Network World - What if a cloud computing infrastructure could recognize a cyberattack, eliminate it, and never stop working while all that is being done? That's what researchers at MIT, with help from the federal government, are investigating the feasibility of.
Researchers at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) have received funding from the Defense Advanced Research Projects Agency (DARPA) to bring about a cloud infrastructure that could identify cyberattacks and heal itself from any damages.
DARPA has a number of ongoing research projects to develop more secure cloud environments.
"The freedom, fluidity and dynamic platform that cloud computing provides also makes it particularly vulnerable to cyberattacks," according to the laboratory.
As part of the "Cloud Intrusion Detection and Repair" study, MIT researchers hope to fundamentally map how cloud networks are created and operate. Based on that, a set of guidelines will be created for the cloud network to constantly assess itself to see if it is working within those guidelines and return to its normal operating procedure if it is not. The approach is different from other security measures that disable a system when a threat is detected, creating outages, the researchers said.
"Much like the human body has a monitoring system that can detect when everything is running normally, our hypothesis is that a successful attack appears as an anomaly in the normal operating activity of the system," said principal investigator Martin Rinard. "By observing the execution of a 'normal' cloud system we're going to the heart of what we want to preserve about the system, which should hopefully keep the cloud safe from attack."
The study's goal of continuing operations of the system even while under attack are a tenet of CSAIL's research. For example, other ongoing research includes studying vulnerabilities in Java applications and identifying and fixing malware in Android applications, all while the systems continue to operate.
Network World staff writer Brandon Butler covers cloud computing and social media. He can be reached at BButler@nww.com and found on Twitter at @BButlerNWW.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- ESG: The IBM FlashSystem 840: Technical Evolution to Deliver Business Value In this whitepaper, you will learn how this high-speed storage technology has tremendous potential to support I/O-intensive and/or latency-sensitive applications.
- Choosing an MDM Platform: Where to Start the Conversation If you're in the early stages of choosing an MDM solution, or you're considering switching vendors, here are seven critical questions to ask...
- Axeda Platform Technical Overview This paper summarizes the major features of an IoT platform and explains how they simplify and speed the process of developing and deploying...
- Stock Shock: The effect of project and portfolio management on share price In this independent report, you'll see the intrinsic connection between long-term capital investment and short term market performance -- and how this can...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cloud Computing White Papers | Webcasts