Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware...
Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware attacks by transferring data to a cloud server through NVMe over Ethernet. RSSD faces no performance impacts and even allows for post-attack analysis to carefully identify the cause and methodology of any ransomware attacks faced by the RSSD. RSSD enhances security support from typical ransomware attacks which assume conventional SSDs perform like HDDs by preemptively protecting against 3 novel types of ransomware attacks designed by Dr. Huang. Furthermore, RSSD ensures that stale data is not discarded after a limited amount of time as current SSDs behave, instead opting to allocate the stale data to the cloud storage in a time-dependent order. This cloud storage effectively removes the limitation of storage on SSDs by providing a space to store an infinite amount of data. The NVMe over Ethernet is the novel design that serves to protect from ransomware attacks the transfer of data from the local SSD to the cloud storage.
Dr. Gabriel Weaver, Dr. Yardley, and Dr. Emmerich have developed a cyber and physical disruption model for electrical power grid operations that allows stakeholders in the...
Dr. Gabriel Weaver, Dr. Yardley, and Dr. Emmerich have developed a cyber and physical disruption model for electrical power grid operations that allows stakeholders in the industry to anticipate, prepare, and avoid damages from various different disruptive events. This model has been improved with fundamental changes to the cyber layer of the pipeline, allowing for a more diverse cyber layer that is nourished by data collected from DARPA RADICS exercises for cyberattacks against the electrical power grid. This diverse cyber layer is now able to apply information diffusion processes running on real-world communications networks under baseline and disrupted conditions to explicitly represent communications network topologies and associated information diffusion processes across each layer in the network stack. The result of this technology is a brand-new solution for stakeholders in assessing critical infrastructure risks in the electrical power grid sector.
The Domain Name System (DNS) introduced in 1985 has been a security risk because it allowed internet users' online browsing activities to be tracked and analyzed. Despite...
The Domain Name System (DNS) introduced in 1985 has been a security risk because it allowed internet users' online browsing activities to be tracked and analyzed. Despite many protocols developed to encrypt DNS for the protection of user privacy, websites visited by users can still be identified with high accuracy based on gathered traffic pattern information.
The invention here is an algorithm that incorporates a novel obfuscation method to websites, as demonstrated, encrypted with a DNS-over-HTTPS protocol.
This new algorithm/method reduces the accuracy of traffic analysis from 97% to 7-9%.