![]() ![]() This is why we’ve trained a machine how to recognize and respond to anomalous traffic. The ever-changing nature and patterns of attacks makes their mitigation a continuous process of adaptation. ![]() Baskerville has turned out to be very handy for mitigating DDoS attacks, and for correctly classifying other types of malicious behaviour.īaskerville is an important contribution to the world of online security – where solid web defences are usually the domain of proprietary software companies or complicated manual rule-sets. We’ve trained Baskerville to recognize what legitimate traffic on our network looks like, and how to distinguish it from malicious requests attempting to disrupt our clients’ websites. The quality of these decisions (recall) is high and Baskerville has already successfully mitigated many sophisticated real-life attacks. A few months ago, Baskerville passed an important milestone – making its own decisions on traffic deemed anomalous. Baskerville responds to web traffic, analyzing requests in real-time, and challenging those acting suspiciously. It’s also an open source project that, in time, will be able to reduce bad behaviour on your networks too. ― Arthur Conan Doyle, The Hound of the Baskervillesīaskerville is a machine operating on the Deflect network that protects sites from hounding, malicious bots. The more outré and grotesque an incident is the more carefully it deserves to be examined. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |