Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)
Implementing new technologies to create a more resilient, secure cloud computing environment.
This research investigates a new vision for increasing the resilience of computing clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud's infrastructure. The work is motivated by the fact that today's clouds are very static, uniform, and predictable, allowing attackers who identify a vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. The goal is to integrate into clouds a new level of unpredictability for both their services and data so as to both impede an adversary's ability to achieve an initial system compromise and, if a compromise occurs, to detect, disrupt, and/or otherwise impede their ability to exploit this success.
As a step toward this vision, a broad set of new technologies that add continuous change, deception, and unpredictability to cloud environments were designed, implemented, evaluated, and in some cases deployed. These technologies present significant advances along five major directions:
- continuous migration technologies that can enable for the first time the swift migration of cloud-resident services and data either in response to an attack or continuously so as to present a moving-target defense;
- cloud information flow tracking technologies that can track cloud- resident data at larger scales than ever before, enabling cloud users (e.g., service administrators) to audit the flow of their information in the cloud;
- misinformation and decoy technologies that can automatically generate deceptive information – bogus information that appears genuine – so as to confuse, bait, and track attackers;
- cloud monitoring and self-healing technologies that can integrate information from many sensors spread across the cloud to detect complex, multi-stage attacks;
- stable multithreading technologies that can reduce the security risks posed by concurrent programs by ensuring that upon every execution, a program takes one of a few pre-checked schedules that have already been validated as safe; and
- hardware-enhanced memorization technologies that enable efficient execution of highly replicated environments.
This work was done by Roxana Geam-basu, Dimitris Mitropoulos, Simha Sethu-madhavan, and Junfeng Yang of Columbia University; Angelos Stravrou and Dan Fleck of George Mason University; and Matthew Elder and Azzedine Benameur of Symantec for the Air Force Research Laboratory. AFRL-0245
This Brief includes a Technical Support Package (TSP).

Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)
(reference AFRL-0245) is currently available for download from the TSP library.
Don't have an account?
Overview
The document titled "Maintaining Enterprise Resiliency via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)" presents a comprehensive exploration of advanced technologies aimed at enhancing the resilience of cloud environments against a variety of threats. The report outlines a series of innovative strategies that focus on continuous change, deception, and unpredictability to bolster cloud security.
Key advancements discussed in the report include:
-
Continuous Migration Technologies: These technologies enable the rapid migration of cloud-resident services and data in response to attacks or as a proactive measure, effectively creating a moving-target defense. This approach complicates attackers' efforts by constantly altering the environment.
-
Cloud Information Flow Tracking: The report introduces technologies capable of tracking cloud-resident data at unprecedented scales, enhancing visibility and control over data flows within cloud infrastructures.
-
Misinformation and Decoy Technologies: The development of automated systems that generate deceptive information aims to confuse and mislead attackers. By creating bogus yet convincing data, these technologies can bait attackers and facilitate tracking their activities.
-
Cloud Monitoring and Self-Healing Technologies: These systems integrate data from multiple sensors to detect complex, multi-stage attacks. They are designed to respond dynamically to threats, ensuring that cloud services can recover and maintain functionality even under attack.
-
Stable Multithreading Technologies: This innovation addresses security risks associated with concurrent programming by ensuring that programs execute in a controlled manner, reducing vulnerabilities during execution.
-
Hardware-Enhanced Execution Memoization: This technique allows for efficient execution in highly replicated environments, optimizing performance while maintaining security.
The report emphasizes the importance of these technologies in creating a resilient cloud infrastructure capable of withstanding a broad spectrum of cyber threats. It highlights the collaborative efforts of researchers from Columbia University, George Mason University, and Symantec, showcasing the significance of interdisciplinary approaches in tackling complex security challenges.
Overall, the MEERKATS report serves as a vital resource for understanding the evolving landscape of cloud security and the innovative strategies being developed to enhance resilience. It underscores the necessity for continuous adaptation and transformation in software services to safeguard against emerging threats in an increasingly digital world.
Top Stories
INSIDERLighting Technology
Using Ultrabright X-Rays to Test Materials for Ultrafast Aircraft
INSIDERManufacturing & Prototyping
New 3D-Printable Nanocomposite Prevents Overheating in Military Electronics
INSIDERDefense
F-22 Pilot Controls Drone With Tablet
Technology ReportAR/AI
Talking SDVs and Zonal Architecture with TE Connectivity
INSIDERManufacturing & Prototyping
New Defense Department Program Seeks 300,000 Drones From Industry by 2027
INSIDERAerospace
Anduril Completes First Semi-Autonomous Flight of CCA Prototype
Webcasts
Test & Measurement
SAE Automotive Engineering Podcast: Additive Manufacturing
Information Technology
A New Approach to Manufacturing Machine Connectivity for the Air Force
Automotive
Optimizing Production Processes with the Virtual Twin
Power
EV and Battery Thermal Management Strategies
Manufacturing & Prototyping
How Packet Digital Is Scaling Domestic Drone Battery Manufacturing
Automotive
Advancements in Zinc Die Casting Technology & Alloys for Next-Generation...



