Intelligent CIO Middle East Issue 23 - Page 87

EDITOR’S QUESTION KALLE BJORN, DIRECTOR – SYSTEMS ENGINEERING, FORTINET E ver since the arrival of advanced persistent threats, obfuscation technologies have existed to help cybercriminals evade security detection. Attackers have moved on to adapt similar obfuscation techniques in other channels. Over a decade ago, cybercriminals started using fast-flux networks to shift IP addresses and domains; in some cases one threat can use over 50,000 websites in a day to disguise where they’re from. The Dark Web has a become a popular choice for cybercriminals. It’s a part of the World Wide Web, but needs special software and tools to be accessed. The Dark Web contains hidden and encrypted content accessible only though complex browsing software tools like Tor which is an acronym for ‘The Onion Router’. Tor networks introduce a sophisticated adaptation of deep web activity. Tor is designed to enable anonymous sending and receiving of web traffic. Users not only have the ability to remain unidentifiable, but they can also access content that’s blocked to them. Tor manages this by encrypting traffic and then randomly forwarding it via a network of relays. Each individual relay features its own encryption layer to help conceal the user’s identity. While the Dark Web doesn’t have any specific security threat related to it, it can be used as a medium for delivering attacks. These kinds of next-generation security ev ͥ)ѽ͔́ѡ]ѼȁɅ]Ё)Ѽ܁ɍЁ她Ѽɥєݡɔх)́ɽɥɅѽ́ɔѥՅ䁍ɕѥ)܁չѥɽѽ́ѥ͍́Ѽa)ɯd͡Ёхѥ́ݡ܁ɍЁɔѡȁх̸)Q́́́ȁͽ́ѕѥЁѥ٥+qQȁ́ͥѼ)嵽͕́)ɕ٥ݕɅt)Ʌɽ٥܁ݥѠѽ́Ս́QȰ͕ɥͽѥ)ѼѼѥՍѽ̸Q́́ѡ)́Ѽѡɬ])QЁхЁѡݔѼЁѡ͔ѡɕ)́ѼݽɬѽѡȰՑ͕ɥ䁕̰ٕ̰)܁ɍиЁѥаݔɔЁѡ 剕ȁQɕ)ɥєѼ%ѕéЁ剕ɍɥݽɭ)ɽ]ͼݽɬݥѠѡ $ѼЁѕѡ)ɽѕЁȁѽ̸) 剕ɍɥ́Ёͼ͔ѡɬ]ѼQ)ݽձѡ͔ٕݥѡЁѡɬ]%ӊéѼ)͔ɽ͕ѕѼɽȁᅵɐ)̸]e͕͕ٔ́ݡɔѡɬ]͕݅́Ѽ)ɕѡ́Ѽѡѕ̸=ȁѹ͡ɕЁݥѠ9Q<́ͼݽѠ)ѥݡɔݔٔɕЁѼЁݼ݅)ɵѥ͡ɥݥѠѥձȁͥ́ե)剕ȁɥ̸)Q͕ͅɥͽѥ́ѡЁ͕ɔѡɅє)ݽɭ́ɽѕɹ͕̀ѡ%ѕɹФ͕Ѽ)ɽѕнͽєѡɅєɽѡɬ]Qѡɕ)ѡЁɔɕѕѼѡɬ]ɔɕѕѼѡ ͔ѡѕ́剕ɍɥɕeЁɔ)ɕѠ̰ɕ͕ɍ́ѡɥمє͕ѽ)͡ձ͡ɥѡȁѥ͔ݥѠѡՉ͕ѽȁѼ)͡Ёݸɥ́Ʌѥ̸)ܹѕэ)%9Q11%9Q %<(