Cloud Virus 300x215 A Self Healing Security System against Cloud Computing VirusesTremendous efforts are being placed by the researchers at the Computer Science Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology to design a new security system against cloud computing viruses. Their aim is to create an environment where the computing system will heal by itself just like how it is with viruses inside the human body that are self-limiting and are self-healing. The objective is to design a process that will immediately recognize any cyber attack and to arrest its destructive action or to disable it at its outset. This way the cloud environment will not have to shut down and recovery is possible in an instant.

Funding for the research will come from the Department of Defense (DoD) and the legwork is in cooperation with the Defense Advanced Research Project Agency (DARPA) Mission-oriented Resilient Clouds (MRC) project.

The Center for Resilient Software (CRS) is also doing a similar project where they are trying to design a system that will immediately identify a security breach and defend the system as early as its start. The project could be the beginning of a new era in cloud computing security.

It is a work in progress, but shows impressive developments. To make this possible, researchers from various MIT organizations are drafting a guideline enabling cloud network’s normal system function, in spite of obvious virus attacks. Just like how fighting cells attack the viruses that enter the human body, this new security system will immediately apprehend unwelcome intruders. At CSAIL, this project is called the Cloud Intrusion Detection and Repair project.

Principal investigator at CSAIL, Pofessor Martin Rinard said, “Much like the human body has a monitoring system that can detect when everything is running normally, our hypothesis is that a successful attack appears as an anomaly in the normal operating activity of the system. By observing the execution of a ‘normal’ cloud system we’re going to the heart of what we want to preserve about the system, which should hopefully keep the cloud safe from attack.”

The CSAIL study entitled, “Cloud Intrusion Detection and Repair” expects to map and to build a matrix of how networks are created and how they operate. This will be the basis of the new cloud security guideline. The objective is to continuously assess and monitor the entire cloud network while systems are in operation, and to detect any threats then disable them immediately. This way, operations are not interrupted and unnecessary power outages minimized.

The complexity of the dynamics of the cloud platforms makes it a popular target for viruses and the only way to understand the entire cloud environment is to have a good grasp of how it operates.

“The freedom, fluidity and dynamic platform that cloud computing provides also makes it particularly vulnerable to cyberattacks,” according to the CSAIL.


Hottest IT Skills in 2013 – Cloud, Mobile and BI
In 2012, more than 1.7 million jobs in the field of cloud computing remained unoccupied, according to analysts firm IDC. READ MORE
How Cloud Computing Influences Digital Marketing
Cloud marketing has the ability to drastically change the ways in which they reach and engage their audience, particularly with regard to distributing and storing mission-critical data. READ MORE
Gartner: BYOD to Take Center Stage For Mobile App Use by 2017
More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety. READ MORE
Maturity in the Cloud: Start Thinking Like a Grown-Up
Despite the inclination to wait until all of the cloud’s kinks have been worked out, holding off on cloud initiatives until the industry matures won’t guarantee success. READ MORE
PwC: Cloud, SaaS and Mobile Are Changing Software Industry
The software industry is undergoing major changes by trends such as cloud, SaaS, mobile technology and the “consumerization of IT”. READ MORE
10 Cloud Computing Game Changers
Here are the ten most influential cloud computing companies, and the reason why. READ MORE