Is A Great Slicer To Work With
OUT OF CHARACTER INFORMATION
Intent: To create a firewall for my own purposes.
Image Source: N/A
Canon Link: N/A
Permissions: N/A
Primary Source:
PRODUCTION INFORMATION
Manufacturer: Malen/Aladon
Affiliation: Aladon.
Market Status: Closed Market
Model: Mori
Modularity: Modular
Production: Mass Produced
Material: Code. Akama
SPECIAL FEATURES
STRENGTHS
Extremely modular, like most software
Can be used in any form of hardware except bio-comps
Can function in any operating system
Defensive juggernaut
Version for bio computers is immune to mechu-duru.
WEAKNESSES
Dependent on hardware to perform well
Specialized software
No offensive capabilities
DESCRIPTION
Any organization that bases it's operations on the fifth domain, and any slicer worth it's salt will tell you the first, and often the best form of defense is a firewall. Created chiefly by Malen, his firewall's primary purpose is to guard his datapad, and any networks he has from hostile cyber intruders.
The Ephicanthix designed the system to be the best first-defense system possible. It uses a blend of supervised and unsupervised learning algorithms, datasets obtained through open and closed intelligence sources and data to map out the most possible and most commonly used attack vectors, providing a powerful line of defense for whatever it is protecting.
When network traffic comes from another user, the firewall, using galaxy based holonet protocols, gets the packets that come from the other network, and begins to filter them. Analyzing the data transmitted, it, basing it on it's ever-changing firewall rules decides if it will allow the packet in, or not. Malen's firewall also filters through it's open and closed door databases, phising through it's every growing list to see if the packet comes from a hostile network.
Mori also features the ability to masks your Holonet IP address and limit traffic types. With it’s cloud based service, it also features extensive it is virtually immune, in a cloud-based environment to brute force login and DDOS attacks, as it is impossible to render a cloud-based network inactive based on attempting to overload it with traffic.
Furthermore, Mori features a classify algorithm. This allows it to be able to classify threats from the lowest, to high level threats; it also features a deep-learning based network traffic abnormal detection to check for any abnormal traffic. In addition, it is uses other self-learning techniques, including a neutral network, the closest thing to artificial intelligence. This program features many other common features that firewalls has, including blocking traffic from any incoming Holonet website; stopping a program from downloading if it comes from an untrusted source, etc.
A bio-version of the program exists, which is immune to mechu-duru. It is programmed, using the programming language Akama.
This makers it an excellent firewall, and one that serves Malen very well.
Intent: To create a firewall for my own purposes.
Image Source: N/A
Canon Link: N/A
Permissions: N/A
Primary Source:
- Firewall
- Firewall(computing)
- Understanding Evasion Techniques
- Top Tips To Protect Against AET Security Threats
PRODUCTION INFORMATION
Manufacturer: Malen/Aladon
Affiliation: Aladon.
Market Status: Closed Market
Model: Mori
Modularity: Modular
Production: Mass Produced
Material: Code. Akama
SPECIAL FEATURES
- Self-learning.
- Uses a classifier
- Deep packet inspection
- Analyze multiple web-pages to determine security authenticity
- Self-updating firewall rules
- Monitor and regulate incoming/connections and outgoing traffic/connections
- Person using Mori can be able to block a program's ability to connect to computer(local host network) alongside the holonet; furthermore,it can give the user information about the connecting attempt
- Just like someone with root access to a computer, Mori, like many firewalls, can be able to track any attempted intrusions, incoming events, and out going events from people trying to access your computer
- Can block, or alert the user about unauthorized connections, both inbound and outbound.
- Continuously updates itself to combat latest polymorphic signatures, and AET methods.
STRENGTHS
Extremely modular, like most software
Can be used in any form of hardware except bio-comps
Can function in any operating system
Defensive juggernaut
Version for bio computers is immune to mechu-duru.
WEAKNESSES
Dependent on hardware to perform well
Specialized software
No offensive capabilities
DESCRIPTION
Any organization that bases it's operations on the fifth domain, and any slicer worth it's salt will tell you the first, and often the best form of defense is a firewall. Created chiefly by Malen, his firewall's primary purpose is to guard his datapad, and any networks he has from hostile cyber intruders.
The Ephicanthix designed the system to be the best first-defense system possible. It uses a blend of supervised and unsupervised learning algorithms, datasets obtained through open and closed intelligence sources and data to map out the most possible and most commonly used attack vectors, providing a powerful line of defense for whatever it is protecting.
When network traffic comes from another user, the firewall, using galaxy based holonet protocols, gets the packets that come from the other network, and begins to filter them. Analyzing the data transmitted, it, basing it on it's ever-changing firewall rules decides if it will allow the packet in, or not. Malen's firewall also filters through it's open and closed door databases, phising through it's every growing list to see if the packet comes from a hostile network.
Mori also features the ability to masks your Holonet IP address and limit traffic types. With it’s cloud based service, it also features extensive it is virtually immune, in a cloud-based environment to brute force login and DDOS attacks, as it is impossible to render a cloud-based network inactive based on attempting to overload it with traffic.
Furthermore, Mori features a classify algorithm. This allows it to be able to classify threats from the lowest, to high level threats; it also features a deep-learning based network traffic abnormal detection to check for any abnormal traffic. In addition, it is uses other self-learning techniques, including a neutral network, the closest thing to artificial intelligence. This program features many other common features that firewalls has, including blocking traffic from any incoming Holonet website; stopping a program from downloading if it comes from an untrusted source, etc.
A bio-version of the program exists, which is immune to mechu-duru. It is programmed, using the programming language Akama.
This makers it an excellent firewall, and one that serves Malen very well.
Changed market-status to Closed Market.
Updated templates
Made links more clearer by redoing them again
Added bio version by stating in description "A bio-version of the program exists, which is immune to mechu-duru. It is programmed, using the programming language Akama."
Updated material to include programming language Akama
Redid all my links
Added strength, specifically regarding bio-version.
Updated templates
Made links more clearer by redoing them again
Added bio version by stating in description "A bio-version of the program exists, which is immune to mechu-duru. It is programmed, using the programming language Akama."
Updated material to include programming language Akama
Redid all my links
Added strength, specifically regarding bio-version.
Last edited: