F5 to Demonstrate Advanced Threat Research at NVIDIA GTC

F5 Ecosystem | March 16, 2022


Traditional cybersecurity methods and tools are not fast enough and rely too heavily on heuristics to keep up with attackers. Cybersecurity must redefine itself and look to a new generation of hardware to leverage AI/ML and analyze telemetry in near real-time to leapfrog attackers and uncover their nefarious schemes sooner.

GTC stats

This is why it’s so important for security companies to conduct advanced threat research and take advantage of technologies like NVIDIA’s Morpheus AI Cybersecurity Framework. Mitigating known attacks and vulnerabilities is important but quickly rooting out hidden exploits and vulnerabilities in systems, software, and infrastructure is critical. Using AI/ML enables real-time detection and mitigation of threats at scale. The NVIDIA Morpheus framework provides a highly scalable, customizable accelerated data processing, training, and inferencing capabilities. These capabilities enable real-time detection in mission-critical cybersecurity use cases.

One such use case is an attack that abuses the nature and reliance of digital connectivity on DNS. Attackers use DGAs (Domain Generation Algorithms) to generate gibberish domain names such as “qjdygsnoiqaudcq.com” that ultimately resolve to a real IP address where—you guessed it—a command and control system is just waiting to grab every bit unknowingly transmitted to it.

You can also learn more about these attacks—and how F5 is leveraging NVIDIA’s Morpheus AI Framework to detect them—from Sr. Dir. Threat Research Aditya Sood and CTO Geng Lin in an upcoming NVIDIA GTC session on Thursday, March 24 at 11 a.m. PDT.

Their presentation will include the demonstration of an end-to-end working prototype using DNS data—primarily domain names—to detect suspicious domains names potentially generated by DGAs embedded in malicious code running on compromised systems.

You can register and attend NVIDIA GTC for free.


Share

About the Author

Lori Mac Vittie
Lori Mac VittieDistinguished Engineer and Chief Evangelist

More blogs by Lori Mac Vittie

Related Blog Posts

Multicloud chaos ends at the Equinix Edge with F5 Distributed Cloud CE
F5 Ecosystem | 11/24/2025

Multicloud chaos ends at the Equinix Edge with F5 Distributed Cloud CE

Simplify multicloud security with Equinix and F5 Distributed Cloud CE. Centralize your perimeter, reduce costs, and enhance performance with edge-driven WAAP.

At the Intersection of Operational Data and Generative AI
F5 Ecosystem | 10/22/2024

At the Intersection of Operational Data and Generative AI

Help your organization understand the impact of generative AI (GenAI) on its operational data practices, and learn how to better align GenAI technology adoption timelines with existing budgets, practices, and cultures.

Using AI for IT Automation Security
F5 Ecosystem | 12/19/2022

Using AI for IT Automation Security

Learn how artificial intelligence and machine learning aid in mitigating cybersecurity threats to your IT automation processes.

Most Exciting Tech Trend in 2022: IT/OT Convergence
F5 Ecosystem | 02/24/2022

Most Exciting Tech Trend in 2022: IT/OT Convergence

The line between operation and digital systems continues to blur as homes and businesses increase their reliance on connected devices, accelerating the convergence of IT and OT. While this trend of integration brings excitement, it also presents its own challenges and concerns to be considered.

Adaptive Applications are Data-Driven
F5 Ecosystem | 10/05/2020

Adaptive Applications are Data-Driven

There's a big difference between knowing something's wrong and knowing what to do about it. Only after monitoring the right elements can we discern the health of a user experience, deriving from the analysis of those measurements the relationships and patterns that can be inferred. Ultimately, the automation that will give rise to truly adaptive applications is based on measurements and our understanding of them.

Inserting App Services into Shifting App Architectures
F5 Ecosystem | 12/23/2019

Inserting App Services into Shifting App Architectures

Application architectures have evolved several times since the early days of computing, and it is no longer optimal to rely solely on a single, known data path to insert application services. Furthermore, because many of the emerging data paths are not as suitable for a proxy-based platform, we must look to the other potential points of insertion possible to scale and secure modern applications.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us