Google wants to stop DDoS attacks using machine learning
It’s the same tech that Google uses to protect itself
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Googlehas rolled out a public preview of a new protection service powered by machine learning (ML) to help businesses shield theirGoogle Cloudapplications and services fromDDoS attacks.
Dubbed Google Cloud Armor Adaptive Protection, the rollout is part of Google’s DDoS defense andweb application firewall (WAF)service, which enables Google’s customers to leverage the same technology Google uses to protect itself, according to reports.
Emil Kiner, a product manager for Google’s Cloud Armor, toldZDNetthat the new protection service uses ML models to analyze signals across web services to detect potential attacks.
We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and you can also choose to enter the prize draw to win a $100 Amazon voucher or one of five 1-year ExpressVPN subscriptions.
Click here to start the survey in a new window«
“We have been building and maturing this technology with internal and external design partners and testers over the last few years,” noted Kiner, adding that the technology is adept in detecting high volume application-layer DDoS attacks against web apps and services.
Spotting abnormal traffic
According to Google, Armor Adaptive Protection can help businesses spot abnormal traffic and take corrective action.
Kiner noted that while Level 3 and Level 4 attacks can be halted on Google’s edge network, Level 7 attacks rely on legitimate web requests originating from compromised devices that have been tied into a botnet to bombard websites with an overwhelming volume of traffic.
“Adaptive Protection quickly identifies and analyzes suspicious traffic patterns and provides customized, narrowly tailored rules that mitigate ongoing attacks in near-real-time,” explained Kiner.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Google notes that the service trains itself for at least an hour to establish a reliable baseline before it begins monitoring traffic.
“When the training period is over, you receive real-time alerts when Adaptive Protection identifies high frequency or high volume anomalies in the traffic directed to any of the backend services associated with that security policy,”explains Google.
ViaZDNet
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.
LG Electronics sets ambitious B2B revenue goal to offset declining consumer demand
New fanless cooling technology enhances energy efficiency for AI workloads by achieving a 90% reduction in cooling power consumption
5 must-have Android apps