A Layered Approach to Cyber Defense

Approaches in early cyber defense Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) principles still have value today but they just need to get better.  IPS encryption will have to change or it may become obsolete with the computing capabilities of the Quantum computer.  This will require different algorithms that must have uncrackable encryption capabilities will having lower bit payloads capable of encrypting small processing systems such as IoT.  Current IDS cannot keep up with malware treats now reaching 1 million threats per day. These systems will require new ways hardening data networks while being able to deep view both structured and unstructured data that are increasing every day.   

ProjectSafety has put together a thee pronged cyber defense approach that can address the cost, limitations and inaccuracy of current cyber defense systems.  Our unique combination of compression, cryptography and deep learning artificial intelligence have the capabilities of unhackable IPS systems with Deep Learning IDS abilities capable of detecting anomalies at the binary level.  These combined IPS/IDS approaches offer network and business intelligence savings that are so great they could pay for the entire cyber defense system. These technologies are network.

Non-Deterministic Cybersecurity

Criminals can crack security when they can anticipate and predict the actions, behaviors, and outputs of their target’s processes, Criminals can predict cyphertext, key size, or how keys and passwords are communicated between end-points.

Uniquely Stochastic Randomization used in authentication and encryption can address weaknesses in current static algorithms used in cyber defense process hardening. Current legacy static encryption has a determinable beginning and end in file size and with the computing capabilities of complete algorithm formulas being determined.  As computing power increases these deterministic static algorithms will continue to be broken as will their determinable static processes.

To address current legacy Cyber Defense Security, unknown and invisible solutions to everyone else in the organization must be established. Security factors cannot be accessed or changed, by either error or malicious intent if they are not seen and randomly processed.  All current legacy encryption keys have a “fixed” length. Fixed Keys can be identified, making them easier to crack.  Super Computers are currently breaking many fix encryption keys with upcoming Quantum Computers capable of breaking all fixed encryption keys and mathematical algorithms. We have working non-deterministic cyber defense

technologies in place today.     

Enhanced Blockchain

A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash pointer as a link to a previous block, timestamp and transaction data. By design, blockchains are inherently resistant to modification of the data. 

Blockchain network lacks centralized points of vulnerability that computers crackers can exploit; likewise, it has no central point of failure. Blockchain security methods include the use of public-key cryptography.  A public key (a long, random-looking string of numbers) is an address on the blockchain. Value tokens sent across the network are recorded as belonging to that address. A private key is like a password that gives its owner access to their digital assets or the means to otherwise interact with the various capabilities that blockchains now support. Data stored on the blockchain is generally considered incorruptible.

The use of public and private cryptology is proving to be the weakest link in blockchain.  From crypto cracking to crypto algorithms reaching terabyte sized overheads, new layered blockchain security are beginning to support these legacy security weaknesses.  As defined earlier non-deterministic algorithms offer high end post quantum encryption capabilities at extremely low overheads. Layer 2 invisible networks and specialized VPN type security are also offering much promise   

A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash pointer as a link to a previous block, timestamp and transaction data. By design, blockchains are inherently resistant to modification of the data. 

Blockchain network lacks centralized points of vulnerability that computers crackers can exploit; likewise, it has no central point of failure. Blockchain security methods include the use of public-key cryptography.  A public key (a long, random-looking string of numbers) is an address on the blockchain. Value tokens sent across the network are recorded as belonging to that address. A private key is like a password that gives its owner access to their digital assets or the means to otherwise interact with the various capabilities that blockchains now support. Data stored on the blockchain is generally considered incorruptible.

The use of public and private cryptology is proving to be the weakest link in blockchain.  From crypto cracking to crypto algorithms reaching terabyte sized overheads, new layered blockchain security are beginning to support these legacy security weaknesses.  As defined earlier non-deterministic algorithms offer high end post quantum encryption capabilities at extremely low overheads. Layer 2 invisible networks and specialized VPN type security are also offering much promise   

Deep Leaning AI

Artificial intelligence (AI) is offering a deeper look in our system processes.  As we do this we need to be aware of and even refine our security methodologies. Call Deep Learning, this deep look into our system processes offer tremendous intelligence capabilities but can be accessing and gathering information with no authentication or protection    

 

Cyber Defense Artificial Intelligence (AI) is just a by-product of Deep Learning AI.  Intrusion Detection Systems (IDS) define a baseline normal of industrial and business system processes. From this baseline you can then can find methods of detecting anomalies, duplications, undesired events or inefficient processes. How these baseline audits are done are critical to the Cyber Defense solution. Using software and algorithms alone can add to cyber-attacks and these methods of audit must be properly defined.    

 

As we go deeper to identify digital processes, we must be sure we are securing the viewing of these Deep Learning capabilities. Algorithms and software alone have vulnerabilities that hackers have already identified. Simply put, AI can be hacked by AI. To defend against this capability non-deterministic techniques such as data randomization, pattern audit matching and processor bot duplication must be used for secure audit procedures and technologies. These tecnologies are available today.

Deep Learning Neworks

Deep Learning Networks