AWS unveils a monster security system to keep it safe from threats

AWS logo
(Image credit: AWS)

Amazon Web Services (AWS) has unveiled a new large-scale security system designed to keep its cloud services secure.

The Mithra system uses an internal neural network graph model with 3.5 billion nodes and 48 billion edges to spot and rank the trustworthiness of domains and identify potential threats.

Considering a single AWS region can see up to 200 trillion DNS requests in one day, the size of this monster security system is no surprise, and it can detect 182,000 new malicious domains per day.

Monster Mithra

Once Mithra identifies a domain queried within AWS, it will assign it a trustworthiness score, removing the need to rely on third parties. Not only does this remove potential supply chain threats, it also helps AWS maintain a high-quality list of malicious domains to observe, and therefore observe cybercriminal behavior.

The massive neural network graph (which AWS says could be one of the largest in existence) detects malicious domains with a high level of accuracy, and can even predict malicious domains days, weeks and months before they appear on the threat feeds of third party security providers.

Mithra can therefore provide a constantly updated list of malicious domain names for security providers to monitor and block. The list can also be supplied to third party threat feeds in order to reduce false positives, and Mithra’s detection of millions of security events per day can be used by AWS security analysts for investigations and additional context.

The notifications provided by Mithra to organizations of a potential cyber attack from a malicious domain include recommendations on response, such as checking security logs for activity from specific domains and blocking them, and moving infrastructure behind a firewall.

"We are encouraged by how our efforts to share our threat intelligence have helped customers and other organizations be more secure, and we are committed to finding even more ways to help," Amazon Chief Information Security Officer CJ Moses said in a blog post unveiling the internal tool.

More from TechRadar Pro

Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
Concept art representing cybersecurity principles
“Everything starts with security" - AWS CISO on how making security simple can be the key to safety
A hand reaching out to touch a futuristic rendering of an AI processor.
Google Cloud unveils new AI Protection security tools, no matter which model you use
ID theft
New Androxgh0st botnet targets vulnerabilities in IoT devices and web applications via Mozi integration
An image of network security icons for a network encircling a digital blue earth.
Standing strong against hyper-volumetric DDoS attacks
An abstract image of digital security.
Identifying the evolving security threats to AI models
Latest in Pro
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Racks of servers inside a data center.
Modernizing data centers: an efficient path forward
Dr. Peter Zhou, President of Huawei Data Storage Product Line
Why AI commonization is so important for business intelligent transformation and what Huawei’s data storage has to offer
Wix automation
The world's leading website builder aims to save businesses time with new tool
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over