Vector
Vector
Vector
Artificial Intelligence (AI) and Machine Learning (ML) are two very hot
buzzwords right now, and often seem to be used interchangeably.
They are not quite the same thing, but the perception that they are can
sometimes lead to some confusion. So I thought it would be worth writing a
piece to explain the difference.
Both terms crop up very frequently when the topic is Big Data, analytics, and
the broader waves of technological change which are sweeping through our
world.
In short, the best answer is that:
Artificial Intelligence is the broader concept of machines being able to carry
out tasks in a way that we would consider “smart”.
And,
Machine Learning is a current application of AI based around the idea that we
should really just be able to give machines access to data and let them learn
for themselves.
Early Days
Artificial Intelligence has been around for a long time – the Greek myths
contain stories of mechanical men designed to mimic our own behavior. Very
early European computers were conceived as “logical machines” and by
reproducing capabilities such as basic arithmetic and memory, engineers saw
their job, fundamentally, as attempting to create mechanical brains.
VECTOR
Vector is the ultimate security system, all you want inside a unique powerfull
Operating System, it focuses its power on an incredible set of components
called “OLYMPUS” that grants for single users, companies (smalls, middles
and larges), banks, crytical infrastructures and defense systems a 360°
solution that evolves in real time and without any human interaction.Vector is
the result of years of study and technical analysis to evaluate the real cyber
Olympus is the centre of all feautures inside VECTOR but efectively to make the
magic of totally and always evolved impenetrability the core of system is the Deep
Learning Artifcial Subroutine that transforms all informations in a operative
strategy, I named this SONIC.
SONIC
SONIC is not a simple defense mechanism, IS ALL YOU WANT AND MORE
because the entire VECTOR infrastrucrure is created to continuously evolve in the
time without voluntarily commands by administrator.
Why this ? To show the purpouse of this strategy I need to explain the
methodology used to create the platform , all based on my personal experiences
obtained during my long career of penetration tester , white hat and cyber security
Sonic become works on dynamic threats and is able to adapt to the security
measures deployed by users and organizations to combat cybercrime.
In this context, one major challenge is unquestionably the classification of
malware. The malware that seems to be “fashionable” today is already obsolete
tomorrow and is replaced by another one with completely different or
improved features.
At the same time, the newest varieties of malware continue to coexist with
older forms, which are still used by cyber criminals without the means to
innovate. Therefore, classification in the cybercriminal ecosystem is very
complex.
One of the best feauture is that it makes it possible to learn from this
dynamism in real time and develop new classification criteria without human
intervention. Thanks to this, detection and classification become much more
efficient and proactive.
At the same time, its applications are infinite, for example, we also use SONIC
together with our development of identification based on biometric behavior.
This allows us to rapidly recognize whether a person is interacting with their
computer or it is a bot, or if there is a cybercriminal attempting a user or
interacting with a user’s account from anywhere in the world.
Machine learning is a key technology in the Sonic System security with a multi-
layered approach to protecting endpoints and systems against different
threats, blending traditional security technologies with newer ones and using
the right technique at the right time.
The worst vulnerability that affects all systems is always the human factor , the
weak that all attackers plan to create all malicious campaigns.
Most Operating Systems try to abstract human factor from main systems
operations for example an abstraction for protection is the execution of an
application program with restricted rights allowing a safe communication
between hardware and critical systems components. OS tracks program
Attackers can bypass ASLR AND DEP , Attackers can execute theyr malwares
using DPCs (Defferred Procedures Calls) , or use ram to avoid ids control
because a standard operating systems DOESN’T HAVE THE TOTAL CONTROL
OF ITSELF.
A little example , how you can protect yourself if your arms are blocked?, you
can use legs but your body have the full power with a complete control , if
anyone may exclude one of these capabilities nobody is completely safe, well
this is the principe that inspired me to create a full protection sytems that put
itself on the centre of security strategies .
But how can exclude human factors and mantaining the possibility for an
administrator or officier or single user to perform all operations on the same
time ?
To resolve this probem i’ve created a systems that learn the human behavior
step by step and especially by adapting all aspects of systems with the
synergistic alaysis of human needs, the centre of the security remain the users
protection but for the first time OS is the only root user .
The world of cybersecurity benefits from the marriage of machine learning and
big data. As the current cyberthreat environment continues to expand
exponentially, organizations can utilize big data and machine learning to gain a
better understanding of threats, determine fraud and attack trends and
patterns, as well as recognize security incidents almost immediately — without
human intervention this is possible by using the powerful of Big Data to
perform data mining and improve the security system’s performance.
For me was very important the collaboration with Hadoop developers to help
improve its security model. Hadoop is a popular big data framework used by
giant tech companies such as Amazon Web Services, IBM, and Microsoft
Sonic uses a dynamical approach to evaluate case by case the right security
strategy but how is possible? A possible answer to this question is by use of the
Neural Networks.
Artificial Neural Networks, came and mostly went over the decades. Neural
Networks are inspired by our understanding of the biology of our brains – all
those interconnections between the neurons. But, unlike a biological brain
where any neuron can connect to any other neuron within a certain physical
distance, these artificial neural networks have discrete layers, connections,
and directions of data propagation.
You might, for example, take an image, chop it up into a bunch of tiles that are
inputted into the first layer of the neural network. In the first layer individual
neurons, then passes the data to a second layer. The second layer of neurons
does its task, and so on, until the final layer and the final output is produced.
The core of Vector’s technologies is the use of the Complex System model that
allows the security components to interact with applications and all tasks
created by users during every execution. In many cases it is useful to represent
such a system as a network where the nodes represent the components and
the links their interactions.
Vector Complex systems modules are systems whose behavior is intrinsically
difficult to model due to the dependencies, relationships, or interactions
between their parts or between a given system and its environment. Systems
that are "complex" have distinct properties that arise from these relationships,
such as nonlinearity, emergence, spontaneous order, adaptation, and feedback
loops, among others. Because such systems appear in a wide variety of fields,
the commonalities among them have become the topic of their own
independent area of research, the use of Neural Networks allow all user to
work in a secure enviroment with the constant protection of SONIC .
If human factors are the key of a successful client side attacks , at the second
place I put certainly the application’s vulnerabilities.
Many developers work to perform the best experience for the users with all
possibles security modules (End point protections , ips , ids , firewall etc) that
effectively reduce the risk of cyber intrusion but not always is the cure-all.
VECTOR uses SONIC feautures to track all applications activities in real time ,
for my personal experience of intrinsically safe analysis is very important to
create a white list of softwares that firewall and anti virus allow to operate on
a traditional operating system , but this method is deprecated and now I prefer
to demand the artificial intelligence to continuously extend the white list whit
all possible softwares that circulating on the net .
I know it sounds like science fiction but if your system uses the principle of
Passive and Active reconnaissance used on penetration testing all is possible
but especially all possible threats are predictable .
Google dorking, also known as Google hacking, can return information that is
difficult to locate through simple search
queries. That description includes information that is not intended for public
viewing but that has not been adequately
protected.
A system can exhibit properties that produce behaviors which are distinct from
the properties and behaviors of its parts; these system-wide or global
properties and behaviors are characteristics of how the system interacts with
or appears to its environment, or of how its parts behave (say, in response to
external stimuli) by virtue of being within the system. The notion of behavior
implies that the study of systems is also concerned with processes that take
place over time (or, in mathematics, some other phase space
parameterization). Because of their broad, interdisciplinary applicability,
systems concepts play a central role in complex systems.
Complexity
Systems exhibit complexity when difficulties with modeling them are endemic.
This means their behaviors cannot be understood apart from the very
properties that make them difficult to model, and they are governed entirely, or
almost entirely, by the behaviors those properties produce. Any modeling
approach that ignores such difficulties or characterizes them as noise, then,
will necessarily produce models that are neither accurate nor useful. As yet no
fully general theory of complex systems has emerged for addressing these
problems, so researchers must solve them in domain-specific contexts.
Researchers in complex systems address these problems by viewing the chief
task of modeling to be capturing, rather than reducing, the complexity of their
respective systems of interest.
While no generally accepted exact definition of complexity exists yet, there are
many archetypal examples of complexity. Systems can be complex if, for
instance, they have chaotic behavior (behavior that exhibits extreme sensitivity
to initial conditions), or if they have emergent properties (properties that are
not apparent from their components in isolation but which result from the
relationships and dependencies they form when placed together in a system),
or if they are computationally intractable to model (if they depend on a number
of parameters that grows too rapidly with respect to the size of the system).
Networks
Nonlinearity
A sample solution in the Lorenz attractor when ρ = 28, σ = 10, and β = 8/3
Complex systems often have nonlinear behavior, meaning they may respond in
different ways to the same input depending on their state or context. In
mathematics and physics, nonlinearity describes systems in which a change in
the size of the input does not produce a proportional change in the size of the
output. For a given change in input, such systems may yield significantly
greater than or less than proportional changes in output, or even no output at
all, depending on the current state of the system or its parameter values.
Emergence
One example of complex system whose emergent properties have been studied
extensively is cellular automata. In a cellular automaton, a grid of cells, each
having one of finitely many states, evolves over time according to a simple set
of rules. These rules guide the "interactions" of each cell with its neighbors.
Although the rules are only defined locally, they have been shown capable of
producing globally interesting behavior, for example in Conway's Game of Life.
Adaptation
Complex adaptive systems are special cases of complex systems that are
adaptive in that they have the capacity to change and learn from experience.
Examples of complex adaptive systems include the stock market, social insect
and ant colonies, the biosphere and the ecosystem, the brain and the immune
system, the cell and the developing embryo, manufacturing businesses and any
human social group-based endeavor in a cultural and social system such as
political parties or communities.
These are standards rules but with combined work between SONIC and
ICARUS you can transform your system in an incredible security machine .
ACTIVE DEFENSE
If you consider that WannaCry ransomware attack in May 2017 and the NotPetya attack
in June 2017 offer cases in point. In each, hackers helped themselves to tools stolen from
intelligence agencies and others and created havoc around the world, forcing systems
Some do. Several of the world’s best-protected organizations have been attacked over
the past few years, including a number of preeminent government agencies and
technology companies. Hackers who may once have been groping around in the dark are
acquiring a deeper understanding of who they’re targeting and how to get inside. Thanks
to a proliferation of botnets1 and the easy sharing of tools on the dark web, the expense
of mounting cyberattacks is also plunging. Put it all together, and criminals, some of
whom are state sponsored, have ready access to cash, technologies, and resources. Over
the coming years, crimes in the cyberrealm are predicted to cost the global economy
$445 billion annually.2
Perversely, the high-profle hacks may have done us a favor. For a long time,
cybersecurity experts have proselytized about the evolving threat landscape. But like
doctors who caution their patients to avoid sedentary lifestyles, the risks these experts
describe seem important but distant. The WannaCry attack—its brazenness, the speed at
which it scaled, and how effortlessly it derailed business as usual—took cyberthreat
activity from a slow-moving abstraction and made it real.
Businesses must consider themselves warned. Rather than continue in a passive stance,
organizations must adopt an “active defense” model: they should assume their frewalls
will be penetrated. They should assume that encryption keys will be compromised, and
that hackers will stay a step ahead of them in deploying malware in their infrastructure.
Active defense requires organizations to anticipate attacks before they happen, detect
and respond in real time, establish traps and alarms to contain attacks, and adopt a
tiered approach to protecting critical assets.3
The threat environment is constantly changing, but how businesses have responded to
A signifcant number of breaches are still caused by employee lapses. Deespite years of
training employees on good data-hygiene practices and continued investment in
malware and virus detection, the majority of corporate data breaches are caused by
simple human error: clicking on an innocent-seeming email, downloading a legitimate-
looking attachment, or revealing identifying information to a seemingly trustworthy
source.4 Even if two-thirds of employees avoid these traps, about one-third will still fall
prey (and about 15 percent of this group will go on to become repeat victims).5 That
means an automated barrage like a phishing campaign that blasts messages to
thousands of employees is assured a reliable percentage of hits—and this is just by using
basic techniques. More devious attackers can do extensive damage. All it takes is one or
two employees to expose their credentials, and an attacker can decrypt them and make
their way inside. Most organizations are not set up to thwart this behavior.
Perimeter and encryption defenses aren’t enough. Large organizations have spent
millions on frewalls and encryption. But the strongest perimeter defenses won’t keep a
company safe if intruders are already inside—and given the earlier point regarding
internal threats, businesses must assume some are. Once there, intruders can stay for
months, acquiring information and using that information to enter the systems of other
companies. Criminals know that the best targets are well defended, so rather than trying
to penetrate a heavily secured front door, they can go around to the back, to the
company’s supply chain. Deata show that 63 percent of data breaches come from
exploiting weak points in a company’s customer and vendor network.6 One major
consumer-goods chain, for instance, suffered a major loss when attackers climbed in
through the proverbial ducts by hacking the company’s air-conditioning vendor and
working their way in. Companies need to do more than bar the gates; they need to
monitor their entire network (and, in some cases, their network’s network) to anticipate
where attacks will come from. But most organizations don’t have that capability.
We are likely to have more malicious actors entering the feld, more attacks that take
advantage of basic loopholes, and more players capable of launching sustained,
pernicious insider-based attacks. New strategies and partnerships are required.
Active defense allows organizations to engage and defect attackers in real time by
combining threat intelligence and analytics resources within the IT function. The
approach draws upon lessons the military community learned in defending itself in fuid
attack environments like Afghanistan and Iraq. To ferret out and respond to risks faster,
commanders began positioning operators, planners, and intelligence analysts in the
same tent where they could feed special operations teams with ongoing, real-time
information. Integrated and more accurate intelligence made it easier for units to track
chatter, identify targets, and increase the number of missions they could conduct over
the course of an evening.
In recent years, some large organizations have applied that thinking to bolster their own
defenses. A major fnancial-services institution, for instance, greatly enhanced its
cybersecurity capabilities by convening a team dedicated to providing active defense. The
team established state-of-the-art threat-monitoring capabilities so it could continually
scan the company’s ecosystem—its own network as well as the broader supply chain—for
unusual patterns and activity, sniff out potential threats, and thwart attacks, often within
minutes of detection. It has impeded thousands of attacks as a result.
Sonic has the power to anticipate attacks before they happen. If the old model was all
about defending the organization with layers of perimeter protection, the new model is
far more proactive. Businesses need to scour the threat environment to fnd out if
someone is talking about them or someone in their chain, pinpoint software and network
vulnerabilities, and spot potential hacks before they occur. This is an intelligence-heavy,
data-driven process—and it’s critical. Bringing cybersecurity experts into the tent can
help organizations gain the insights needed. Third parties that specialize in threat
intelligence monitor a wide range of sources. That includes following threads and
conversations in places like the dark web—websites that require special software to
access and provide user anonymity—to gauge evolving threats to the company or its
vendors.
Early detection depends on an organization’s ability to track network patterns and user
behavior that deviate from the norm. The challenge is to fgure out what normal is, given
that businesses are constantly changing and human behavior is unpredictable. Intrusion
detection and anomaly detection are two widely used approaches. Intrusion-detection
systems (IDeS) look for misuse based on known attack patterns. However, because these
systems are trained to spot defned threat signatures, they may miss emerging ones.
They may also have a hard time distinguishing problematic activity from legitimate
activity, such as innocuous internal communications that contain fagged language or
Internet addresses (for example, malware warnings), ongoing network-security-
vulnerability scans, or attacks against systems that have already been patched. Anomaly-
detection models work the other way around. Instead of looking for known attack
signatures, they look for behavior that deviates from typical network patterns, such as an
Establish traps and alarms to contain attacks. Deecoy servers and systems, known as
deceptions, are another tool that companies can deploy as part of their active defense.
Deeceptions lure attackers into a dummy environment where they can be studied to gain
additional intelligence. Entrance into the trap sets off an alarm, alerting the threat-
operations center and triggering software agents and other deterrents to be placed in
the network to close off access and prevent damage to the business. Some businesses
also salt these environments with false information to confuse attackers. Once intruders
breach a system, they usually return through the same gateway. Deeceptions and other
traps need to be convincing enough facsimiles to keep intruders inside long enough for
the company to gather useful insights. Companies can then use those repeat visits to
record the methods attackers are using to gain fle, system, or server access and update
their defenses accordingly.
Over the longer term, businesses need to construct layers of defense to keep the
company’s most critical assets deeply buried. Ring architectures, for instance, allow
organizations to store data in different layers depending on the value and sensitivity of
those assets. Each layer requires a specifc key and authorization protocol to manage
access. Penetration in any one layer will set off alarms. Active defense also requires an IT
plan that organizes and prioritizes security-related technology spending. Otherwise, it
can be tempting to try to protect everything and in the end create vulnerabilities when
spending and systems prove too difficult to maintain.
Taken together, these measures can make a profound difference. At one fnancial
institution, for instance, intelligence gathered on the dark web revealed that an overseas
criminal syndicate was seeking to access the credentials of the bank’s high-net-worth
clients. Analysts informed their IT counterparts, all of whom worked together in an
integrated active-defense unit. Engineers spotted command-and-control-type traffic
emanating from PCs associated with high-income zip codes and found a pattern of
anomalous log-ins for some of their high-net-worth accounts. The threat center
Using this average skills when a threats was detected SONIC activate an evolution of
dionaea honeypot called NEMESYS (my personal nickname on the net) that use the most
advanced protocols used on labrea and dionaea honeypots :
- blackhole
- epmap
- ftp
- http
- memcache
- mirror
- mqtt
- mssql
- mysql
- pptp
- sip
- smb
- tftp
- upnp
but in addition of these protocols i’ve created a super secret protocol that i’ve called
ODeINO .
ODeINO is a evolution of tarpit function , his target is not only the less of cyber criminal
activities , for the frst time YOU HAVE A COMPLETE HACKING SOLUTION USEDe BY AN
The results is that when your enterprise is attacked , SONIC not only protects your
infrastructures but on the same time , attacks with all possible exploit the attacker
machine , THE BEST DeEFENSE IS ALWAYS A GOODe OFFENSE.
ZFS is signifcantly different from any previous fle system because it is more than just
a fle system. Combining the traditionally separate roles of volume manager and fle
system provides ZFS with unique advantages. The fle system is now aware of the
underlying structure of the disks. Traditional fle systems could only be created on a
The use of ZFS allows VECTOR to create a multipartition Operating System that
decentralized the access of all data sources to improve the maximum data protection
and use mongo db data replication ( only on the servers) to grant the availability of
data for a long time .
Like a Human VECTOR has the possibility to upgrade itself indipendently and without
any human interaction , vector use a new algorithm to edit your personal repository
by adding a new packet softwares that internet offers day by day.
All is possible because vector doesn’t derive from any OS , it has a new revolutionary
kernel built on top of actually technology
Evolution. That is the key to define the current situation about online banking fraud. As
specialist, we are aware that in the vast majority of case, the cybersecurity discipline acts in
a reactive way againts the threats of cybercriminals. A very typical way of acting in the
banking sector. Let's give a simple and very typical example, a cybercriminal desing a
cybercriminal designs a phishing campaign to steal online banking credentials.
Usually, after the detection of online fraud, an approach is made to close the portal where
the malicious files reside, to use blacklists published by antivirus manufacturers, modify the
rules and configurations, warn the user of which has been infected, etc. Each company
develops its own techniques with tools and processes to face these types of situations.
Despite all the efforts, online banking fraud continues to increase:
•More and more banks are using this type of platform to reach their customer. The increase
is due to the speed and ease to carry out frequent operations like transfers, know the
balance, etc.
•The cybercrime sector has become a very lucrative sector, reaching to coin the name
"crime-as-a-service".A situation that allows each cyber criminal to specialize in each
process of the criminal chain, such as the development of complex techniques to infect a
user and rob him of his bank credentials. The more specialized the cybercriminal, the more
elaborate and innovative their techniques will be.
•Bank fraud provides quick returns with a low level of risk, since criminal cyber identification
is complex and time consuming. For criminals, online banking represents a great business
opportunity.
•New cybercrime patterns appear that allow you to circumvent with relative ease at any
time during the session of the user. For example RAT, Account Take Over, bots, Man-in-the-
Browser (MitB), etc.
•Finally, users who demand the services of online banking often lack sufficient security
measures to combat these patterns.
Today, the main challenge facing banks is to be able to acquire a thorough knowledge of
the new techniques, tactics and procedures (TTP) of cybercriminals to quickly generate the
new threats. In buguroo we consider that the techniques and tactics of online banking fraud
are currently organized into three categories:
Secret feautures
This is only a little view of VECTOR possibilities , but the the truth is that
VECTOR has an hidden power that transform this system in a real military
resource on the combat zone and for governement to increase the power of IoT
smart grid surveillance.
The hidden power of vector is stored in a kernel substrate called ADE that
allows the system to exploit a simple principle already known to DARPA but
effectively never diffused , but with my personal skills acquireds during my
studies and in real life cyber operations i’ve created a complete solution that
will put on the top of Military Machine Learning System.
There are several possible applications withVECTOR for the military. Replacing
frozen software with systems that do not need to be refreshed periodically creates a
broad potential for creating more nimble systems, possibly at lower cost. Again, AI
could be used in training systems. It provides an unpredictable and adaptive
adversaries for training fighter pilots (VECTOR Simulator) it understands photos and
videos and cans greatly help in processing the mountains of data from surveillance
systems or for “pattern-of-life” surveillance. Facial recognition Ais inside VECTOR
called IRIS can be used to close “skill gaps” in complex maintenance it enables
systems to interact with humans using natural language. VECTOR NLP (Natural
Language Processor) could enable systems to take orders without using keyboards.
It also can translate documents and could serve as a translator in the future.
And is in not all VECTOR uses ICARUS to perform the best quantum uses the advanced
principles of quantum computing to give ICARUS the possibility to realize quantum
mining capable of increasing performance both in terms of cryptocurrencies mining