Posted on Jan 6, 2016
US Air Force uses Virtual Instruments to boost IT savings, efficiency - Virtual Instruments
3.92K
2
3
2
2
0
Posted 9 y ago
Responses: 2
Algorithmic endpoint monitoring is good, however it has a weakness. Some hackers and researchers have gotten good at spoofing data. This could be used in an attack or to create bloat, as in unneeded projects due to fabricated data. One way to do this is to increase the traffic load during an audit to simulate increased traffic, and you now have multiple new contracts to provide more data circuits. If we rely to heavily on endpoint algorithms, we risk increased cost. It is a valuable tool as long as it is not exploited, as it can find unneeded circuits and assist network engineers in network planning.
This is similar to how adaptive biometric systems are vulnerable to poisoning attacks that allow the attacker to replace the authentic person's face with their own. A valuable tool, however it does have it's own flaws which can be exploited. It is a flaw inherit to systems that rely on algorithms to enhance ease of use or monitor network performance.
I can find sources if interested. One was published from University of Cagliari, Italy. I was not aware that that USAF had hired Virtual Instruments to provide this service. I hope a risk assessment caught the potential risk and appropriate safeguards are in place.
This is similar to how adaptive biometric systems are vulnerable to poisoning attacks that allow the attacker to replace the authentic person's face with their own. A valuable tool, however it does have it's own flaws which can be exploited. It is a flaw inherit to systems that rely on algorithms to enhance ease of use or monitor network performance.
I can find sources if interested. One was published from University of Cagliari, Italy. I was not aware that that USAF had hired Virtual Instruments to provide this service. I hope a risk assessment caught the potential risk and appropriate safeguards are in place.
(0)
(0)
Read This Next