|
Description |
MEERKATS is a novel architecture for cloud environments that elevates
continuous system evolution, adaptation, and misdirection as first-rate design
principles. Our goal is to enable an environment for cloud services that
constantly changes along several dimensions, toward creating an unpredictable
target for an adversary. This unpredictability will both impede the adversary’s
ability to achieve an initial system compromise and, if a compromise occurs, to
detect, disrupt, and/or otherwise impede his ability to exploit this success.
Thus, we envision an environment where cloud services and data are constantly
in flux, using adaptive (both proactive and reactive) protection mechanisms and
distributed monitoring at various levels of abstraction. MEERKATS will
effectively exploit “economies of scale” (in resources available) to provide
higher flexibility and effectiveness in the deployment and use of protection
mechanisms as and where needed, focusing on current and anticipated mission
needs instead of an inefficient, “blanket” approach to protecting “everything,
all the time” at the same level of intensity.
Contact:
For more information on MEERKATS contact any of the project's
PIs.
|
|
Latest News |
|
09/19/14 |
New York Times Technology Blog coverage of XRay project:
"XRay: A New Tool for Tracking the Use of Personal Data on the Web,"
Steve Lohr, August 2014.
|
09/03/14 |
Our paper "Model Aggregation for Distributed Content Anomaly Detection" is to appear in the 7th ACM Workshop on Artificial Intelligence and Security (AISec). |
07/24/14 |
Our paper "Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems" is to appear in the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). |
05/27/14 |
Our paper "Unsupervised Anomaly-based Malware Detection using Hardware Features" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
05/27/14 |
Our paper "Synthetic Data Generation and Defense in Depth Measurement of Web Applications" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
|