Public Release: 

WPI computer scientist developing new technology to 'contain' hackers' attacks

Single-use services could protect web servers and make online interactions safer for millions of people around the world.

Worcester Polytechnic Institute

Worcester, Mass. -- A computer scientist at Worcester Polytechnic Institute (WPI) is developing a new technology designed to protect companies--and computer users--from damaging and expensive malware attacks.

Known as single-use services, the technology is being developed by Craig Shue, associate professor of computer science at WPI, with a three-year, $265,631 grant from the National Science Foundation. It is designed to prevent an attack on a commercial website from compromising other servers, data, and users.

Shue's approach uses a technology called "containerization" that will be invisible to end users, but will change how they interact with search engines, news sites, online stores, and other types of websites. Instead of being given direct access to an actual webserver, as happens now, each user will interact with a temporary copy, or instance, of the server. When the session ends, that copy will be destroyed.

In essence, each web session will be isolated within its own container. If a user exploits a vulnerability and attacks the webserver by deploying a malware program, that program will disappear along with the container. Since the actual web server will not be infected, no other users will be harmed.

Shue said his technology will eliminate the vulnerabilities inherent in the current way websites operate, with every user having direct access and interaction with the web servers and software. Under a traditional setup, if hackers were to take advantage of a bug in that software, they could embed malware that could attack every subsequent visitor to that website. And for major sites, that could mean hundreds of thousands of users would be vulnerable.

"It will change how interactions happen on the back end, whether people are getting news or ordering sneakers online," he said. "We assume software will probably never be bug-free, so let's just accept that and create better security with these little containers. Nothing will look different to end users but they'll be safer and the websites will be safer. With more than three billion people using the Internet, many of whom interact with user-facing servers multiple times a day, the project's outcome can broadly impact society's computer security."

In addition to isolating individual users, Shue is designing the containers so they can offer tailored permissions to each user, allowing websites to have fine-grained control over which services and backend resources each user can access. For example, an e-commerce site could assign buyers and sellers containers with different permissions. Only sellers would be able to access data about inventories, for instance. To do this, Shue is exploring a range of technologies, including Kerberos-style authentication, a computer network authentication protocol that helps communicating nodes prove their identity.

The containers also are being designed to automatically detect hacking attempts and malware infections. Once tampering is detected, the containers will save and log all inputs and outputs to help administrators figure out how the attack was launched and what vulnerability was exploited.

Shue is collaborating with Timothy Wood, an associate professor at George Washington University. Using memory optimization techniques, Wood has created a system called Flurries that can rapidly spawn thousands of new containers per second. Flurries will enable the deployment of containers to be scaled up to the degree needed by major news and commerce websites, Shue said.

Shue's focus is managing the network communications that will enable the system to create and communicate with each individual container; he will also set up the fine-grained permissions and develop the compromise-detection methodology. He'll be using technologies like OpenFlow, a communication protocol, and Open vSwitch, an open-source implementation of a distributed virtual multilayer switch, while also working to advance current forensic collection measures.


About Worcester Polytechnic Institute

WPI, a global leader in project-based learning, is a distinctive, top-tier technological university founded in 1865 on the principle that students learn most effectively by applying the theory learned in the classroom to the practice of solving real-world problems. Recognized by the National Academy of Engineering with the 2016 Bernard M. Gordon Prize for Innovation in Engineering and Technology Education, WPI's pioneering project-based curriculum engages undergraduates in solving important scientific, technological, and societal problems throughout their education and at more than 45 project centers around the world. WPI offers more than 50 bachelor's, master's, and doctoral degree programs across 14 academic departments in science, engineering, technology, business, the social sciences, and the humanities and arts. Its faculty and students pursue groundbreaking research to meet ongoing challenges in health and biotechnology; robotics and the internet of things; advanced materials and manufacturing; cyber, data, and security systems; learning science; and more.

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.