Traditional cybersecurity methods and tools are not fast enough and rely too heavily on heuristics to keep up with attackers. Cybersecurity must redefine itself and look to a new generation of hardware to leverage AI/ML and analyze telemetry in near real-time to leapfrog attackers and uncover their nefarious schemes sooner.

This is why it’s so important for security companies to conduct advanced threat research and take advantage of technologies like NVIDIA’s Morpheus AI Cybersecurity Framework. Mitigating known attacks and vulnerabilities is important but quickly rooting out hidden exploits and vulnerabilities in systems, software, and infrastructure is critical. Using AI/ML enables real-time detection and mitigation of threats at scale. The NVIDIA Morpheus framework provides a highly scalable, customizable accelerated data processing, training, and inferencing capabilities. These capabilities enable real-time detection in mission-critical cybersecurity use cases.
One such use case is an attack that abuses the nature and reliance of digital connectivity on DNS. Attackers use DGAs (Domain Generation Algorithms) to generate gibberish domain names such as “qjdygsnoiqaudcq.com” that ultimately resolve to a real IP address where—you guessed it—a command and control system is just waiting to grab every bit unknowingly transmitted to it.
You can also learn more about these attacks—and how F5 is leveraging NVIDIA’s Morpheus AI Framework to detect them—from Sr. Dir. Threat Research Aditya Sood and CTO Geng Lin in an upcoming NVIDIA GTC session on Thursday, March 24 at 11 a.m. PDT.
Their presentation will include the demonstration of an end-to-end working prototype using DNS data—primarily domain names—to detect suspicious domains names potentially generated by DGAs embedded in malicious code running on compromised systems.
You can register and attend NVIDIA GTC for free.
About the Author

Related Blog Posts

Multicloud chaos ends at the Equinix Edge with F5 Distributed Cloud CE
Simplify multicloud security with Equinix and F5 Distributed Cloud CE. Centralize your perimeter, reduce costs, and enhance performance with edge-driven WAAP.
At the Intersection of Operational Data and Generative AI
Help your organization understand the impact of generative AI (GenAI) on its operational data practices, and learn how to better align GenAI technology adoption timelines with existing budgets, practices, and cultures.
Using AI for IT Automation Security
Learn how artificial intelligence and machine learning aid in mitigating cybersecurity threats to your IT automation processes.
Most Exciting Tech Trend in 2022: IT/OT Convergence
The line between operation and digital systems continues to blur as homes and businesses increase their reliance on connected devices, accelerating the convergence of IT and OT. While this trend of integration brings excitement, it also presents its own challenges and concerns to be considered.
Adaptive Applications are Data-Driven
There's a big difference between knowing something's wrong and knowing what to do about it. Only after monitoring the right elements can we discern the health of a user experience, deriving from the analysis of those measurements the relationships and patterns that can be inferred. Ultimately, the automation that will give rise to truly adaptive applications is based on measurements and our understanding of them.
Inserting App Services into Shifting App Architectures
Application architectures have evolved several times since the early days of computing, and it is no longer optimal to rely solely on a single, known data path to insert application services. Furthermore, because many of the emerging data paths are not as suitable for a proxy-based platform, we must look to the other potential points of insertion possible to scale and secure modern applications.
