Chatbots News Sunday, March 11 Evolutionary algorithms, Neural networks, Ddos attacks & more…


Chatbots News TLDR / Table of Contents

[/vc_column_text][/vc_column][/vc_row][vc_row el_id=”Neural-Network-Algorithms—Learn-How-To-Train-ANN”][vc_column width=”1/2″][vc_separator][vc_column_text]

Neural Network Algorithms – Learn How To Train ANN

[/vc_column_text][vc_column_text el_class=”topfeed-summary-list”]

  • Let us now see some important Algorithms for training Neural Networks: – – We use thegradient descent algorithmto find the local smallest of a function.
  • In this algorithm, you move over the error surface by following the line with the greatest slope.
  • Together with neural networks, they form the second type of algorithm.
  • The steps for executing genetic algorithms are: – – Crossing of 2 rules is exchange of some of their variables or categories to produce 2 new rules.
  • Algorithm ends when 1 of the following 2 conditions meets: – – In Conclusion, Artificial Neural Network is typically difficult to configure and slow to train, but once prepared are very fast in the application.

[/vc_column_text][vc_column_text el_class=”topfeed-tags”]Tags: evolutionary algorithms, neural networks, neural network, , [/vc_column_text][/vc_column][vc_column width=”1/2″][vc_separator][vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text][vc_column_text el_class=”topfeed-embedly”]Neural Network Algorithms – Learn How To Train ANN – Data Science Central[/vc_column_text][/vc_column][/vc_row][vc_row el_id=”Memcached-Servers-Abused-for-Massive-Amplification-DDoS-Attacks”][vc_column width=”1/2″][vc_separator][vc_column_text]

Memcached Servers Abused for Massive Amplification DDoS Attacks

[/vc_column_text][vc_column_text el_class=”topfeed-summary-list”]

  • Cybercriminals have figured out a way to abuse widely-usedservers to launch over 51,000 times powerful DDoS attacks than their original strength, which could result in knocking down of major websites and Internet infrastructure.In recent days, security researchers at Cloudflare Arbor Networks , and Chinese security firm Qihoo 360 noticed that…
  • Memcached server runs over TCP or UDP port 11211.
  • It’s widely used by thousands of websites, including Facebook, Flickr, Twitter, Reddit, YouTube, and Github.Dubbedby Cloudflare, the attack apparently abuses unprotected Memcached servers that have UDP enabled in order to deliver DDoS attacks 51,200 times their original strength, making it the most prominent amplification method ever used in the wild…
  • Cloudflare says.Arbor Networks noted that the Memcached priming queries used in these attacks could also be directed towards TCP port 11211 on abusable Memcached servers.But TCP is not currently considered a high-risk Memcached reflection/amplification vector because TCP queries cannot be reliably spoofed.The popularly known DDoS amplification attack vectors that we…
  • Since Memcached listens on INADDR_ANY and runs with UDP support enabled by default, administrators are advised to disable UDP support if they are not using it.The attack size potentially created by Memcached reflection cannot be easily defended against by Internet Service Providers (ISPs), as long as IP spoofing is permissible…

[/vc_column_text][vc_column_text el_class=”topfeed-tags”]Tags: DDoS attacks, Memcached servers, powerful DDoS attacks, amplification DDoS attacks, widely-used Memcached servers[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_separator][vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text][vc_column_text el_class=”topfeed-embedly”]Memcached Servers Abused for Massive Amplification DDoS Attacks[/vc_column_text][/vc_column][/vc_row][vc_row el_id=”Hackers-create-ghost-traffic-jam-to-confound-smart-traffic-systems”][vc_column width=”1/2″][vc_separator][vc_column_text]

Hackers create ‘ghost’ traffic jam to confound smart traffic systems

[/vc_column_text][vc_column_text el_class=”topfeed-summary-list”]

  • Called I-SIG (Intelligent Traffic Signal System), the system feeds real-time vehicle trajectory data into an algorithm that controls the duration and sequence of traffic lights (its real-world deployments are at intersections in Palo Alto, California, and Anthem in Arizona), recording a 26.6 per cent reduction in vehicle delays.
  • The only attack requirement in our study is that attackers can compromise the vehicle-side devices on their own vehicles or other peoples vehicles, and send malicious CV [connected vehicle El Reg] messages to the I-SIG system to influence the traffic control decisions, they wrote.
  • The group set two other constraints around their attack: they did not crack the messaging system, instead generating their fake messages from a real vehicle.
  • The attack manipulates the mechanism I-SIG uses to manage queues, by spoofing the attack vehicle’s predicted arrival time and the requested phase of the traffic lights (I-SIG lets vehicles request a green light for their arrival, and decides whether or not to grant it based on the queue it’s created…
  • The best defence against these and other attacks, the researchers say, is a combination of more robust algorithms, better performance in the roadside units that give the system its realtime feedback, and better validation of vehicle-originated messages.

[/vc_column_text][vc_column_text el_class=”topfeed-tags”]Tags: traffic lights, smart traffic lights, real-time vehicle trajectory, attack vehicle, El Reg[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_separator][vc_column_text el_class=”topfeed-tweet”]

[/vc_column_text][vc_column_text el_class=”topfeed-embedly”]Hackers create ‘ghost’ traffic jam to confound smart traffic systems • The Register[/vc_column_text][/vc_column][/vc_row]