Sunday, October 1, 2023
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result

Project Gives Computers a More Powerful Way to Detect Threats

by DefenceTalk
September 24, 2012
in Technology News
2 min read
0
Cyberattacks expose network vulnerability
14
VIEWS

UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction.

The technique has been dubbed “space travel” because it sends computer data to a world outside its home, and bridges the gap between computer hardware and software systems.

“Space travel might change the daily practice for many services offered virtually for cloud providers and data centers today, and as this technology becomes more popular in a few years, for the user at home on their desktops,” said Dr. Zhiqiang Lin, the research team’s leader and an assistant professor of computer science in the Erik Jonsson School of Engineering and Computer Science.

As cloud computing is becoming more popular, new techniques to protect the systems must be developed. Since this type of computing is Internet-based, skilled computer specialists can control the main part of the system virtually – using software to emulate hardware.

Lin and his team programmed space travel to use existing code to gather information in a computer’s memory and automatically transfer it to a secure virtual machine – one that is isolated and protected from outside interference.

“You have an exact copy of the operating system of the computer inside the secure virtual machine that a hacker can’t compromise,” Lin said. “Using this machine, then the user or antivirus software can understand what’s happening with the space traveled computer setting off red flags if there is any intrusion.

Previously, software developer had to write such tools manually.

“With our technique, the tools already being used on the computer become part of the defense process,” he said.

The gap between virtualized computer hardware and software operating on top of it was first characterized by Drs. Peter Chen and Brian Noble, faculty members from the University of Michigan.

“The ability to leverage existing code goes a long way in solving the gap problem inherent to many types of virtual machine services,” said Chen, the Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, who first proposed the gap in 2001.

“(Yangchun) Fu and Lin have developed an interesting way to take existing code from a trusted system and automatically use it to detect intrusions.”

Lin said the space travel technique will help the FBI understand what is happening inside a suspect’s computer even if he is physically miles away, instead of having to buy expensive software.

Space travel was presented at the most recent IEEE Symposium on Security and Privacy. Lin developed this with Yangchun Fu, a research assistant in computer science.

“This is the top conference in cybersecurity, said Bhavani Thuraisingham, executive director of the UT Dallas Cyber Security Research and Education Center and a Louis A. Beecherl Jr. Distinguished Professor in the Jonsson School.

“It is a major breakthrough that virtual developers no longer need to write any code to bridge the gap by using the technology invented by Dr. Lin and Mr. Fu. This research has given us tremendous visibility among the cybersecurity research community around the world.”

Source: Computer science at UT Dallas

Tags: cloudcloud computingComputersdetectionsecuritythreatsVirtualization
Previous Post

KC-46 enters critical design review phase

Next Post

Protection from biological agents is Army scientist’s mission

Related Posts

Trump order targets Chinese internet giants TikTok, WeChat

TikTok hit with UK fine, Australia government ban

April 6, 2023

TikTok was dealt fresh setbacks Tuesday as Australia joined a list of Western nations banning the Chinese-owned apps from government...

Officials provide details on building the Space Force, its structure, and operating imperatives

Reagan’s ‘Star Wars’ at 40: Battle of the satellites

March 23, 2023

Forty years after US president Ronald Reagan stunned the nation and world with his "Star Wars" plan to take nuclear...

Next Post
Protection from biological agents is Army scientist’s mission

Protection from biological agents is Army scientist's mission

Latest Defense News

First Shipment of New Gepard Ammunition Now on its Way to Ukraine

First Shipment of New Gepard Ammunition Now on its Way to Ukraine

September 6, 2023
China will ‘never commit to abandoning the use of force’ on Taiwan: Xi

China warns against ‘new Cold War’ as big powers meet in SE Asia

September 6, 2023
US sending 3,000 more troops to Poland, as Ukraine tension rises: senior official

Poland to spend over 4% of GDP on defence in 2024

September 6, 2023
North Korea pursues weapons despite Covid blockade: UN report

North Korea to pay ‘price’ if it gives Russia arms: US

September 6, 2023
USAF F-16 fleet undergoing largest modification work in history

Russia says F-16 fighter jets in Ukraine will be seen as ‘nuclear’ threat

July 13, 2023
North Korea says conducted new test of solid-fuel ICBM

North Korea says conducted new test of solid-fuel ICBM

July 13, 2023

Defense Forum Discussions

  • The Russian-Ukrainian War Thread
  • Marine Nationale (French Navy)
  • Royal New Zealand Navy Discussions and Updates
  • Royal Australian Air Force [RAAF] News, Discussions and Updates
  • Royal Australian Navy Discussions and Updates 2.0
  • Indonesian Aero News
  • NATO
  • United States Marine Corps
  • Russia - General Discussion.
  • USAF News and Discussion
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com