{"id":6150,"date":"2020-02-19T09:16:54","date_gmt":"2020-02-19T07:16:54","guid":{"rendered":"http:\/\/inprosec.com\/detection-of-cyber-security-threats-using-ai\/"},"modified":"2020-02-19T09:16:54","modified_gmt":"2020-02-19T07:16:54","slug":"detection-of-cyber-security-threats-using-ai","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/","title":{"rendered":"Detection of cyber security threats using AI"},"content":{"rendered":"<p>In today&#8217;s entry \u201dNetwork Traffic Analyzing and Modeling for Cybersecurity Threat Detection using AI&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech, explains how AI can be used to analyze strange behavior in OT networks, since the large amount of data and its nature, make the control of communications very complex.<\/p>\n<p>&nbsp;<\/p>\n<p><a style=\"background: #084671; color: #fff; padding: 8px 15px !important; border-radius: 3px; font-size: 20px;\" href=\"https:\/\/inprosec.es\/wp-content\/uploads\/2020\/02\/IA-Saber.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Download Tech Paper<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s entry \u201dNetwork Traffic Analyzing and Modeling for Cybersecurity Threat Detection using AI&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech, explains how AI can be used to analyze strange behavior in OT networks, since the large amount of data and its nature, make the control of communications very complex&#8230;.<\/p>\n","protected":false},"author":6,"featured_media":4733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-6150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-inprotech-auto"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Detection of cyber security threats using AI - Inprosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detection of cyber security threats using AI\" \/>\n<meta property=\"og:description\" content=\"In today&#8217;s entry \u201dNetwork Traffic Analyzing and Modeling for Cybersecurity Threat Detection using AI&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech, explains how AI can be used to analyze strange behavior in OT networks, since the large amount of data and its nature, make the control of communications very complex....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-19T07:16:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"Detection of cyber security threats using AI\",\"datePublished\":\"2020-02-19T07:16:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/\"},\"wordCount\":66,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/646-scaled-1.jpg\",\"articleSection\":[\"InprOTech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/\",\"name\":\"Detection of cyber security threats using AI - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/646-scaled-1.jpg\",\"datePublished\":\"2020-02-19T07:16:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/646-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/646-scaled-1.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"AI robotic operations tablet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/detection-of-cyber-security-threats-using-ai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detection of cyber security threats using AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Detection of cyber security threats using AI - Inprosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/","og_locale":"en_US","og_type":"article","og_title":"Detection of cyber security threats using AI","og_description":"In today&#8217;s entry \u201dNetwork Traffic Analyzing and Modeling for Cybersecurity Threat Detection using AI&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech, explains how AI can be used to analyze strange behavior in OT networks, since the large amount of data and its nature, make the control of communications very complex....","og_url":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/","og_site_name":"Inprosec","article_published_time":"2020-02-19T07:16:54+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"Detection of cyber security threats using AI","datePublished":"2020-02-19T07:16:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/"},"wordCount":66,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg","articleSection":["InprOTech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/","url":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/","name":"Detection of cyber security threats using AI - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg","datePublished":"2020-02-19T07:16:54+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg","width":2560,"height":1707,"caption":"AI robotic operations tablet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Detection of cyber security threats using AI"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=6150"}],"version-history":[{"count":0,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/4733"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=6150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=6150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=6150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}