  {"id":29938,"date":"2018-11-12T21:39:46","date_gmt":"2018-11-13T02:39:46","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/"},"modified":"2018-11-12T21:39:46","modified_gmt":"2018-11-13T02:39:46","slug":"cloudflare-using-machine-learning-to-secure-against-cyber-attacks","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/","title":{"rendered":"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS"},"content":{"rendered":"<p>Today, it\u2019s almost impossible to succeed in business without holding some aspects of your processes online. Whether it is storing company data on the backend, or offering the convenience of e-commerce transactions, each process is vulnerable to penetration by hackers or a bug that exposes key information. That is why detecting vulnerabilities and redirecting illegitimate traffic on a network before it has a chance to affect your systems is key to business performance. However, with the changing landscape and increasing complexity of network infrastructure, now more than ever it\u2019s difficult to find these weaknesses. There is just too much information to synthesize for humans to monitor traffic events, and a rule-based algorithm does not sufficiently recognize patterns to secure Internet systems from penetration.<sup>5<\/sup> That is where the startup CloudFlare comes in. CloudFlare\u2019s mission is to build a better Internet, and integral to its success is using machine learning to prevent attacks on the network.<sup>7<\/sup><\/p>\n<p>CloudFlare offers Internet services by sitting between Internet servers, and the customer\u2019s browsing activity to monitor traffic flows between the nodes. Founded in June 2017 and based out of San Francisco, CA, they offer a range of services such as content delivery, web-application firewalls, and denial-of-service (DDoS) Protection (when the cyber attack tries to interrupt the service being provided).<sup>6<\/sup> Beneath these services is the use of machine learning. CloudFlare learns from harmful traffic trying to get onto the network, and continuously updates its algorithm to spread those learnings across the network.<sup>2<\/sup> In this way, the CloudFlare system builds an understanding about what expected behavior should be on the system, so that when unexpected traffic hits the network, it will both stop the intrusion and integrate that pattern into its internal algorithm. This addresses the increasing complexity of today\u2019s environment since the machine-learning algorithm doesn\u2019t need to be told what to look for; instead, it follows an \u201cunsupervised\u201d approach. The developer doesn\u2019t prescribe the algorithm with what an attack will look like but instead the algorithm learns on its own. Machine learning is an important step in the cyber security space as it moves to be <em>proactive<\/em> against vulnerabilities instead of <em>reactive. <\/em>That is, we detect malicious actors within the system before they are able to create harm.<\/p>\n<p>In the next two years, the company is focusing on building out its mobile platform. Just seven months ago, CloudFlare announced their internet service provider platform (otherwise known as a DNS service) that offers privacy of the user\u2019s browsing history. Now they are bringing that to mobile products.<sup>3<\/sup> What makes this product different from its existing products, and other items on the market, is its ability to offer users privacy on their iPhone as well as an extremely fast browsing experience.<sup>6 <\/sup>This is extremely important today with so many transactions occurring on mobile phones, and the need for both speed and protection.<\/p>\n<p>In in the long term, CloudFlare is building relationships with governments to help protect against potential hacks during elections. As of now, ten states implemented CloudFlare services.<sup>6<\/sup> In the next two to ten years, it is likely to see more CloudFlare integration with electoral systems and other high-profile internet connected-systems.<sup>4<\/sup> This comes at a crucial time when it is important to instill trust and security in public systems.<\/p>\n<p>In addition to the steps mentioned above, the company should also focus its attention on protection for IoT devices. Given that so much of its growth comes from businesses expanding their portfolio of networked devices like IoT and other internet-enabled sensors, I recommend that CloudFlare consider how they can provide protection for them.<sup>1<\/sup> This way, they are not just preventing attacks coming into the system, but attacks that can exist within the system as well.<\/p>\n<p>Despite these recommendations, CloudFlare is making great progress to mend the problems that exist in the cyber security space. However, machine learning is just one aspect of the solution. Human error such as weak passwords, can mitigate even the strongest network defense. Thus, if CloudFlare wants to be all encompassing solution for business\u2019 security, it should also address: how are you promoting other security best practices? Another key thing to consider since this is a service that can be purchased, is how are you preventing a hacker from acquiring the product and reverse engineering it? While CloudFlare makes the product easy to acquire, it is important they don\u2019t compromise their product by letting it get into the wrong hands.<\/p>\n<p>Word Count: 744<\/p>\n<p>____________________________________________________________________________________________________<\/p>\n<p>Endnotes<\/p>\n<p><sup>1<\/sup> \u201cAdvanced DDoS Protection and Mitigation.\u201d <em>Cloudflare<\/em>, www.cloudflare.com\/ddos\/.<\/p>\n<p><sup>2<\/sup> Council, Young Entrepreneur. \u201cHow Machine Learning Will Impact Online Security This Year.\u201d <em>Forbes<\/em>, Forbes Magazine, 8 May 2017, www.forbes.com\/sites\/theyec\/2017\/05\/08\/how-machine-learning-will-impact-online-security-this-year\/#1cf11c2c18c3.<\/p>\n<p><sup>3<\/sup> Fagioli, Brian. \u201cCloudflare Launches 1.1.1.1 Consumer DNS Service with a Focus on Privacy.\u201d <em>BetaNews<\/em>, 1 Apr. 2018, betanews.com\/2018\/04\/01\/cloudflare-dns-privacy-four-ones\/.<\/p>\n<p><sup>4<\/sup> Hatmaker, Taylor. \u201cCloudflare Recruits State and Local Governments for Free Election Site Security Program.\u201d <em>TechCrunch<\/em>, TechCrunch, 19 July 2018, techcrunch.com\/2018\/07\/19\/cloudflare-athenian-project\/.<\/p>\n<p><sup>5<\/sup> Mytton, David. \u201cHave the Big Cloud Providers Won the Machine Learning Advantage?\u201d <em>Medium<\/em>, Medium, 4 Dec. 2017, medium.com\/@davidmytton\/have-the-big-cloud-providers-won-the-machine-learning-advantage-c91e8da44f44.<\/p>\n<p><sup>6<\/sup> Whittaker, Zack. \u201cCloudflare Rolls out Its 1.1.1.1 Privacy Service to IOS, Android.\u201d <em>TechCrunch<\/em>, TechCrunch, 11 Nov. 2018, techcrunch.com\/2018\/11\/11\/cloudflare-privacy-dns-service-ios-android\/.<\/p>\n<p><sup>7<\/sup> Zatlyn, Michelle. \u201cThat&#8217;s Freaking Awesome: CloudFlare Automatically Learns How to Stop New Attacks.\u201d <em>The Cloudflare Blog<\/em>, The Cloudflare Blog, 26 Jan. 2018, blog.cloudflare.com\/thats-freaking-awesome-cloudflare-automatical\/.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks got you down? Read how CloudFlare is building better security on the internet. <\/p>\n","protected":false},"author":11213,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","categories":[845,111,346,2312,2297],"class_list":["post-29938","hck-submission","type-hck-submission","status-publish","hentry","category-cybersecurity","category-internet","category-machine-learning","category-privacy","category-security","hck-taxonomy-organization-cloudflare","hck-taxonomy-industry-technology","hck-taxonomy-country-united-states"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2018\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Cyber attacks got you down? Read how CloudFlare is building better security on the internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\\\/\",\"name\":\"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"datePublished\":\"2018-11-13T02:39:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS - Technology and Operations Management","og_description":"Cyber attacks got you down? Read how CloudFlare is building better security on the internet.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/","og_site_name":"Technology and Operations Management","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/","name":"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"datePublished":"2018-11-13T02:39:46+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cloudflare-using-machine-learning-to-secure-against-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"CLOUDFLARE: USING MACHINE LEARNING TO SECURE AGAINST CYBER ATTACKS"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/29938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/11213"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=29938"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/29938\/revisions"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=29938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=29938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}