{"id":860,"date":"2020-12-30T06:41:26","date_gmt":"2020-12-30T06:41:26","guid":{"rendered":"http:\/\/cafe2sach.com\/?p=860"},"modified":"2022-11-13T13:09:33","modified_gmt":"2022-11-13T13:09:33","slug":"su-ket-hop-cua-con-nguoi-va-may-moc-trong-cuoc-chien-chong-tin-tac","status":"publish","type":"post","link":"https:\/\/cafe2sach.com\/index.php\/2020\/12\/30\/su-ket-hop-cua-con-nguoi-va-may-moc-trong-cuoc-chien-chong-tin-tac\/","title":{"rendered":"\u1ee8ng d\u1ef1ng AI trong an ninh m\u1ea1ng"},"content":{"rendered":"\n<p><em>Ng\u00e0y nay, khoa h\u1ecdc m\u00e1y t\u00ednh \u0111\u01b0\u1ee3c ch\u00fa tr\u1ecdng v\u00ec r\u1ea5t nhi\u1ec1u nh\u1eefng ti\u1ec7n \u00edch ch\u00fang mang l\u1ea1i&nbsp; nh\u01b0 ph\u1ee5c v\u1ee5 vi\u1ec7c x\u1eed l\u00fd th\u00f4ng tin, l\u01b0u tr\u1eef t\u00e0i li\u1ec7u, th\u1ef1c hi\u1ec7n c\u00e1c giao d\u1ecbch tr\u1ef1c tuy\u1ebfn. Tuy nhi\u00ean, ch\u00ednh ti\u1ec7n \u00edch \u0111\u00f3 l\u1ea1i mang nguy c\u01a1 ti\u1ec1m t\u00e0ng v\u1ec1 vi\u1ec7c m\u1ea5t d\u1eef li\u1ec7u, l\u1ed9 th\u00f4ng tin giao d\u1ecbch b\u1edfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng, v\u00ec v\u1eady vi\u1ec7c quan t\u00e2m nh\u1ea5t c\u1ee7a th\u1ebf gi\u1edbi hi\u1ec7n \u0111\u1ea1i l\u00e0 b\u1ea3o m\u1eadt th\u00f4ng tin, b\u1ea3o m\u1eadt an to\u00e0n m\u1ea1ng. Tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o <\/em>(<em>Artificial Intelligence)<\/em>,<em> h\u1ecdc m\u00e1y c\u01a1 b\u1ea3n (Machine Learning) \u0111\u00e3 v\u00e0 \u0111ang nh\u1eadn \u0111\u01b0\u1ee3c s\u1ef1 quan t\u00e2m c\u1ee7a \u0111\u00f4ng \u0111\u1ea3o gi\u1edbi chuy\u00ean m\u00f4n v\u00ec nh\u1eefng \u1ee9ng d\u1ee5ng c\u1ee7a n\u00f3. \u1ee8ng d\u1ee5ng h\u1ecdc m\u00e1y c\u01a1 b\u1ea3n trong b\u1ea3o m\u1eadt m\u1ea1ng kh\u00f4ng nh\u1eefng l\u00e0 m\u1ed9t \u0111\u1ec1 t\u00e0i h\u1ea5p d\u1eabn m\u00e0 c\u00f2n l\u00e0 m\u1ed9t th\u00e1ch th\u1ee9c \u0111\u1ed1i v\u1edbi nh\u1eefng nh\u00e0 nghi\u00ean c\u1ee9u khoa h\u1ecdc m\u00e1y t\u00ednh.<\/em><\/p>\n\n\n\n<p><br>T\u1ea5n c\u00f4ng m\u1ea1ng \u2013 t\u1ea5t c\u1ea3 c\u00e1c h\u00ecnh th\u1ee9c x\u00e2m nh\u1eadp tr\u00e1i ph\u00e9p v\u00e0o m\u1ed9t h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh, website, c\u01a1 s\u1edf d\u1eef li\u1ec7u, h\u1ea1 t\u1ea7ng m\u1ea1ng, thi\u1ebft b\u1ecb c\u1ee7a m\u1ed9t c\u00e1 nh\u00e2n ho\u1eb7c t\u1ed5 ch\u1ee9c th\u00f4ng qua m\u1ea1ng internet v\u1edbi nh\u1eefng m\u1ee5c \u0111\u00edch b\u1ea5t h\u1ee3p ph\u00e1p \u0111ang l\u00e0 v\u1ea5n \u0111\u1ec1 g\u00e2y lo l\u1eafng c\u0169ng nh\u01b0 \u1ea3nh h\u01b0\u1edfng x\u00e3 h\u1ed9i nhi\u1ec1u m\u1eb7t kh\u00f4ng ch\u1ec9 cho gi\u1edbi chuy\u00ean m\u00f4n m\u00e0 b\u1ea5t c\u1ee9 l\u0129nh v\u1ef1c n\u00e0o c\u00f3 l\u01b0u tr\u1eef d\u1eef li\u1ec7u tr\u00ean m\u1ea1ng c\u0169ng c\u00f3 th\u1ec3 ch\u1ecbu thi\u1ec7t h\u1ea1i n\u1eb7ng n\u1ec1 n\u1ebfu b\u1ecb t\u1ea5n c\u00f4ng.<\/p>\n\n\n\n<p><em><\/em><em><br>H\u00ecnh \u1ea3nh: MIT News<\/em><\/p>\n\n\n\n<p><em>M\u1ee5c ti\u00eau c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng<\/em> r\u1ea5t \u0111a d\u1ea1ng, c\u00f3 th\u1ec3 l\u00e0 vi ph\u1ea1m d\u1eef li\u1ec7u, \u0111\u00e1nh c\u1eafp ho\u1eb7c ph\u00e1 h\u1ee7y th\u00f4ng tin, c\u0169ng c\u00f3 th\u1ec3 nh\u1eafm t\u1edbi h\u1ec7 th\u1ed1ng ch\u00ednh g\u00e2y gi\u00e1n \u0111o\u1ea1n ho\u1eb7c c\u1ea3n tr\u1edf d\u1ecbch v\u1ee5, nguy hi\u1ec3m h\u01a1n l\u00e0 l\u1ee3i d\u1ee5ng th\u00f4ng tin c\u1ee7a c\u00e1 nh\u00e2n \u0111\u1ec3 m\u00e3 h\u00f3a ph\u1ee5c v\u1ee5 l\u1ee3i \u00edch ri\u00eang c\u1ee7a hacker.<br><br>B\u00ean c\u1ea1nh \u0111\u00f3 nh\u1eefng m\u1ee5c \u0111\u00edch kh\u00e1c nh\u01b0 \u0103n c\u1eafp t\u00e0i li\u1ec7u m\u1eadt c\u1ee7a c\u00f4ng ty, thay \u0111\u1ed5i \u0111\u1ecbnh gi\u00e1 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn kinh t\u1ebf, t\u1ea5n c\u00f4ng c\u00e1c t\u1ed5 ch\u1ee9c t\u00f4n gi\u00e1o.<\/p>\n\n\n\n<div id=\"toc_container\" class=\"no_bullets\"><p class=\"toc_title\">N\u1ed9i dung ch&iacute;nh<\/p><ul class=\"toc_list\"><li><a href=\"#Nhung_ke_cap_trinh_do_cao_bien_tri_thuc_la_con_dao_hai_luoi\"><span class=\"toc_number toc_depth_1\">1<\/span> Nh\u1eefng k\u1ebb c\u1eafp tr\u00ecnh \u0111\u1ed9 cao \u2013 bi\u1ebfn tri th\u1ee9c l\u00e0 con dao hai l\u01b0\u1ee1i<\/a><\/li><li><a href=\"#Mot_so_hinh_thuc_tan_cong_mang_pho_bien\"><span class=\"toc_number toc_depth_1\">2<\/span> M\u1ed9t s\u1ed1 h\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn:<\/a><\/li><li><a href=\"#Giai_phap_hieu_qua_cho_doanh_nghiep_de_dam_bao_an_toan_thong_tin\"><span class=\"toc_number toc_depth_1\">3<\/span> Gi\u1ea3i ph\u00e1p hi\u1ec7u qu\u1ea3 cho doanh nghi\u1ec7p \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o an to\u00e0n th\u00f4ng tin<\/a><\/li><li><a href=\"#Su_but_pha_khi_ket_hop_nguoi_va_may_moc_dem_lai_phan_hoi_tich_cuc\"><span class=\"toc_number toc_depth_1\">4<\/span> S\u1ef1 b\u1ee9t ph\u00e1 khi k\u1ebft h\u1ee3p ng\u01b0\u1eddi v\u00e0 m\u00e1y m\u00f3c \u0111em l\u1ea1i ph\u1ea3n h\u1ed3i t\u00edch c\u1ef1c<\/a><\/li><\/ul><\/div>\n<h1><span id=\"Nhung_ke_cap_trinh_do_cao_bien_tri_thuc_la_con_dao_hai_luoi\"><strong>Nh\u1eefng k\u1ebb c\u1eafp tr\u00ecnh \u0111\u1ed9 cao \u2013 bi\u1ebfn tri th\u1ee9c l\u00e0 con dao hai l\u01b0\u1ee1i<\/strong><\/span><\/h1>\n\n\n\n<p><br>Nh\u1eefng ng\u01b0\u1eddi th\u1ef1c hi\u1ec7n h\u00e0nh vi t\u1ea5n c\u00f4ng m\u1ea1ng, d\u00f9 v\u1edbi m\u1ee5c \u0111\u00edch g\u00ec, \u0111\u1ec1u \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 t\u1ed9i ph\u1ea1m m\u1ea1ng &#8211; hacker, \u1edf Vi\u1ec7t Nam c\u00f2n bi\u1ebft v\u1edbi c\u00e1i t\u00ean l\u00e0 tin t\u1eb7c. Nh\u1eefng hacker \u0111a s\u1ed1 l\u00e0 nh\u1eefng ng\u01b0\u1eddi c\u00f3 tr\u00ecnh \u0111\u1ed9 ki\u1ebfn th\u1ee9c chuy\u00ean s\u00e2u v\u1ec1 an ninh m\u1ea1ng, khoa h\u1ecdc th\u00f4ng tin, m\u00e1y t\u00ednh, m\u00e3 h\u00f3a d\u1eef li\u1ec7u, l\u01b0u tr\u1eef th\u00f4ng tin. C\u0169ng v\u00ec v\u1eady m\u00e0 cu\u1ed9c chi\u1ebfn ch\u1ed1ng tin t\u1eb7c \u0111\u00e3 m\u1ea5t r\u1ea5t nhi\u1ec1u ch\u1ea5t x\u00e1m c\u1ee7a k\u1ef9 s\u01b0 C\u00f4ng ngh\u1ec7 Th\u00f4ng tin. Tri th\u1ee9c qu\u1ea3 l\u00e0 con dao hai l\u01b0\u1ee1i \u0111\u1ed1i v\u1edbi c\u1ed9ng \u0111\u1ed3ng, ch\u1ea5t x\u00e1m n\u1eb1m trong b\u1ed9 n\u00e3o c\u1ee7a m\u1ed9t ng\u01b0\u1eddi mang t\u00e2m l\u01b0\u01a1ng thi\u1ec7n, ph\u1ee5c v\u1ee5 x\u00e3 h\u1ed9i th\u00ec \u0111em l\u1ea1i nhi\u1ec1u l\u1ee3i \u00edch; ng\u01b0\u1ee3c l\u1ea1i, n\u1eb1m trong b\u1ed9 n\u00e3o c\u1ee7a k\u1ebb h\u1ee7y di\u1ec7t, th\u00ec nh\u1eefng nguy h\u1ea1i cho x\u00e3 h\u1ed9i th\u1eadt \u0111\u00e1ng l\u01b0\u1eddng.<\/p>\n\n\n\n<h1><span id=\"Mot_so_hinh_thuc_tan_cong_mang_pho_bien\"><strong>M\u1ed9t s\u1ed1 h\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn:<\/strong><\/span><\/h1>\n\n\n\n<p><br><em>1. T\u1ea5n c\u00f4ng d\u1ecbch v\u1ee5 (DoS) v\u00e0 l\u00e0m gi\u00e1n \u0111o\u1ea1n d\u1ecbch v\u1ee5 (DDoS)<\/em><\/p>\n\n\n\n<p><br>L\u00e0 h\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng m\u00e0 hacker l\u00e0m gi\u00e1n \u0111o\u1ea1n d\u1ecbch v\u1ee5 c\u1ee7a h\u1ec7 th\u1ed1ng, m\u00e1y ch\u1ee7. Ch\u00fang t\u1ea1o ra m\u1ed9t h\u1ec7 th\u1ed1ng traffic kh\u1ed5ng l\u1ed3 \u1edf c\u00f9ng m\u1ed9t th\u1eddi \u0111i\u1ec3m l\u00e0m cho h\u1ec7 th\u1ed1ng qu\u00e1 t\u1ea3i v\u00e0 ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng th\u1ec3 truy c\u1eadp \u0111\u01b0\u1ee3c trong kho\u1ea3ng th\u1eddi gian \u0111\u00f3. Ho\u1eb7c tin t\u1eb7c c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng m\u1ed9t m\u1ea1ng l\u01b0\u1edbi c\u00e1c m\u00e1y kh\u00e1c \u0111\u1ec3 t\u1ea5n c\u00f4ng h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n, nguy hi\u1ec3m h\u01a1n ch\u00ednh l\u00e0 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh \u0111\u00f3 c\u0169ng kh\u00f4ng bi\u1ebft r\u1eb1ng m\u00ecnh \u0111ang b\u1ecb x\u00e2m nh\u1eadp.<\/p>\n\n\n\n<p><em>2. T\u1ea5n c\u00f4ng trung gian (MitM)<\/em><\/p>\n\n\n\n<p><br>L\u00e0 h\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng v\u00e0o h\u1ec7 th\u1ed1ng gi\u1eefa ng\u01b0\u1eddi s\u1eed d\u1ee5ng v\u00e0 nh\u00e0 cung c\u1ea5p, kh\u00f4ng cho ph\u00e9p h\u1ecd truy c\u1eadp d\u1ecbch v\u1ee5 ho\u1eb7c \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u1ee7a c\u1ea3 2 b\u00ean th\u00f4ng qua vi\u1ec7c nghe l\u00e9n cu\u1ed9c giao ti\u1ebfp.<br><br><em>3. T\u1ea5n c\u00f4ng gi\u1ea3 m\u1ea1o<\/em><\/p>\n\n\n\n<p>H\u00ecnh th\u1ee9c s\u1eed d\u1ee5ng d\u1ecbch v\u1ee5 email gi\u1ea3 m\u1ea1o l\u1ea5y danh ngh\u0129a t\u1eeb c\u00e1c nh\u00e0 cung c\u1ea5p c\u00f3 uy t\u00edn \u0111\u1ec3 \u0111\u00e1nh v\u00e0o l\u00f2ng tin ng\u01b0\u1eddi d\u00f9ng. Ch\u00fang k\u1ebft h\u1ee3p gi\u1eefa ki\u1ebfn th\u1ee9c x\u00e3 h\u1ed9i v\u00e0 chi\u00eau th\u1ee9c l\u1eeba \u0111\u1ea3o, vi\u1ec7c n\u00e0y th\u01b0\u1eddng \u0111\u1ec3 l\u1ea5y th\u00f4ng tin th\u1ebb t\u00edn d\u1ee5ng, m\u1eadt kh\u1ea9u c\u00e1 nh\u00e2n.<\/p>\n\n\n\n<p><br><em>4. Ph\u00e1 h\u1ee7y m\u1eadt kh\u1ea9u<\/em><\/p>\n\n\n\n<p><em><br><\/em>H\u00ecnh th\u1ee9c n\u00e0y l\u00e0m ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng th\u1ec3 truy c\u1eadp l\u1ea1i t\u00e0i kho\u1ea3n c\u1ee7a m\u00ecnh, khi\u1ebfn cho m\u1ea5t th\u00f4ng tin v\u00e0 m\u1ea5t d\u1eef li\u1ec7u c\u00e1 nh\u00e2n. Ph\u1ed5 bi\u1ebfn t\u1ea1i c\u00e1c trang m\u1ea1ng x\u00e3 h\u1ed9i, t\u00e0i kho\u1ea3n website.<\/p>\n\n\n\n<p><br><em>5. T\u1ea5n c\u00f4ng d\u1eef li\u1ec7u SQL<\/em><\/p>\n\n\n\n<p><br>H\u00ecnh th\u1ee9c ph\u1ed5 bi\u1ebfn tr\u00ean c\u00e1c website, cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y xu\u1ea5t hi\u1ec7n t\u1eeb c\u00e1c l\u1ed7 h\u1ed5ng c\u1ee7a website. Hacker s\u1eed d\u1ee5ng m\u1ed9t lo\u1ea1i code \u0111\u1ed9c h\u1ea1i v\u00e0o h\u1ec7 th\u1ed1ng s\u1eed d\u1ee5ng ng\u00f4n ng\u1eef c\u00f3 c\u1ea5u tr\u00fac (SQL), n\u1ebfu truy c\u1eadp th\u00e0nh c\u00f4ng th\u00ec tin t\u1eb7c c\u00f3 th\u1ec3 \u0111\u1ecdc \u0111\u01b0\u1ee3c c\u00e1c th\u00f4ng tin b\u1ea3o m\u1eadt c\u1ee7a h\u1ec7 th\u1ed1ng, ch\u00fang c\u00f3 th\u1ec3 thay \u0111\u1ed5i, c\u1eadp nh\u1eadt th\u00f4ng tin gi\u1ea3 m\u1ea1o th\u1eadm ch\u00ed l\u00e0 x\u00f3a th\u00f4ng tin v\u1ec1 data kh\u00e1ch h\u00e0ng.<\/p>\n\n\n\n<p><br><em>6. T\u1ea5n c\u00f4ng b\u1eb1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i<\/em><\/p>\n\n\n\n<p><br>\u0110\u01b0\u1ee3c coi l\u00e0 ph\u1ea7n m\u1ec1m kh\u00f4ng mong mu\u1ed1n \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t v\u00e0o h\u1ec7 th\u1ed1ng m\u00e1y ch\u1ee7 c\u1ee7a b\u1ea1n, d\u00f9 b\u1ea1n kh\u00f4ng cho ph\u00e9p c\u00e0i \u0111\u1eb7t.&nbsp; M\u1ed9t s\u1ed1 ph\u1ea7n m\u1ec1m ph\u1ed5 bi\u1ebfn: Macro viruses, file infectors, logic bombs, ransomware. Th\u00f4ng th\u01b0\u1eddng tin t\u1eb7c s\u1ebd t\u1ea5n c\u00f4ng ng\u01b0\u1eddi d\u00f9ng qua c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt, c\u0169ng c\u00f3 th\u1ec3 d\u1ee5 d\u1ed7 ng\u01b0\u1eddi d\u00f9ng click v\u00e0o m\u1ed9t \u0111\u01b0\u1eddng link \u0111\u1ed9c h\u1ea1i \u0111\u1ec3 ph\u1ea7n m\u1ec1m t\u1ef1 \u0111\u1ed9ng h\u00f3a c\u00e0i \u0111\u1eb7t trong m\u00e1y t\u00ednh.<\/p>\n\n\n\n<p>C\u00f3 th\u1ec3 th\u1ea5y \u0111\u1ed9 \u0111a d\u1ea1ng c\u1ee7a c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng, m\u1ed9t ng\u00e0y c\u00f3 r\u1ea5t nhi\u1ec1u th\u00f4ng tin \u0111\u01b0\u1ee3c t\u1ea1o ra \u0111\u1ed3ng th\u1eddi c\u00e1c hacker c\u0169ng c\u00f3 r\u1ea5t nhi\u1ec1u chi\u00eau th\u1ee9c kh\u00e1c nhau \u0111\u1ec3 t\u1ea5n c\u00f4ng ho\u1eb7c th\u00f4ng tin c\u1ee7a b\u1ea1n.<\/p>\n\n\n\n<h1><span id=\"Giai_phap_hieu_qua_cho_doanh_nghiep_de_dam_bao_an_toan_thong_tin\"><strong>Gi\u1ea3i ph\u00e1p hi\u1ec7u qu\u1ea3 cho doanh nghi\u1ec7p \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o an to\u00e0n th\u00f4ng tin<\/strong><\/span><\/h1>\n\n\n\n<p><br>Ng\u00e0y nay c\u00f3 r\u1ea5t nhi\u1ec1u ph\u01b0\u01a1ng ph\u00e1p \u0111\u01b0\u1ee3c \u0111\u01b0a ra \u0111\u1ec3 ch\u1ed1ng l\u1ea1i t\u1ed9i ph\u1ea1m m\u1ea1ng: k\u1ebft h\u1ee3p v\u1edbi AI, h\u1ecdc m\u00e1y \u0111\u1ec3 t\u1ea1o ra c\u00e1c c\u00e1c ph\u1ea7n m\u1ec1m ph\u00e1t hi\u1ec7n v\u00e0 ch\u1ed1ng l\u1ea1i hacker. Trong b\u00e0i b\u00e1o n\u00e0y ch\u00fang ta s\u1ebd c\u00f9ng t\u00ecm hi\u1ec3u v\u1ec1 vi\u1ec7c k\u1ebft h\u1ee3p gi\u1eefa con ng\u01b0\u1eddi v\u00e0 h\u1ecdc m\u00e1y \u0111\u1ec3 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng.<br><br><\/p>\n\n\n\n<p>M\u00f4 h\u00ecnh c\u1ee7a c\u00f4ng ty startup MIT b\u1eaft \u0111\u1ea7u \u0111\u01b0a ra gi\u1ea3 \u0111\u1ecbnh r\u1eb1ng c\u00e1c thu\u1eadt to\u00e1n kh\u00f4ng th\u1ec3 t\u1ef1 m\u00ecnh b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng. Ch\u00ednh v\u00ec v\u1eady c\u00f4ng ty ph\u00e1t tri\u1ec3n m\u1ed9t lo\u1ea1i s\u1ea3n ph\u1ea9m m\u1eabu \u0111\u1ec3 tr\u00e1nh c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng v\u00e0 c\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u s\u1ebd nh\u1eadn \u0111\u01b0\u1ee3c ph\u1ea3n h\u1ed3i th\u00f4ng tin r\u1ed3i \u0111\u01b0a ra c\u00e1c gi\u1ea3i ph\u00e1p. Nh\u1eefng ph\u1ea3n h\u1ed3i sau \u0111\u00f3 \u0111\u01b0\u1ee3c x\u00e1c nh\u1eadp v\u1edbi m\u00e1y ch\u1ee7, v\u1edbi m\u1ee5c \u0111\u00edch ph\u1ee5c v\u1ee5 vi\u1ec7c ph\u00e2n t\u00edch trong t\u01b0\u01a1ng lai. S\u1ea3n ph\u1ea9m c\u00f3 t\u00ean l\u00e0 PatternEx.<\/p>\n\n\n\n<p>Theo l\u1eddi c\u1ee7a \u00f4ng Kalyan Veer Amachan Eni &#8211; ng\u01b0\u1eddi \u0111\u1ed3ng s\u00e1ng l\u1eadp ra PatternEx, \u0111\u1ed3ng th\u1eddi l\u00e0 chuy\u00ean gia khoa h\u1ecdc m\u00e1y t\u00ednh c\u1ee7a MIT: \u201cH\u1ea7u h\u1ebft c\u00e1c h\u1ec7 th\u1ed1ng ph\u1ea7n m\u1ec1m hi\u1ec7n nay \u0111\u1ec1u c\u00f3 d\u1ea5u hi\u1ec7u b\u1ea5t th\u01b0\u1eddng trong vi\u1ec7c b\u1ea3o vi\u1ec7c th\u00f4ng tin. \u0110\u1ea7u ti\u00ean l\u00e0 ch\u00fang ta c\u1ea7n c\u00f3 \u0111\u1ecbnh h\u01b0\u1edbng c\u01a1 b\u1ea3n \u0111\u1ec3 ph\u1ee5c v\u1ee5 ho\u1ea1t \u0111\u1ed9ng thi\u1ebft y\u1ebfu c\u1ee7a d\u1ecbch v\u1ee5. Tuy nhi\u00ean, khi ch\u00fang ta c\u00f3 \u0111\u01b0\u1ee3c ph\u1ea3n h\u1ed3i t\u1eeb m\u00e1y t\u00ednh ch\u00fang ta l\u1ea1i th\u01b0\u1eddng b\u1ecf qua nh\u1eefng d\u1eef li\u1ec7u \u0111\u00f3, nh\u1eefng l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt kh\u00f4ng \u0111\u01b0\u1ee3c gi\u00e1m s\u00e1t. \u0110i\u1ec1u n\u00e0y l\u00e0m m\u1ea5t \u0111i m\u1ed9t l\u01b0\u1ee3ng l\u1edbn c\u00e1c th\u00f4ng tin qu\u00fd gi\u00e1, v\u1edbi PatternEx, ch\u00fang t\u00f4i t\u1eadn d\u1ee5ng th\u00f4ng tin \u0111\u00f3 \u0111\u1ec3 r\u1ed3i t\u1ed5ng h\u1ee3p v\u00e0 \u0111\u01b0a ra th\u00f4ng tin sai l\u1ec7ch\u201d.<\/p>\n\n\n\n<p><br>\u201cVi\u1ec7c ph\u00e2n t\u00edch d\u1eef li\u1ec7u s\u1ebd cung c\u1ea5p th\u00f4ng tin c\u1ea7n thi\u1ebft \u0111\u1ec3 c\u1ea3i thi\u1ec7n d\u1ecbch v\u1ee5, khi ch\u00fang t\u00f4i b\u1eaft \u0111\u1ea7u ch\u1ea1y th\u1eed nghi\u1ec7m tr\u00ean c\u00e1c c\u00f4ng ty kh\u00e1c, \u0111\u00e3 ph\u00e1t hi\u1ec7n r\u1eb1ng h\u1ec7 th\u1ed1ng th\u00f4ng b\u00e1o c\u00f3 10 l\u1ea7n ho\u1ea1t \u0111\u1ed9ng b\u00e1o l\u1ed7i v\u00e0 th\u00e0nh c\u00f4ng h\u01a1n \u0111\u00f3 l\u00e0 h\u1ec7 th\u1ed1ng PatternEx s\u1ebd \u0111\u01b0a ra ph\u1ea3n h\u1ed3i tr\u00ean 5 l\u1ea7n m\u1ed7i ng\u00e0y d\u00f9 k\u1ebft qu\u1ea3 c\u00f3 gi\u1ed1ng nhau.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"549\" src=\"http:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-1024x549.jpg\" alt=\"\" class=\"wp-image-862\" srcset=\"https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-1024x549.jpg 1024w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-600x322.jpg 600w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-300x161.jpg 300w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-768x412.jpg 768w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-696x373.jpg 696w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-1068x572.jpg 1068w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2-784x420.jpg 784w, https:\/\/cafe2sach.com\/wp-content\/uploads\/2020\/12\/image2.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>H\u00ecnh \u1ea3nh: Medium.com<\/em><\/p>\n\n\n\n<h1><span id=\"Su_but_pha_khi_ket_hop_nguoi_va_may_moc_dem_lai_phan_hoi_tich_cuc\"><strong><em>S\u1ef1 b\u1ee9t ph\u00e1 khi k\u1ebft h\u1ee3p ng\u01b0\u1eddi v\u00e0 m\u00e1y m\u00f3c \u0111em l\u1ea1i ph\u1ea3n h\u1ed3i t\u00edch c\u1ef1c<\/em><\/strong><\/span><\/h1>\n\n\n\n<p><br>Theo \u00f4ng Veeramachaneni: \u201cC\u00f3 r\u1ea5t nhi\u1ec1u tr\u1ee5c tr\u1eb7c khi con ng\u01b0\u1eddi s\u1eed d\u1ee5ng m\u00e1y m\u00f3c v\u00ec m\u00e1y m\u00f3c ho\u1ea1t \u0111\u1ed9ng theo t\u1eebng b\u01b0\u1edbc r\u1ea5t chi ti\u1ebft v\u00e0 ch\u00fang c\u00f3 s\u1ef1 ph\u00e2n t\u00edch d\u1eef li\u1ec7u. Tuy nhi\u00ean, ch\u00fang kh\u00f4ng th\u1ec3 l\u00e0m m\u1ecdi th\u1ee9 v\u00ec ch\u00fang c\u1ea7n con ng\u01b0\u1eddi l\u1eadp tr\u00ecnh, x\u00e2y d\u1ef1ng v\u00e0 t\u1ea5t nhi\u00ean ch\u00fang kh\u00f4ng c\u00f3 s\u1ef1 linh ho\u1ea1t c\u1ee7a con ng\u01b0\u1eddi.\u201d<\/p>\n\n\n\n<p><br><em>V\u1eady th\u00ec t\u1ea1i sao ch\u00fang ta kh\u00f4ng t\u1eadn d\u1ee5ng lu\u00f4n th\u1ebf m\u1ea1nh c\u1ee7a c\u1ea3 hai?<\/em><\/p>\n\n\n\n<p><br>\u201cC\u00f4ng ty th\u1eed nghi\u1ec7m \u0111\u1ea7u ti\u00ean d\u1ecbch v\u1ee5 PatternEx, l\u00e0 c\u00f4ng ty kinh doanh v\u1ec1 s\u1ea3n ph\u1ea9m tr\u1ef1c tuy\u1ebfn. H\u1ecd \u0111\u00e3 nh\u1eadn ra nh\u1eefng nguy hi\u1ec3m ti\u1ec1m t\u00e0ng b\u1eb1ng c\u00e1ch \u0111\u01b0a m\u00e1y t\u00ednh ph\u00e2n t\u00edch c\u00e1c d\u1eef li\u1ec7u th\u1ef1c t\u1ebf. M\u1ed9t s\u1ed1 th\u00f4ng tin \u0111\u01b0a ra g\u1ed3m: th\u00f4ng tin truy c\u1eadp wifi, nh\u1eadn k\u00fd ng\u01b0\u1eddi d\u00f9ng v\u00e0 c\u00e1c h\u00e0nh vi kh\u00e1c tr\u00ean h\u1ec7 th\u1ed1ng m\u1ea1ng.\u201d<\/p>\n\n\n\n<p><br>S\u1eed d\u1ee5ng d\u1ecbch v\u1ee5 PatternEx cho b\u1ea3o v\u1ec7 th\u00f4ng tin m\u1ea1ng \u0111ang \u0111\u01b0\u1ee3c x\u00e2y d\u1ef1ng, ch\u00fang ta s\u1ebd kh\u00f4ng c\u1ea7n ph\u1ea3i m\u1ea5t nhi\u1ec1u th\u1eddi gian trong vi\u1ec7c x\u00e2y d\u1ef1ng ch\u00fang theo chu\u1ea9n h\u00f3a AI, ch\u00fang ta ch\u1ec9 c\u1ea7n ph\u00e2n t\u00edch d\u1eef li\u1ec7u \u0111\u1ec3 x\u00e2y d\u1ef1ng h\u1ec7 th\u1ed1ng t\u1ed1t h\u01a1n m\u00e0 th\u00f4i.<\/p>\n\n\n\n<p>Ph\u1ea7n m\u1ec1m c\u00f3 nhi\u1ec7m v\u1ee5 l\u00e0 x\u00e1c \u0111\u1ecbnh c\u00e1c d\u1ea5u hi\u1ec7u kh\u1ea3 nghi, n\u1ebfu x\u00e1c nh\u1eadn \u0111\u00f3 l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng c\u00e1c nh\u00e0 ph\u00e2n t\u00edch s\u1ebd c\u00f3 bi\u1ec7n ph\u00e1p ph\u00f2ng ng\u1eeba. Sau \u0111\u00f3 c\u00e1c ph\u1ea3n h\u1ed3i s\u1ebd \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef l\u1ea1i th\u00f4ng tin m\u00e1y ch\u1ee7 \u0111\u1ec3 s\u1eed d\u1ee5ng v\u00e0o t\u01b0\u01a1ng lai.<\/p>\n\n\n\n<p>\u201cB\u1eb1ng vi\u1ec7c c\u00f3 h\u1ec7 th\u1ed1ng c\u00e1c th\u00f4ng tin ph\u1ea3n h\u1ed3i t\u1eeb kh\u00e1ch h\u00e0ng ch\u00fang t\u00f4i c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng nh\u1eadn di\u1ec7n \u0111\u01b0\u1ee3c d\u1ea5u hi\u1ec7u \u0111\u00e1ng ng\u1edd. Trong khi di chuy\u1ec3n th\u00f4ng tin n\u00e0y sang h\u1ec7 th\u1ed1ng th\u00f4ng tin kh\u00e1c th\u00ec s\u1ebd \u0111\u1ed3ng th\u1eddi vi\u1ec7c th\u1ef1c hi\u1ec7n check d\u1eef li\u1ec7u xem c\u00f3 d\u1ea5u hi\u1ec7u kh\u1ea3 khi \u1edf ng\u01b0\u1eddi d\u00f9ng kh\u00e1c kh\u00f4ng.\u201d theo Veerakachaneni.<br><br>C\u00f3 th\u1ec3 th\u1ea5y vi\u1ec7c k\u1ebft h\u1ee3p m\u00e1y m\u00f3c v\u00e0 con ng\u01b0\u1eddi trong b\u1ea3o v\u1ec7 an ninh m\u1ea1ng \u0111ang c\u00f3 ph\u1ea3n h\u1ed3i t\u00edch c\u1ef1c t\u1eeb ph\u00eda ng\u01b0\u1eddi d\u00f9ng, t\u01b0\u01a1ng lai c\u00f4ng cu\u1ed9c ch\u1ed1ng l\u1ea1i c\u00e1c v\u1ee5 t\u1ea5n c\u00f4ng m\u1ea1ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o h\u1ee9a h\u1eb9n l\u00e0 m\u1ed9t nghi\u00ean c\u1ee9u \u0111\u1ea7y tri\u1ec3n v\u1ecdng trong ng\u00e0nh khoa h\u1ecdc m\u00e1y t\u00ednh c\u0169ng nh\u01b0 \u1ee9ng d\u1ee5ng cho nhi\u1ec1u ng\u00e0nh, l\u0129nh v\u1ef1c li\u00ean quan kh\u00e1c.<\/p>\n\n\n\n<p><strong>Ng\u01b0\u1eddi d\u1ecbch:<\/strong> Nguy\u1ec5n Nga &#8211; H\u1ed3ng Nhung<\/p>\n\n\n\n<p><strong>Bi\u00ean t\u1eadp:<\/strong> Tu\u1ec7 An \u2013 C\u1ed1 v\u1ea5n h\u1ecdc thu\u1eadt Nh\u00f3m h\u1ecdc thu\u1eadt IBSG ( <a href=\"http:\/\/www.ibsgacademic.com\">www.ibsgacademic.com<\/a> )<\/p>\n\n\n\n<p><br>Ngu\u1ed3n:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><a href=\"http:\/\/news.mit.edu\/2020\/patternex-machine-learning-cybersecurity-0221?fbclid=IwAR0ex4DzeobEL3BqiItrJv9MMOJkF4l6Dh6V5sBhIPkkVdHN_cXgGI41SNY\">http:\/\/news.mit.edu\/2020\/patternex-machine-learning-cybersecurity-0221?fbclid=IwAR0ex4DzeobEL3BqiItrJv9MMOJkF4l6Dh6V5sBhIPkkVdHN_cXgGI41SNY<\/a><\/li><li><a href=\"http:\/\/news.mit.edu\/2019\/using-machine-learning-hunt-down-cybercriminals-1009?fbclid=IwAR0ScJzF5zyhX-oHjta0PPwt8uX9TvD0Ci_mMghNQDGhG5PHO-Hcibdy0EM\">http:\/\/news.mit.edu\/2019\/using-machine-learning-hunt-down-cybercriminals-1009?fbclid=IwAR0ScJzF5zyhX-oHjta0PPwt8uX9TvD0Ci_mMghNQDGhG5PHO-Hcibdy0EM<\/a><\/li><li><a href=\"https:\/\/blog.netwrix.com\/2018\/05\/15\/top-10-most-common-types-of-cyber-attacks\/#Malware%20attack\">https:\/\/blog.netwrix.com\/2018\/05\/15\/top-10-most-common-types-of-cyber-attacks\/#Malware%20attack<\/a><\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>H\u00ecnh \u1ea3nh:<\/li><\/ul>\n\n\n\n<p>H\u00ecnh 1: <a href=\"http:\/\/news.mit.edu\/2020\/patternex-machine-learning-cybersecurity-0221?fbclid=IwAR0ex4DzeobEL3BqiItrJv9MMOJkF4l6Dh6V5sBhIPkkVdHN_cXgGI41SNY\">http:\/\/news.mit.edu\/2020\/patternex-machine-learning-cybersecurity-0221?fbclid=IwAR0ex4DzeobEL3BqiItrJv9MMOJkF4l6Dh6V5sBhIPkkVdHN_cXgGI41SNY<\/a><\/p>\n\n\n\n<p>H\u00ecnh 2: <a href=\"https:\/\/medium.com\/@Zack_Elbazi\/applying-artificial-intelligence-in-cyber-security-malware-detection-using-machine-learning-1147b75bfaf3\">https:\/\/medium.com\/@Zack_Elbazi\/applying-artificial-intelligence-in-cyber-security-malware-detection-using-machine-learning-1147b75bfaf3<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ng\u00e0y nay, khoa h\u1ecdc m\u00e1y t\u00ednh \u0111\u01b0\u1ee3c ch\u00fa tr\u1ecdng v\u00ec r\u1ea5t nhi\u1ec1u nh\u1eefng ti\u1ec7n \u00edch ch\u00fang mang l\u1ea1i&nbsp; nh\u01b0 ph\u1ee5c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":863,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[251,111,233],"tags":[244,245],"class_list":["post-860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-an-ninh-mang-cyber-security","category-tin-tuc-4-0","category-tri-tue-nhan-tao","tag-an-ninh-mang","tag-cyber-security"],"_links":{"self":[{"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/posts\/860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/comments?post=860"}],"version-history":[{"count":4,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/posts\/860\/revisions"}],"predecessor-version":[{"id":2002,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/posts\/860\/revisions\/2002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/media\/863"}],"wp:attachment":[{"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/media?parent=860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/categories?post=860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cafe2sach.com\/index.php\/wp-json\/wp\/v2\/tags?post=860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}