Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

AI-Predictive Threat Prevention Overview

AI-Predictive Threat Prevention uses artificial intelligence (AI) on packet snippets to predict and prevent both known and zero-day malware on the wire. By actively distinguishing and ignoring non-threatening activities, this system significantly reduces false positives. It enables human experts to concentrate on more critical security tasks and identify genuine, dangerous threats throughout the entire attack life cycle. This process continuously safeguards the network from initial and subsequent attacks.

Users today are increasingly on the move, requiring fast and secure network access from any location. This heightened mobility raises malware vulnerability, as network security administrators often have limited control over the networks users connect to for accessing corporate resources. Therefore, it is crucial to implement a network security solution that is innovative, swift, and adept at detecting and preventing malware. This topic explores how Juniper Networks' AI-Predictive Threat Prevention, a security solution powered by artificial intelligence (AI) and machine learning (ML), functions.

Juniper Networks' AI-Predictive Threat Prevention is an advanced malware detection and prevention solution designed to safeguard your network against threats arising from users accessing corporate resources from various locations and browsing the Internet to many destinations. Powered by artificial intelligence (AI) and machine learning (ML), this intelligent security solution enhances the ability to predict and identify genuine threats more swiftly, allowing human experts to concentrate on strategic security initiatives.

AI-Predictive Threat Prevention includes the following features:

  • Anti-malware prevention—AI-Predictive Threat Prevention offers effective anti-malware capabilities, scanning vast amounts of data across the network. Traditional solutions require a complete file to determine whether it is malicious. Additionally, the traditional detection process often necessitates enabling a TCP proxy, which can slow down firewall throughput performance. Juniper Networks' organically built anti-malware solution employs a proxy-less architecture with AI to detect threats efficiently.

  • AI-generated custom signatures—Organizations can leverage AI-Predictive Threat Prevention in conjunction with an advanced anti-malware solution to generate custom signatures tailored to their specific environment. Unlike other technologies, AI-Predictive Threat Prevention ensures that these signatures remain active throughout the attack life cycle. This AI-driven anti-malware solution continuously updates threat signatures, detects abnormal behavior patterns, and offers robust protection against subsequent attacks. As a result, security teams can identify potential threats more quickly and efficiently.

Use Feature Explorer to confirm platform and release support for specific features.

For information about licenses for your supported platforms, see Software Licenses for SRX Series Firewalls.

Benefits

  • Active threat detection for known and unknown threats

  • Improved throughput

  • Reduced false positives by filtering out non-threatening activities

  • Analysis based on AI and ML in addition to autogenerated signatures

Solution

Flow-based Antivirus Scanning

Starting in Junos OS Release 23.4R1, you can use the flow-based antivirus solution to scan your network traffic and prevent threats in real time using a unified pattern-matching engine.

The flow-based antivirus scanning is an organically built solution that operates at line rate, providing superior efficacy and rapid response to ongoing attacks without compromising performance. Utilizing a proxy-less architecture, it intelligently detects malware by scanning packets as they stream in, without requiring full file downloads. It comprises Juniper Networks curated signatures, which are continuously updated from Juniper ATP Cloud and distributed via Juniper Networks' content delivery network (CDN).

With the flow-based antivirus solution, you can enable inline blocking capabilities that are based on threat intelligence and recent threat detection events across all Juniper’s ATP Cloud customer base.

To enforce a flow-based antivirus solution, you must install the Juniper Antivirus license, Juniper AV and enable the antivirus policy. For more information, see Configure Flow-Based Antivirus Policy.

Machine-Learning-based Threat Detection

Starting in Junos OS Release 24.2R1, you can configure machine learning (ML)-based threat detection for zero-day threats.

The ML-based threat detection scans files inline on your firewall and blocks infected files before they are downloaded. This threat detection process occurs without internet access, and requires only a small section of the file to return a verdict.

ML-based threat detection is enabled on your firewall when the scan engine binary file is automatically downloaded from the Juniper Networks content delivery network (CDN) server to your firewall. By default, an ML model binary file is automatically downloaded from the CDN server to your firewall device, generally once a week.

To implement machine-learning-based threat detection, you must install the Juniper Antivirus license, Juniper AV and enable machine learning. For more information, see Configure Machine Learning-Based Threat Detection.

Workflow

Here is a high-level workflow for AI-Predictive Threat Prevention:

Figure 1: AI-Predictive Threat Prevention AI-Predictive Threat Prevention
Table 1: AI-Predictive Threat Prevention Workflow

Step

Description

1 The client configures the antivirus policy and CDN server URL on SRX Series Firewall to receive the latest antivirus signatures and machine learning scan engine updates from the CDN server.
2 The client requests a file to be downloaded from the Internet.
3

As the file passes through the SRX Series Firewall, some portions of the file are matched against the latest antivirus signatures that are received from the CDN server. If a matching signature is found, the file can be blocked and not allowed to be downloaded, depending on the policy action.

For .exe and .dll file types, if no matching antivirus signature is found, the machine learning scan engine analyzes the file inline on the SRX Series Firewall and immediately provides a verdict. Based on this verdict, the SRX Series Firewall can block any infected files before they are downloaded, depending on the policy action.

Note:
  • If the SRX Series Firewall is enrolled to Juniper ATP Cloud, then in addition to flow-based antivirus scanning and ML-based threat detection, the file is also submitted to Juniper ATP Cloud for analysis.

  • You can configure AI-Predictive Threat Prevention on the SRX Series Firewall without enrolling to Juniper ATP Cloud.

Personas

Table 2: Personas and benefits

Personas

Benefits

Chief information security officer (CISO)

  • Significantly reduced risk of a successful attack or breach— The AI-powered solution identifies and averts potential threats.

  • Minimal impact on user experience— Active threat detection at line rate ensures user experience is not impacted by proxying, threat sandboxing, and so on.

  • Improve resource efficiency— Prioritizing threats based on AI insights allows for a more efficient allocation of security resources.

InfoSec director

  • More time for strategic initiatives— Proactive threat identification and mitigation reduces risk, improves overall security, and frees up resources.

  • Enhanced credibility and visibility— You can spend more time on achieving strategic quantifiable business outcomes that senior leadership recognizes.

  • Stronger team performance— Automation and AI-driven efficiency enables personnel to focus on more complex tasks.

InfoSec architect

  • Reduced stress— AI-powered threat prevention can alleviate the pressure of staying ahead of emerging threats.

  • Enhanced detection accuracy— Industry-leading efficacy means less time wasted pursuing false positives.

  • Faster/real-time response— The ability to detect and block zero-day threats in real time minimizes downtime and fire-drills.

Network architect

  • Faster real-time response—The ability to detect and block zero-day threats in real time minimizes downtime and fire drills.

  • Less time spent following up with infosec teams—Fewer threats reduce efforts of infosec experts.

Use Cases

AI-Predictive Threat Prevention is ideal for customers who need to protect their business assets from today’s advanced cyber threats, especially in the following use cases:

  • Campus

  • Enterprise

  • Data center

  • Public, private, and hybrid cloud

  • Service provider

Solution Comparison Matrix

Here’s a comparison table that outlines key features and differences between Juniper ATP Cloud, flow-based antivirus solution, and machine learning-based security solution.

Table 3: Solution Comparison Matrix

Requirements

Juniper ATP Cloud

Flow-Based Antivirus

ML-Based Threat Detection

Services

Advanced anti-malware

Static antivirus engine with frequent signature updates

Static antivirus engine with frequent signature updates + ML scan engine

File submission

Cloud

Block mode, no submission to cloud

Block mode, no submission to cloud

Internet access

Access required for feature to function

Required to download antivirus database from Juniper CDN server.

Required to download ML models from Juniper CDN server.

AAMW role

Works with cloud to download AI-generated signatures.

Works offline after database download

Works offline after ML engine download

CLI configuration

set services advanced-anti-malware set services anti-virus set services anti-virus policy <policy name> machine-learning-scan

Supported protocols

HTTP and HTTPS

IMAP and IMAPS

SMTP and SMTPS

SMB

HTTP and HTTPS

IMAP and IMAPS

SMTP and SMTPS

SMB

HTTP and HTTPS

IMAP and IMAPS

SMTP and SMTPS

SMB

Supported release See Feature Explorer See Feature Explorer See Feature Explorer

Juniper ATP Cloud enrollment

Yes

Not required

Not required

Summary Leverages cloud infrastructure for scalability and quick response times. Offers a combination of signature-based and behavior analysis for detecting threats. Primarily relies on signature-based detection and flow inspection. Easier to deploy; performs frequent signature updates. Uses advanced algorithms for anomaly detection and pattern recognition, offering robust protection against both known and unknown threats. Provides real-time analysis and adapts over time to new threats.

You can choose a solution that aligns with the specific needs, infrastructure, and resources of your organization, or you can layer these solutions for more effective enforcement. Apply all of these solutions in a security policy.

What's Next?

In the next section, you'll learn how to configure flow-based antivirus and ML-based threat detection on your security device.