. Military Space News .
CYBER WARS
Army researcher minimizes the impact of cyber-attacks in cloud computing
by Staff Writers
Adelphi MD (SPX) Oct 19, 2018

file illustration only

Through a collaborative research effort, an Army researcher has made a novel contribution to cloud security and the management of cyberspace risks.

According to U.S. Army Research Laboratory electronics engineer Dr. Charles Kamhoua, technology has been the cause of many changes. Among the changes made are to our language.

"No longer does the word "cloud" merely stand for a type of atmospheric phenomena," Kamhoua said. "Today, the word "cloud" denotes the computational cloud as well."

Like the atmospheric clouds, noted Kamhoua, computational clouds are found to be abundant and ubiquitous, and this has allowed them to change people's view of computing.

"It has made computing a utility - much like water and power," Kamhoua said.

The National Institute of Standards and Technology defines cloud computing as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction."

According to the researchers, among the multiple benefits that have emerged from a computational cloud meeting these NIST-defined properties are: lower costs, a pay-as-you-go structure, quick deployment, ease of access, dynamic scalability of resources on demand, low overhead and no long-term commitments.

"These benefits are consistent with people's expectation of a general utility - benefits derived from a community's sharing of resources in a well-governed manner," Kamhoua said. "However, there are significant risks associated with using the computational cloud."

Kamhoua said one of the biggest cyber security concerns is the inherent and unknown danger arising from a shared platform, namely the hypervisor.

According to Kamhoua, one can think of the hypervisor as the infrastructure that is the basis for the cloud's utility - it is a shared resource where all users interface and connect.

Users of the cloud have virtual machines, a simulation of a physical computer, to carry out their computations, and each VM runs on a central shared resource - the hypervisor.

"Herein lies the unseen danger: an attacker can target an unsecured VM, and once that VM is compromised, the attack can move on to compromise the hypervisor," Kamhoua said. "At that point, the utility of a shared resource of the hypervisor has tipped toward the attacker because once the hypervisor is compromised, all other virtual machines on that hypervisor are easy prey for the attacker."

A shared platform emphasizes a problem referred to as negative externalities.

"In this case, the negative externality manifests as the (in)security of one virtual machine affecting the security of all other co-located virtual machines," Kamhoua said.

This security challenge attracted a research team including Kamhoua and researchers from the University of Florida, Haloed Sun TEK of the CAESAR Group and Syracuse University.

"Due to the unique structuring of the competing interests in the cloud, our research team evaluated the problem in question using game theory, which, according to Myerson, in his landmark book "Game Theory: Analysis of Conflict," is the study of mathematical models of conflict and cooperation between intelligent rational decision-makers," Kamhoua said.

Their research arrived at a non-intuitive conclusion that improves upon current cloud security approaches.

They created an algorithm that, by assigning VMs to hypervisors according to game-theoretically-derived guidelines, makes the attacker indifferent as to which hypervisor to attack.

"The importance of attaining this outcome is this: in cybersecurity, attacker indifference makes a big difference," Kamhoua said. "By compelling the attacker to be inattentive to any single target, the research team made a novel contribution to cloud security."

According to Kamhoua, this research reinforces the widely-held understanding that risk in cyberspace can never be eliminated, so it must therefore be rigorously managed. It is advantageous for VMs having the same level of security and risk to be clustered together on the same hypervisor.

Their result's underpinnings in game theory lend credence to the notion that effective information assurance requires mathematics and not merely software tools.

"This research reveals a novel virtual machine allocation scheme that can provide the necessary incentive for a large organization with sensitive information such as the Department of Defense to join the cloud," Kamhoua said. "A quantitative approach to cloud computing security using game theory captures the strategic view of attackers and gains a precise characterization of the cyber threats facing the cloud".

"This research arms cloud service providers that contract with the DOD with a proven mathematical framework to minimize the impact of cyberattacks in the cloud," Kamhoua said. "This allow Soldiers with lightweight mobile devices on tactical networks to securely perform fast computation leveraging the cloud."

Details of this research are presented in the book chapter "Risk and Benefit: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud" by Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, in the book "Assured Cloud Computing," Edited by Roy H. Campbell, Charles A. Kamhoua, and Kevin A. Kwiat, Published by Wiley-IEEE press, October 2018.


Related Links
US Army Research Laboratory
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Twitter releases 10 million tweets from foreign influence efforts
Washington (AFP) Oct 17, 2018
Twitter on Wednesday released data on foreign influence campaigns on its platform showing some 10 million tweets, mostly from Russia, dating back as far as 2009. California-based Twitter said it was releasing detailed data on previously disclosed misinformation efforts to allow researchers to gain more insight into the campaigns. "In line with our strong principles of transparency and with the goal of improving understanding of foreign influence and information campaigns, we are releasing the fu ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Lockheed Martin Delivers 300th THAAD Interceptor

Lockheed Martin selects payload providers for OPIR missile warning system

Raytheon receives contract for new AEGIS radars

Raytheon receives $1.5B contract for Patriot systems for Poland

CYBER WARS
Lockheed tapped for JASSM production for foreign military sales

Russia completed S-300 delivery to Syria: defence minister

Russia, India set to sign S-400 deal; Russia completed S-300 delivery to Syria

US, Chinese unease as Putin seeks India arms deals

CYBER WARS
DARPA seeks proposals for 3rd OFFSET Swarm Sprint, awards 2nd Contracts

AeroVironment contracted for Raven drones, spares, training

Airbus, Boeing and Uber partner with Amsterdam Drone Week

Air Force designates GO1 hypersonic flight research vehicle as X-60A

CYBER WARS
ESA selects Satconsult to design new approach to scheduling secure satcom resources

Multi-domain command and control is coming

Airbus tests 4G 5G stratospheric balloons for defence comms

Lockheed Martin embraces agile software development to evolve signals intelligence capabilities

CYBER WARS
Too fat to fight: Pentagon grapples with obesity epidemic

BAE tapped by U.S. Army for 155mm BONUS ammunition

BAE to deliver 18 Howitzer artillery guns to U.S. Army

Russia accuses US of running bio arms lab in Georgia

CYBER WARS
Harris, L3 merger creates 6th largest U.S. defense contractor

US's Harris, L3 merging to form a defense-technology giant

Portugal's defence minister resigns over arms theft scandal

Germany open to selling arms to Saudis despite Yemen war

CYBER WARS
Japan protests China ships near disputed isles ahead of Abe visit

China woos Bhutan, to India's displeasure

Beijing ready to improve soured American military ties: US

US defence chief Mattis says Trump is '100 percent' with him

CYBER WARS
Big discoveries about tiny particles

Precise control of multimetallic one-nanometer cluster formation achieved

Two quantum dots are better than one: Using one dot to sense changes in another

Nucleation a boon to sustainable nanomanufacturing









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.