital connectivity on DNS. Attackers use DGAs (Domain Generation Algorithms) to generate gibberish domain names such as “” that ultimately resolve to a real IP address where—you guessed it—a command and control system is just waiting to grab every bit unknowingly transmitted to it.

You can also learn more about these attacks—and how F5 is leveraging NVIDIA’s Morpheus AI Framework to detect them—from Sr. Dir. Threat Research Aditya Sood and CTO Geng Lin in an upcoming NVIDIA GTC session on Thursday, March 24 at 11 a.m. PDT.

Their presentation will include the demonstration of an end-to-end working prototype using DNS data—primarily domain names—to detect suspicious domains names potentially generated by DGAs embedded in malicious code running on compromised systems.

You can register and attend NVIDIA GTC for free.