{"id":1277,"date":"2011-03-09T20:44:59","date_gmt":"2011-03-10T01:44:59","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=1277"},"modified":"2022-12-30T15:58:42","modified_gmt":"2022-12-30T20:58:42","slug":"digital-ants-may-secure-networks","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/digital-ants-may-secure-networks\/","title":{"rendered":"Digital Ants May Secure Networks"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-5964\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"malware\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2013\/10\/malware1.jpg?resize=87%2C87\" alt=\"\" width=\"87\" height=\"87\" \/>Researchers have developed &#8220;digital&#8221; ants to defend networks from worms and other malware. According to <a href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>DarkReading<\/em><\/a> scientists from <a href=\"http:\/\/www.wfu.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wake Forest University<\/a> and the <a href=\"http:\/\/www.pnl.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Department of Energy&#8217;s Pacific Northwest National Laboratory<\/a> in Washington state have worked together on the project that mimics the defensive behavior of ants. The researchers developed thousands of different types of digital ants that move through a computer network and search for evidence of a malicious threat.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5965\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Digital ants\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2013\/10\/ants-in-a-line2.jpg?resize=153%2C59\" alt=\"Digital ants\" width=\"153\" height=\"59\" \/>When a digital and detects a threat it leaves behind a &#8220;scent&#8221; or marker to attract other ants, like real ants. Other ants then follow the trail to swarm a potential infection with &#8220;<a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Swarm_intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">swarm intelligence.<\/a>&#8220;<a href=\"https:\/\/www.techrepublic.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em> TechRepublic<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20121125155745\/http:\/\/www.techrepublic.com:80\/blog\/security\/swarm-intelligence-are-digital-ants-the-answer-to-malware\/2757\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a> that digital Swarm Intelligence consists of three components:<\/p>\n<ul>\n<li><strong>Digital ant<\/strong>: Software designed to crawl through computer code, looking for evidence of malware. There will be 3000 different types of Digital Ants employed.<\/li>\n<li><strong>Sentinel<\/strong> is the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Autonomic_Networking\" target=\"_blank\" rel=\"noopener noreferrer\">autonomic<\/a> manager of digital ants congregated on an individual computer. It receives information from the ants, determines the state of the localhost, and if any further action is required. It also reports to the Sergeant.<\/li>\n<li><strong>Sergeant<\/strong> is an autonomic manager of multiple sentinels and is the interface with human supervisors. The size of the network determines the number of Sergeants required.<\/li>\n<\/ul>\n<p>Like their biological counterparts, each individual ant is not very bright. &#8220;<em>We are using the ants to sense something very basic, like a connection rate<\/em>,&#8221; said <a href=\"https:\/\/web.archive.org\/web\/20130618115349\/http:\/\/www.cs.wfu.edu\/~fulp\/\" target=\"_blank\" rel=\"noopener noreferrer\">Errin Fulp<\/a>, a professor of computer science at Wake Forest. There are about 60 technical details the digital ants can detect and leave a tiny digital trail that says something unusual is going on here, and that other ants should check it out .&#8221;<em>Then we collect that evidence which points us to a particular infection or security threat,<\/em>&#8221; said Mr. Fulp.<\/p>\n<p>The swarm intelligence approach to finding specific threats is intended to provide better and quicker detection of threats than current anti-malware software can perform. The researchers developed software capable of running multiple security scans contiguously, with each scan targeting a different threat according to the article. It&#8217;s also better able to handle morphed versions of malware, according to the research.<\/p>\n<p>&#8220;In nature, we know that ants defend against threats very successfully,&#8221; Mr. Fulp, says in <em>DarkReading<\/em>. &#8220;They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system.&#8221;<\/p>\n<p>In a <a href=\"http:\/\/www.wfu.edu\/wowf\/2009\/20090921.ants.html\" target=\"new\" rel=\"noopener noreferrer\">test of the technology<\/a>, the digital ants were able to discover a real computer worm planted by Wake Forest on a network of 64 computers in the lab.<\/p>\n<p>&#8220;<em>Our idea is to deploy 3,000 different types of digital ants, each looking for evidence of a threat,<\/em>&#8221; Fulp says. &#8220;<em>As they move about the network, they leave digital trails modeled after the scent trails ants in nature use to guide other ants. Each time a digital ant identifies some evidence, it is programmed to leave behind a stronger scent. Stronger scent trails attract more ants, producing the swarm that marks a potential computer infection.<\/em>&#8221;<\/p>\n<p>The researchers say the digital ant method works best for big networks with a large number of identical machines. And digital ants can&#8217;t take over your machine, either: they have to report back to the humans who control their &#8220;colony.&#8221;<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em><a title=\"aardvark chasing ant\" href=\"https:\/\/en.wikipedia.org\/wiki\/The_Ant_and_the_Aardvark\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-6019\" style=\"border: 0pt none;\" title=\"aardvark chasing ant\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/en\/thumb\/9\/98\/Aardvarkant.jpg\/250px-Aardvarkant.jpg\" alt=\"aardvark chasing ant\" width=\"160\" height=\"110\" \/><\/a>Soooo, computers are going to go from having a bad case of worms to having a case of ants in their pants? Will the ants fall victim to Ant eater malware?<br \/>\n<\/em><\/p>\n<p><em>The research seems like a remake of the \u201cgood viruses\u201d or \u201canti-virus viruses\u201d idea that people outside the anti-virus industry mainstream bring out from time to time.<\/em><\/p>\n<p><em> If this idea is commercially viable, they have some obvious advantages, compared to static anti-virus programs:<\/em><\/p>\n<p><em>Digital ants do not consume large amounts of computer resources, <\/em><\/p>\n<p><em>Digital ants do not need lengthy, process-hogging scans. <\/em><\/p>\n<p><em>There&#8217;s no need to constantly update digital ants because they adapt to malicious code variants<\/em><\/p>\n<p><em>What do you think?<\/em><\/p>\n<p><strong>Are the mainstream anti-malware firms creative enough?<br \/>\n<\/strong><\/p>\n<p><strong>Will digital ants work?<\/strong><em><br \/>\n<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers envision digital ants that defend networks from malware by mimicking the behavior of ants and move through a network and attack malicious threats<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,349,23,4,350],"class_list":["post-1277","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-digital-ants","tag-malware","tag-security","tag-swarm-intelligence"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1277"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1277\/revisions"}],"predecessor-version":[{"id":132106,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1277\/revisions\/132106"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}