INTRUSION DETECTION FOR SUBMERGED DATACENTERS
First Claim
Patent Images
1. A system comprising:
- a datacenter configured for operation while submerged in water, the datacenter comprising one or more physically separable modules; and
an intrusion detection system coupled to the datacenter, the intrusion detection system comprising one or more intrusion detection modules that detect underwater intrusion attempts directed towards the datacenter.
1 Assignment
0 Petitions
Accused Products
Abstract
Examples of the disclosure provide a datacenter configured for operation while submerged in water. The datacenter includes one or more physically separable modules. The datacenter also includes an intrusion detection system that has one or more intrusion detection modules.
75 Citations
20 Claims
-
1. A system comprising:
-
a datacenter configured for operation while submerged in water, the datacenter comprising one or more physically separable modules; and an intrusion detection system coupled to the datacenter, the intrusion detection system comprising one or more intrusion detection modules that detect underwater intrusion attempts directed towards the datacenter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computing environment, a method for detecting intrusion into a datacenter submerged in water, the method performed at least in part on a processor, the method comprising:
-
receiving data from a plurality of sensors; determining whether an anomaly is detected using the received data; responsive to a determination that the anomaly is detected, identifying the anomaly; determining whether the identified anomaly indicates an intrusion; responsive to a determination that the detected anomaly is not an intrusion indication, outputting a change detection notice; and responsive to a determination that the detected anomaly indicates the intrusion, initiating a search for the intrusion. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. In a computing environment, a method for performing protective actions upon detection of an intrusion into a datacenter submerged in water, the method performed at least in part on a processor, the method comprising one or more of:
-
triggering an alert for network operations; broadcasting warnings into a surrounding environment; ceasing network traffic; failing over to a geo-replicated copy of the datacenter; rendering data of the datacenter inaccessible. - View Dependent Claims (18, 19, 20)
-
Specification