New inquiries

800-324-1617

Tech support

832-315-5932

Fax

888-238-9828

  • Hello, my name is
  • . You can call me at
  • or email me at
  • . My web address is
  • and my budget is
  • .
  • This field is for validation purposes and should be left unchanged.

BLOG

Is building a more secure internet possible?

Threats like Heartbleed, Ransomware and Shellshock are constant reminders that we are under siege from security meltdowns

Our dangerous reliance on the 40-Year-Old internet infrastructure

The protocols that underpin the modern Internet are now entering their fifth decade. In the 1970s, the Internet’s basic architecture was designed for performance; security was not yet a concern. From that time forward, programmers were tasked with incorporating security on their own into every line of code they wrote. One small mistake allows a hacker to get in. Threats like Heartbleed, Ransomware and Shellshock are constant reminders that we are under siege from security meltdowns that in the past few years have exploded in frequency and scope, often resulting from such hard-to-discover programming errors.

working towardsWorking towards a solution?

Five years ago the U.S. government established the Defense Advanced Research Projects Agency (DARPA) to explore what the internet might look like if we could rebuild it from the ground up, with focus on improving security.

The program, called Clean Slate, designed to make machines more aware of their environment, included two components:

  • “Crash–short for Clean-Slate Design of Resilient, Adaptive, Secure Hosts – a multiyear project aimed at building systems that were much harder to break into, that could continue to fully function when they were breached and that could “heal themselves;” and
  • MRC–short for Mission-Oriented Resilient Clouds, which applied similar thinking to computer networking and cloud computing.”

A third component of Darpa, called Active Authentication, was later created to make machines more aware of their operator. More specifically, this program continues to explore ways that machines can learn to recognize human users by analyzing online behavior, e.g., a person’s typing pattern, rather than a password or a fingerprint.

Results to date

One promising result is a crash program called Clean Slate Trustworthy Secure Research and Development, nicknamed Custard by its creators. While not a full replacement of existing Internet infrastructure, it does offer a revolutionary system for identifying individuals who have permission to conduct specific operations, thereby keeping out the bad guys.

Custard has proven effective at preventing buffer overflows, a common cyber attack strategy. This common design flaw allows hackers to send a message that overwhelms a computer’s memory, causing the program to fail–which allows the attacker to infect an entire system with malicious code. Over the last year, Custard has generated growing interest from private companies, nonprofit organizations and academia.

Vector Strategy. Broken textStop gap strategies can’t work much longer

Network architects understand that the fallback solution of pushing files out to the edge (of the hierarchically structured Internet) can’t meet demand much longer. Rapid growth in wirelessly communicated video and communication between devices/appliances require a new approach.

Besides greater security, a number of tech leaders believe we need to move towards a more mesh-like, less hierarchical Internet. More on that subject in a future blog post!

More Insights