Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

A devoted group of researchers at North Carolina State University have painstakingly developed a novel software tool aimed at addressing performance disarrays in cloud computing systems. The tool functions to automatically classify and respond to potential network disruptions before they actually occur.

Cloud computing provides the freedom of creating numerous virtual machines provided to the end-users across a single computing platform – all that functions autonomously. Performance issues with such an approach are bound to occur. In case of a software glitch or a closely related hiccup, problems arising across a single effected virtual machine may end up bringing down the entire cloud down on its knees.

Determination of various contingencies across a system can be simplified by sensing and keeping a track of numerous machine related variables. The software does exactly that. By calculating the current network traffic, extent of memory consumption, CPU utilization, and several other parameters of data within a cloud computing infrastructure, the tool is able to estimate an effective measure of the overall system health. This renders the software flexible enough to formulate an adequate data-range characterization that can be safely considered as being normal. The processor usage, for instance, reflects the amount of computational power being required at any instant of time. The software outlines normal performance for every virtual machine in the cloud, and reports deviation of almost any sort. Based on the aforementioned information the tool predicts incongruities that might potentially affect the system’s capacity to provide service to users.

This particular approach is immensely beneficial in terms of associated benefits, including the all-important savings inherent with the alleviation of personnel training requirement. The software, being entirely autonomous depicts aberrant behavior on its own. In addition, the ability to predict anomalies is a feat that has never been achieved before. Not only that, upon sensing abnormal behavior in a virtual machine, it executes a pre-defined black box diagnostic test that determines which variables (memory usage, for instance) might be affected. The diagnostic data is then used to prompt the suitable prevention subroutine without making use of the user’s personal data in any form.

Helen Gu, co-author of the paper articulating this research marvel and an assistant professor at North Carolina State University explained: “If we can identify the initial deviation and launch an automatic response, we can not only prevent a major disturbance, but actually prevent the user from even experiencing any change in system performance.”

Most importantly, the software is not resource hungry (power in particular) and does not consume considerable amount of processor cycles to operate. It has the ability to fetch the preliminary data and classify normal behavior much quicker than the existing tactics. With CPU power consumption less than 1% of the total and a mere 16 megabytes of memory, the software is bound to pack a punch.

During the testing phase, the program recognized up to 98% of incongruities, which is the utmost as compared to existing approaches. It prompted a mere 1.7% of false alarms. Gu says: “And because the false alarms resulted in automatic responses, which are easily reversible, the cost of the false alarms is negligible.”

The software does sound like a real game-changer altogether. However, commercialization of the said research would eventually reveal the true benefits this tool has in store for the cloud computing industry – fingers crossed.

By Humayun Shahid


About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.


(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…