Posts

Endlessh (Endless-SSH)

Image
 A simple way to defend against SSH brute-force attacks The Internet is not a secure place from its beginning and also the internet is not designed with built-in security either. Both internet users and services are vulnerable to attacks. It is open for everyone to explore things without any limits. Users who use the internet could have different intentions depending on their beliefs. Many of the users’ intent is to gather publicly available information. However, some users have different intents than accessing publicly available data, some will want to steal information that is not publicly available; by gaining access to restricted network service, another will want to stop others accessing network services to get a competitive advantage or take ransoms from service providers. Different techniques can be used to interrupt public-facing services, few of them are getting access using passwords, brute-forcing, DDoSing systems, sending malware to services, and likewise. Brute-forcing...

How Cloud Resiliency organized in Microsoft Azure

Image
Disaster avoidance and Disaster recovery are two concepts used in many industrial areas. The two terms look alike but they are somewhat different based on the situation that we use them in. Sometimes disaster avoidance is also called resiliency. In information technology, these two terms are mainly used in system engineering and system designing areas. So, what is meant by terms resiliency and recoverability? Resiliency expresses the ability to operate services even in a disruptive system event. Recovery means actions needed to perform to make a system work again when a disruption causes a system to fail. For example, resiliency is like building structures to stay stable in an earthquake situation, on the other hand, recoverability means if some disaster happens to the structure how we are going to correct that damage. So, now as we know the meaning of the two terms, let’s move to our main topic, How Cloud Resiliency is organized in Microsoft Azure. Cloud consists of a larger number of...

Network Traffic Identification and Classification with Machine Learning

Image
A computer network should consist of four primary objectives: Fault tolerance, Scalability, Security, and Quality of Service (QoS). These objectives make computer networks efficient, reliable, and suitable to satisfy users' requirements. Network administrators try to continuously improve these properties to give a better experience for their customers. There are various practices network admins can implement to achieve these four main objectives related to computer networking. Knowing about the network is one of the initial and basic activities that we can commonly see in those practices. Network monitoring is the process we use to get to know about the network. Network traffic monitoring plays a significant part in computer networking. It has been used from network resources management to network security-related activities.  Network monitoring is an umbrella term that is used to combine a few other processes/techniques. Network traffic identification and classification (TIC) is a...

Defense in Depth

Image
Old but still Powerful. Defense in depth (DiD) is an attack mitigation strategy that helps organizations and even individual computer users to protect their valuable information and systems from cyber-attacks. Defense in depth practices involve placing multiple layers of security measures to prevent cyber-attacks. These layers include different security techniques and multiple layers from the same technique. The simple idea is, if one security control fails, then there are multiple security layers that prevent cyber-attack. This approach is also called the castle approach because it aims on arranging layers of security measures similar to a castle where there are multiple strengthened walls. This type of security placement will help to protect resources from attacks that originated in various ways and in an attack situation it will buy more time for security engineers to initiate countermeasures. There is no single solution ever implemented that can protect valuable information with on...

MalLocker.B

Image
New  Malware Affecting A ndroid Users. Malware has been there for a very long time from the beginning of computer systems. Any computer system could be a target for a malware attack. The common intention of any malware is to cause damage to computer systems. Before the era of smart devices, malware was mainly designed to attack servers, personal computers, and likewise. However, with the rapid increase of smart devices, malware attack surfaces grew rapidly. Smart devices became a comparably easy target for threat actors because of the extensive user base, less knowledge of users about the device, users trying to add various applications without checking their background, along with many other reasons. These reasons enable attackers to quickly and easily spread malware to smart devices. Ransomware is one type of malware that causes huge losses for both business and personal computer systems in current times. This type of malware holds the computer system in a captive state until t...