Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Instagram lets you share Spotify songs with your story to your sound

June 30, 2025

At every stage of TechCrunch, Charles Hudson tells us what investors really see

June 30, 2025

Baidu’s AI Breakthrough Hasn’t Been Priced In — Why BIDU Could Hit $120 Soon

June 30, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Instagram lets you share Spotify songs with your story to your sound

    June 30, 2025

    The best iPad app to unleash and explore your creativity

    June 30, 2025

    Privacy-centric app maker Proton sues Apple over anti-competitive practices and charges alleged

    June 30, 2025

    Google is adopting AI in classrooms, including new Gemini tools for educators and chatbots for students

    June 30, 2025

    The former meta engineer has built AI tools to plan every detail of a trip

    June 30, 2025
  • Crypto

    Vitalik Buterin reserves for Sam Altman's global project

    June 28, 2025

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025

    Unique, a new social media app

    June 17, 2025
  • Security

    US government overthrows North Korea's major “workers” management

    June 30, 2025

    Mexican drug cartel hackers spy on FBI officials' phones to track and kill informants, the report says

    June 30, 2025

    FBI, cybersecurity firms say prolific hacking crews are currently targeting airlines and transportation sectors

    June 28, 2025

    Prolific cybercrime gangs currently targeting the airline and transportation sector

    June 27, 2025

    US and French authorities confirm arrest of a violation form hacker

    June 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    At every stage of TechCrunch, Charles Hudson tells us what investors really see

    June 30, 2025

    From $5 to Financial Empowerment: Why Stash co-founder Brandon Krieg is a must-see for TechCrunch All Stage 2025

    June 30, 2025

    A comprehensive list of 2025 tech layoffs

    June 30, 2025

    How to prepare for a second semester salary increase now live in 2025

    June 30, 2025

    Tiffany is lucky to have won a VCS at TC at every stage.

    June 30, 2025
TechBrunchTechBrunch

AWS has launched Mithra to identify and mitigate malicious domains across large systems.

TechBrunchBy TechBrunchAugust 5, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Defending a company the size of Amazon is a daunting task, with so many bad actors targeting the company and its customers. Over the years, Amazon has developed a variety of strategies to identify and mitigate risks to its network, from machine learning and monitoring tools to old-fashioned phone calls.

The company on Monday unveiled a comprehensive platform called “Mithra” that is built for Amazon's scale. The key technology behind the solution is a massive graph database with 3.5 billion nodes and 48 billion edges, according to Amazon CISO CJ Moses.

Simply put, Moses says, Mithra is essentially a big funnel: “You have to narrow down a lot of data to a very small amount of data. The deeper you go into the funnel, the more humans can get involved and make the final decision on what to do,” Moses told TechCrunch.

If the software has a strong signal that a domain is fraudulent, sometimes a human doesn't even need to be involved in the decision-making. At Amazon's scale, it's important to keep humans out of the loop when possible. “Once we get high confidence that a domain is fraudulent, we can take that data and move it very quickly directly into systems that protect our environment,” Moses says.

This could include using a web application firewall (WAF), Amazon GuardDuty, the company's threat detection system, or, if necessary, forwarding the domain in question to the AWS Security Services team for further investigation. Moses says that combining Mithra with the company's network monitoring platform, Sonaris, “builds a really good web of defense around your AWS and Amazon environments.”

Amazon's scale is unique: Moses says the company handles a quarter of all Internet traffic every day, “monitoring up to 200 trillion DNS requests in one AWS region alone. Mithra detects an average of 182,000 new malicious domains every day.”

Historically, the company has used a combination of AI, ML, algorithms, monitoring, and other tools, but as it grew and scaled, it realized it needed a single, dedicated platform to monitor its systems for malicious domains and eliminate them where possible. Enter Mithra.

Of course, AI plays a big role in a system this large, and the company couldn't handle such a large graph database without it. “In fact, in this case, or many cases like this, AI is the type of technology we want to use to look at these huge amounts of data and identify what might be interesting to us across that data,” Moses said. “And we can certainly train it to look for anomalies, or things that are outside the norm, or things that we might have previously considered malicious.”

AI models also help humans make better decisions: “Should I block this domain? We have a ton of data collected from Mithra, Sonaris and other threat sensors, and we synthesize that with AI to make recommendations to various systems that take defensive action,” Moses said.

The role of generative AI is to allow threat analysts who are doing threat hunting to interact with the data in plain language and get answers that help them better understand the situation. Whereas previously you would have had to run scripts, generative AI allows you to understand what's going on more quickly.

Sometimes it's not about shutting down a domain or how sophisticated the technology is, but about being able to pick up the phone and reach a fellow CISO and tell them what his team is seeing. “One of our biggest investments has been to establish a very actionable CISO network and be able to pick up the phone and reach someone at 2 a.m., even if they're not one of our customers, so it's not a cold call,” he says.

Mithra officially launched on Monday and will run on Amazon's internal systems rather than being a service that customers pay for directly.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

US government overthrows North Korea's major “workers” management

June 30, 2025

Mexican drug cartel hackers spy on FBI officials' phones to track and kill informants, the report says

June 30, 2025

FBI, cybersecurity firms say prolific hacking crews are currently targeting airlines and transportation sectors

June 28, 2025

Prolific cybercrime gangs currently targeting the airline and transportation sector

June 27, 2025

US and French authorities confirm arrest of a violation form hacker

June 26, 2025

Homeland Security warns about Iran-backed cyberattacks targeting US networks

June 26, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Instagram lets you share Spotify songs with your story to your sound

June 30, 2025

At every stage of TechCrunch, Charles Hudson tells us what investors really see

June 30, 2025

Baidu’s AI Breakthrough Hasn’t Been Priced In — Why BIDU Could Hit $120 Soon

June 30, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.