Active Hackathon

Tech Behind Morpheus, NVIDIA’s AI Cybersecurity Framework

Recently, NVIDIA launched Morpheus, a new open AI application framework powered by NVIDIA GPUs combined with NVIDIA®

BlueField®-3 DPUs detect and prevent cybersecurity breaches instantaneously. NVIDIA Morpheus provides a framework that draws inferences from a large amount of cybersecurity data in real-time.


Sign up for your weekly dose of what's up in emerging technology.

With the launch of Morpheus, NVIDIA is bringing the powers of artificial intelligence to cybersecurity. The highly optimized AI pipeline and pre-trained AI capabilities of Morpheus allow developers to inspect all IP traffic across the data centre fabric instantaneously. 

How does Morpheus work

Morpheus provides a framework to carry out real-time inference across large amounts of telemetry. Thanks to the use of GPUs across the workflow – from data ingestion, into pre-processing, to inference, through post-processing. GPUs keeping all the data end-to-end eliminates expensive serialization and deserialization actions. GPUs offer massive parallelization to move thickets of data through the pipeline. By dividing the data and the actions into manageable batches and executing them concurrently, Morpheus keeps up with data flowing from heterogeneous sources.

Morpheus can perform real-time inference across massive amounts of cybersecurity data and receive network telemetry from the NVIDIA BlueField-2 Smart NIC. Telemetry agents running on the NVIDIA DPU channel data to Morpheus. For sensitive information detection and phishing detection, this is often full packet data. However, this isn’t a one-way stream. Morpheus generates actions from raw inference results that are routed back to the NIC. The actions allow continuous, real-time, and variable feedback to the NIC that can impact policies, rewrite rules, adjust sensing, etc.

 The Morpheus inference pipeline (left side). Source: NVIDIA blog


Morpheus is built on technologies, including RAPIDS, Cyber Log Accelerators (CLX), Triton Inference Server, TensorRT, and cuStreamz. A pub/sub model (currently Kafka) is leveraged to send data to and results from the inference pipeline. The technologies work together to address all parts of the cybersecurity workflow.

Morpheus is a perfect solution for gathering real-time network data from any DPU-powered server in the data centre. NVIDIA BlueField DPU offloads accelerate and isolate mission-critical data centre infrastructure functions. By incorporating the framework into a third-party cybersecurity offering, communication networks can benefit from the world’s best AI computing. Additionally, BlueField DPU goes beyond static security logging to incorporate a sophisticated dynamic real-time telemetry model. Developers can use the models through common deep learning frameworks like Caffe or Theano. The deep learning and machine learning models can be used in a Morpheus pipeline to detect leaked sensitive information, shady profiles, and phishing attempts. 

NVIDIA collaborates with leading platforms and technology partners to optimize their data centre solutions for the NVIDIA Morpheus AI platform. 

“Defending complex and evolving environments requires constant visibility,” said Adam Mishler, chief information security officer at Best Buy. “Providing real-time, dynamic network maps will help identify areas where we can further strengthen our posture and serve as a foundation for enhancing ML-based anomaly detection. The NVIDIA Morpheus framework helps provide a flexible and scalable platform for anomaly detection capable of adapting with the ever-changing cyber-threat landscape.”

Spunk’s senior vice president and Chief technology officer said with the Morpheus framework, the company can rapidly prototype new capabilities and offload compute-intensive tasks to GPUs to benefit its customers.

Cybersecurity breaches have gone up drastically, especially post-pandemic. Despite many advances in cybersecurity, it remains primarily reactive. Meaning, most of the remediation happens after the fact. The average time to scope out a breach is around 200 days, while the fixing takes 70 days. Frameworks like Morpheus can save significant downtime and, by extension, a lot of money and resources. Moreover, Morpheus is extensible. Developers can deploy their models using this framework and build on the work they have already invested in.

More Great AIM Stories

Ritika Sagar
Ritika Sagar is currently pursuing PDG in Journalism from St. Xavier's, Mumbai. She is a journalist in the making who spends her time playing video games and analyzing the developments in the tech world.

Our Upcoming Events

Conference, in-person (Bangalore)
Cypher 2022
21-23rd Sep

Conference, in-person (Bangalore)
Machine Learning Developers Summit (MLDS) 2023
19-20th Jan

Conference, in-person (Bangalore)
Data Engineering Summit (DES) 2023
21st Apr, 2023

3 Ways to Join our Community

Discord Server

Stay Connected with a larger ecosystem of data science and ML Professionals

Telegram Channel

Discover special offers, top stories, upcoming events, and more.

Subscribe to our newsletter

Get the latest updates from AIM

Council Post: Enabling a Data-Driven culture within BFSI GCCs in India

Data is the key element across all the three tenets of engineering brilliance, customer-centricity and talent strategy and engagement and will continue to help us deliver on our transformation agenda. Our data-driven culture fosters continuous performance improvement to create differentiated experiences and enable growth.

Ouch, Cognizant

The company has reduced its full-year 2022 revenue growth guidance to 8.5% – 9.5% in constant currency from the 9-11% in the previous quarter