Intrusion detection for submerged datacenters
First Claim
Patent Images
1. A system comprising:
- an intrusion detection system coupled to a datacenter configured for operation while submerged in water, the datacenter comprising one or more physically separable modules, the intrusion detection system comprising one or more intrusion detection modules configured to detect underwater intrusion attempts directed towards the datacenter while submerged in the water, the one or more intrusion detection modules further configured to;
responsive to a detection of an intrusion into the datacenter submerged in the water, triggering an alert for network operations;
broadcasting warnings into a surrounding environment;
ceasing network traffic;
failing over to a geo-replicated copy of the datacenter; and
permanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water.
1 Assignment
0 Petitions
Accused Products
Abstract
Examples of the disclosure provide a datacenter configured for operation while submerged in water. The datacenter includes one or more physically separable modules. The datacenter also includes an intrusion detection system that has one or more intrusion detection modules.
101 Citations
19 Claims
-
1. A system comprising:
-
an intrusion detection system coupled to a datacenter configured for operation while submerged in water, the datacenter comprising one or more physically separable modules, the intrusion detection system comprising one or more intrusion detection modules configured to detect underwater intrusion attempts directed towards the datacenter while submerged in the water, the one or more intrusion detection modules further configured to; responsive to a detection of an intrusion into the datacenter submerged in the water, triggering an alert for network operations; broadcasting warnings into a surrounding environment; ceasing network traffic; failing over to a geo-replicated copy of the datacenter; and permanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computing environment, a method for detecting intrusion into a datacenter submerged in water, the method performed at least in part on a processor, the method comprising:
-
receiving data from a plurality of sensors, wherein the plurality of sensors include at least one of a hydrophone or a sonar device; determining whether an anomaly is detected using the received data; responsive to a determination that the anomaly is detected, identifying the anomaly; determining whether the identified anomaly indicates an underwater intrusion; responsive to a determination that the detected anomaly is not an intrusion indication, outputting a change detection notice; responsive to a determination that the detected anomaly indicates the underwater intrusion, initiating a search for the underwater intrusion; ceasing network traffic; failing over to a geo-replicated copy of the datacenter; and permanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. In a computing environment, a method for performing protective actions upon detection of an intrusion into a datacenter submerged in water, the method performed at least in part on a processor, the method comprising one or more of:
-
triggering an alert for network operations; broadcasting warnings into a surrounding environment; ceasing network traffic; failing over to a geo-replicated copy of the datacenter; and permanently rendering local data of the datacenter inaccessible by flooding the datacenter submerged in the water. - View Dependent Claims (18, 19)
-
Specification