element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Publications
  • Learn
  • More
Publications
Blog Researchers form North Carolina State develop algorithm that protects against cyber-attacks
  • Blog
  • Documents
  • Events
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Publications to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: Catwell
  • Date Created: 22 May 2013 7:54 PM Date Created
  • Views 463 views
  • Likes 0 likes
  • Comments 0 comments
  • research
  • safety&security
  • cyber_secirity
  • on_campus
  • cabeatwell
  • prototyping
  • university
  • china
  • cyber_warfare
  • innovation
  • communication
Related
Recommended

Researchers form North Carolina State develop algorithm that protects against cyber-attacks

Catwell
Catwell
22 May 2013

image

System concept. Great effort, but is it just delaying the inevitable? (via North Carolina State)

 

While cyber-attacks are nothing new, the type, method of deployment and frequency on which they occur are. The attacks are usually in the form of viruses, worms or Trojan horses that can (and have) cause significant damage to the IT infrastructures of institutions such as corporations, federal and governmental complexes as well as militaries from all over the globe. Combating or instituting methods to prevent these attacks have proven difficult, however a team of researchers from North Carolina State University have developed a new algorithm that can detect cyber-attacks, and once found is capable of isolating the threat on D-NCSs (Distributed Network Control Systems). Essentially the new algorithm detects the treat in a section of the D-NCS network and then isolates the threat in the compartment that has been infected allowing the rest of the network to function normally. Unlike a typical network where a central hub controls the entire system, D-NCSs are compartmentalized with control spread out through the entire network, which makes the algorithm effective.

 

The team developed the specialized software to run through four phases in detecting and controlling cyber-threats with the first being the Detection Phase in which the threat is found in any given node of the network. The second phase is known as the Mitigation Phase where the infected node becomes segregated from the network and control of the system is given to the nodes neighbors allowing the rest of the network to function normally. The third step, called the Identification Phase, both identifies and isolates the threat to that particular node under attack. This is perhaps the most important phase out of the four as the threat is analyzed in real time, which helps in securing the rest of the network from becoming infected. The last phase is known as the Update Phase, which is self-explanitory, updates the systems identifying process ion preventing further attacks of the same nature.

 

The newly developed algorithm couldn’t come at a better time as China has once again started its cyber-attacks against certain US companies after a brief lull in operations according to a report from cyber-security company Mandiant. The report states that a Chinese military cyber unit (known as APT1) recently began to attack over 100 companies in an effort to steal trade secrets essential just days after talks on cyber-security between the two nations were concluded a month ago (April 2013). Of course, China denies any and all involvement in the recent attacks and accuses the US of conducting their own operations against their nation. According to Mandiant’s report, the reason the attacks can be traced back to APT1 is that the same software and equipment signatures used in previous attacks have been used again against those certain companies, as they have relatively no defense against them. Perhaps those companies can take advantage of North Carolina State’s new algorithm if they employ a D-NCS network, which could help curb future attacks against them.

 

C

See more news at:

http://twitter.com/Cabe_e14

  • Sign in to reply
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube