TechDogs-"Sysdig Blocks Cryptojacking in the Cloud with 99% Precision Using Machine Learning"

IT Security

Sysdig Blocks Cryptojacking in the Cloud with 99% Precision Using Machine Learning

By Business Wire

Business Wire
Overall Rating

Company strengthens cloud detection and response to prevent unexpected cloud costs


LAS VEGAS--(BUSINESS WIRE)--#bhusa--BLACK HAT (Booth #1760) -- Sysdig, the unified container and cloud security leader, today announced machine learning-powered cloud detection and response (CDR) to combat cryptojacking. The company’s threat engine and detection algorithms block cryptojacking in the cloud with 99% precision.

Cryptojacking is the unauthorized use of someone else’s compute resources to mine cryptocurrency. According to the Google Cloud Threat Horizons Report, 86% of compromised Google Cloud instances were used for cryptocurrency mining. Cryptojackers use low-and-slow attack techniques to mask what they are doing so those impacted do not realize until they receive their cloud bill. The longer cryptojacking goes undetected, the greater the financial impact. While the average increase in a monthly bill varies by report, it is not uncommon for cryptojackers to run up a $100,000 - $500,000 bill in a single month. Time is of the essence.

While the cloud and on-premises security challenges seem similar, the attack patterns and detection techniques are fundamentally different and require different approaches. Traditional tools lack the visibility into container environments and breadth of coverage needed to identify threats and anomalies at runtime. A multi-layered approach that includes curated rules and machine learning is better suited to address the complex threats in cloud environments. To detect threats like cryptojacking, teams need machine learning algorithms that are trained and tuned to recognize cryptocurrency mining patterns immediately to avoid unexpected cloud fees, which can have a significant financial impact.

Read “Cryptominer detection: a machine learning approach to learn how Sysdig trained its machine learning detection model.

Sysdig Machine Learning-Powered Cloud Detection and Response

  • Block cryptominers with 99% precision: Sysdig Secure machine learning is trained to automatically detect cryptominers. Even as new cryptojackers come into play, highly precise and continually evolving algorithms keep the model up-to-date and drastically reduce false positives.
  • Prevent unexpected costs: Early detection is the only way to avoid hefty cryptojacking bills and reputation damage due to an attack. Sysdig is able to detect behavior patterns even if the cryptominer slowly ramps up use of cloud resources.
  • Strengthen security with a multi-layered approach to cloud detection and response: Effective protection in today’s threat landscape requires multiple protection layers. Sysdig threat detection uses machine learning to complement a rules-based approach based on Falco. Easily customizable out-of-the-box policies curated by the Sysdig Threat Research Team maximize coverage. Adding defense techniques, such as profiling, comprehensive indicators of compromise (IOCs), and Drift Control further strengthen security.

“Machine learning is not a silver bullet for detecting threats. Many vendors throw around ‘ML’ quite loosely for solutions that are not true machine learning,” said Omer Azaria, Vice President of Engineering at Sysdig. “Cryptojacking is a specific use case where machine learning provides effective detection. Sysdig developed an ML algorithm that is specifically tuned to detect cryptojacking before your cloud bill skyrockets.”

Availability

Sysdig Secure customers have access to the machine learning-powered threat detection now and for new customers, it is included in Sysdig Secure at no additional cost.

Resources

About Sysdig

Sysdig is driving the standard for cloud and container security. The company pioneered cloud-native runtime threat detection and response by creating Falco and Sysdig as open source standards and key building blocks of the Sysdig platform. With the platform, teams can find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions, and compliance. From containers and Kubernetes to cloud services, teams get a single view of risk from source to run, with no blind spots, no guesswork, no black boxes. The largest and most innovative companies around the world rely on Sysdig.


Contacts

Media Contact
Amanda McKinney Smith
amanda.smith@Sysdig.com
703-473-4051

Liked what you read? Head to the TechDogs homepage to find the latest tech content infused with drama and entertainment. We've got ArticlesWhite PapersCase StudiesReportsVideos and Events that help you Know Your World of Technology.

First published on Wed, Aug 10, 2022

Enjoyed what you've read so far? Great news - there's more to explore!

Stay up to date with the latest news, a vast collection of tech articles including introductory guides, product reviews, trends and more, thought-provoking interviews, hottest AI blogs and entertaining tech memes.

Plus, get access to branded insights such as informative white papers, intriguing case studies, in-depth reports, enlightening videos and exciting events and webinars from industry-leading global brands.

Dive into TechDogs' treasure trove today and Know Your World of technology!

Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs’ members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs’ Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. All information / content found on TechDogs’ site may not necessarily be reviewed by individuals with the expertise to validate its completeness, accuracy and reliability.

Tags:

Sysdig Machine Learning Powered Cloud Detection Indicators Of Compromise (IOCs) Cloud Configurations

Join The Discussion

- Promoted By TechDogs -

The Brivo Partner Program
  • Dark
  • Light