Security engineers claimed to have invented an algorithm that will slow down incoming cyber attacks and give system administrators time to shore up their defences.
The claim was made by engineers at the University of Tulsa, who said their algorithm can detect incoming cyber attacks against critical infrastructure, such as power grids, in real-time.
Essentially, the way this algorithm works is to slow down internet traffic, including malicious data, in order to give networks time to deal with attacks.
When the algorithm senses a cyber attack, it sends “hyper-speed signals accelerating ahead of the malicious data packets to mobilise defences.”
“Slowing the malicious traffic by just a few milliseconds will let the hyper-speed commands activate sophisticated network-defence mechanisms,” a Tulsa engineer Dr Sujeet Shenoi was quoted as saying.
The team explained their concept in a paper published in the International Journal of Critical Infrastructure Protection.
“Hyperspeed signalling uses optimal paths to transmit high priority traffic while other traffic is sent along suboptimal (slower) paths. Slowing the traffic ever so slightly enables the faster command and control messages to implement sophisticated network defence mechanisms,” the paper’s abstract read.
“The core defensive capabilities offered by hyperspeed signaling include distributed filtering, teleporting packets, quarantining network devices, tagging and tracking suspicious packets, projecting holographic network topologies and transfiguring networks.”
However, it remains to be seen whether this development could be used in commercial environments. Shenoi admitted “it would not be cheap to convert an existing network into one that can run the Tulsa team’s algorithm”.
However, another group of researchers have reportedly developed software that can effectively monitor itself. According to the New Scientist, this software is being developed by a team led by Jason (not Keanu) Reeves at Dartmouth College in Hanover, New Hampshire.
The software works by monitoring the kernel – the bit of code that mediates between the software on one side and the processor and memory on the other.
“We detect changes in the sequence of code the program runs, ones often introduced by malicious programs. We can also verify the operating system code to see if it has been modified by malware,” Reeves was quoted as saying.
It is feasible that this system, which is set up for power-grid-embedded computers running Linux, could be used to trigger the Tulsa algorithm, Reeves added.
“Our system detects the presence of untrustworthy behaviour and leaves the response up to the administrator,” said Reeves.
Not quite what his namesake Keanu does in the Matrix films, but you get the picture.
Think you know security? Test yourself with our quiz!
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…
View Comments
Did you know that the parenthetical "(not Keanu)" is causing Jason's quote to appear in Google search and is being attributed to the actor? Go to news.google.com and search "keanu reeves."
Haha! Brilliant!