0
Industry Resources

Q&A Session: New Trends Advance User Privacy

Monday 11 June 2018 | 13:00 CET | Advertorial | provided by CUJO AI

Privacy and security online are one of the top concerns of Americans, especially after numerous massive data breaches (Equifax, Yahoo, Uber) that happened in the past couple of years. 

According to Pew Research Center, 61% of people would like to do more to protect their privacy online, and 74% would like to be more in control of who can get information about them online. 64% of Americans have personally experienced a major data breach, and 49% feel that their personal information is less secure than 5 years ago. 

Network operators are in a position to provide secure and private online experience by leveraging machine learning and big data. It is crucial in the light of DNS encryption, a new trend that will offer additional privacy for home users, but less protection if combined with legacy security methods.

Today we talked about privacy trends, DNS blacklisting, and security online with Santeri Kangas, CTO at CUJO AI.  Santeri has 26 years of experience in cybersecurity and cloud computing. He  has delivered personal cloud and internet security for over 220 operators including AT&T, Orange, América Móvil, Telefónica, SingTel, and BT. 

- Let’s start with the current situation regarding the privacy on the internet. What kind of trends could you highlight?

It’s important to remember that the Internet was not designed for privacy. For example, DNS traffic was unencrypted for more than two decades. This allows anyone who gets access to the DNS traffic to see what websites the people are visiting. 

Furthermore, websites were not required to be encrypted because they didn’t gather user’s private information. Currently, many websites collect various data, which was not the case two decades ago.

New methods are constantly developed to fix this and to protect user’s data. For instance, “DNS over TLS” protocol is becoming more dominant. TLS is an encryption protocol that can encrypt website data (HTTP), files (FTP) or emails (SMTP). Most websites you visit today might apply TLS protocol, encrypting all the traffic. 

Even though the traffic wasn’t encrypted previously, this is going to change. Google has announced that it will start encrypting its traffic. Other vendors will not just stand by and watch this from the sidelines. New DNS encryption vendors already started to work on this - for instance, Cloudflare and their 1.1.1.1 service gathered a lot of traction in the past weeks. We will see soon that DNS will get encrypted by a majority of vendors.

- Is privacy the only concern of the typical American? Should IoT devices also be added to the equation? 

We already have more internet-connected devices than we have the traditional devices such as personal computers or smartphones in our homes. Hundreds of thousands of new IoT devices are being shipped out at the moment. These IoT devices have different capabilities, but all of them are connected to the internet. 

Home users do not have much control over them: they do not have any idea what their devices are doing on the network, or whether the device was taken over for malicious purposes. It’s rare that consumers would patch their IoT devices. It’s crucial to give back the control of the homes to the consumers. 

- What other cyber threats must be considered? 

For the last decade, we have seen a massive amount of malicious code. You can buy malware attack kits from the Dark web, and those tools are developing continuously. We see 200-300 thousand new malware samples a day. Malware is, of course, just one of the many attack vehicles in a typically very complicated attack pattern. 

Hackers have created very advanced hacking ecosystems. Of course, you have been hearing this story from any internet security company for the last 10 years. 

Legacy solutions such as signature-based detection are not sufficient anymore; they cannot protect users against all of these new threats. It’s essential to understand the volume of these attacks to detect the behavioral patterns behind them if we want to protect against them. 

- How do legacy security vendors protect against all these threats?

Legacy security vendors block known-bad domains based on DNS blacklisting. This is a result of a process when known-bad domains are being monitored, bad behavior is detected and known-bad URLs or IP addresses are being added to a database of known threats. This is good for those attack patterns that we know of. But it doesn’t protect against new threats.

DNS blacklisting lists are being built on the knowledge about malicious websites. Security companies track malware behavior and attack patterns, and then post the lists of malicious websites or command and control (CnC) servers on the blacklist. This is not a proactive mechanism. This happens after an attack happens. 

Malicious websites and CnC servers are very short living. They appear, then disappear, then appear somewhere else later on. That’s why it’s very important to actually detect the pattern instead of the endpoints of the attack. 

- How does machine learning solve this? 

The nature of machine learning (ML) is proactive. Instead of trying to keep up with constantly evolving attacks, this method detects the pattern and then applies it to the website that the user plans to visit. ML algorithms do not rely on knowing the malicious websites and IP addresses in advance. This is the base of what we are doing at CUJO AI.

First of all, we collect a humongous amount of data from the network, including IoT devices or endpoints. We select which behavior is known-good, defined as not malicious. We also get a large set of known malicious behavior. 

We use this data to train our models based on Bayesian math and advanced machine learning algorithms. This way we detect the patterns of device, network, or website behavior. 

About CUJO AI

CUJO AI is the leading artificial intelligence company providing network operators AI-driven solutions, including AI security, advanced device identification, advanced parental controls, and network analytics. CUJO AI Platform creates intuitive end-user facing applications for LAN and wireless (mobile and public wifi), powered by machine learning and real-time data. 

About Santeri Kangas, Chief Technology Officer at CUJO AI

Santeri has 26 years of experience in cybersecurity and cloud computing, and a commendable track record in building award-winning security software products for network operators. 

Kangas was CTO at F-Secure, CTO of vulnerability research and management company Secunia, Chief Architect at Flexera, and as a CTO of Identity & Access Management Company Omada. Santeri has delivered personal cloud and internet security for over 220 operators including AT&T, Orange, América Móvil, Telefónica, SingTel, and BT. 


Sponsor Details

Name    CUJO AI
Contact    https://www.getcujo.com/


Free Headlines in your E-mail

Every day we send out a free e-mail with the most important headlines of the last 24 hours.

Subscribe now

Categories: General
Companies: CUJO
Countries: World
::: add a comment
This article is part of dossier

IoT


Add comment

We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. If you see a comment that you believe is inappropriate to the discussion, you can bring it to our attention by using the report abuse links. As the comments are written and submitted by visitors of the Telecompaper website, they in no way represent the opinion of Telecompaper.


Related

The next generation of connected experience - Precision, protection and personalization

Published 21 Sep 2018 15:00 CET | World
The smart home concept started out as a dream, but it turned into a mess. IoT enthusiasts were so excited that they can connect ...

5 Key Security Tips to Avoid an IoT Hack

Published 10 Aug 2018 14:24 CET | World
Recently, Russian PIR Bank lost USD 1.000.000 because of a compromised router that allowed hackers to gain entry into their local ...

Machine Learning vs Chronic Security & Privacy Issues

Published 27 Jul 2018 14:58 CET | World
The Internet has many issues. Privacy. Lack of encryption and its governance. Questionable marketing techniques. A misinformed ...

CUJO AI named to WEF annual list of Technology Pioneers

Published 28 Jun 2018 14:04 CET | World
The World Economic Forum has unveiled its annual list of Technology Pioneers. The 61 early-stage companies are recognized for ...

CUJO AI, M-Tiba, Juvo e.a. door WEF geselecteerd als Technology Pioneers

Published 28 Jun 2018 11:24 CET | World
Tot de gekozen bedrijven behoren onder meer CUJO AI, dat machine learning inzet voor de analyse van data endpoints, en M-Tiba, ...

M-Tiba, Juvo among WEF annual list of Technology Pioneers

Published 28 Jun 2018 10:15 CET | World
The World Economic Forum has unveiled its annual list of Technology Pioneers. The 61 early-stage companies are recognized for ...

Charter Communications invests in Cujo AI

Published 17 May 2018 11:56 CET | World
Cujo AI, an AI-powered software platform to enable in-home network security for network operators, closed a strategic Series B ...

New Approach to GDPR: Using Machine Learning to Enhance Privacy

Published 15 May 2018 13:00 CET | World
GDPR has no precedent. However, it could become the worldwide gold standard of privacy laws. In such a case, these ...

Mobile First: Security Concerns and Solutions

Published 08 May 2018 13:00 CET | World
The majority of people - 83%, in fact - use their mobile devices to go online. 89% of these users connect to the internet via a ...

New DNS Encryption Tools Accelerate Privacy Online

Published 25 Apr 2018 17:00 CET | World
Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, ...

DNS blacklisting is dead. What's next?

Published 23 Mar 2018 12:20 CET | World
Broadband customers are bringing millions of new smart devices into their homes. The number of connected devices might reach 30 ...

Why Do We Need Advanced Parental Controls?

Published 22 Feb 2018 07:30 CET | World
In 2016, Pew Research Center revealed that 60% of parents had checked their teen's social media. 61% of parents agree that ...

CUJO AI Platform for Network Operators

Published 01 Feb 2018 15:20 CET | World
Company helps Network Operators support their customer's privacy by placing IoT devices beyond the reach of hackers. After ...