Tuesday, September 29, 2009

Using Ants as Security Model

Intruders, viruses, Trojan horses, fake accounts, and many more ever growing malicious software and disturbing practices in our networks! It is a never-ending battle to protect our computer networks from them. They cost us so much! Our businesses are affected by their real and eve their imaginative impact! I'd like to introduce a fresh new approach to computer security modeling nature; from the Wake Forest University! Two keywords scent and ants! Yes, as you may guess, security experts are deploying a new defense modeled after one of nature's hardiest creatures — the ant as reported in this article titled "Ants vs. worms Computer security mimics nature"!
This study report highlights that unlike traditional security devices, which are static, these "digital ants" wander through computer networks looking for threats, such as "computer worms" — self-replicating programs designed to steal information or facilitate unauthorized use of machines. When a digital ant detects a threat, it doesn't take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate. The concept, called "swarm intelligence," promises to transform cyber security because it adapts readily to changing threats. Professor of Computer Science Errin Fulp says "In nature, we know that ants defend against threats very successfully. They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system. Our idea is to deploy 3,000 different types of digital ants, each looking for evidence of a threat. As they move about the network, they leave digital trails modeled after the scent trails ants in nature use to guide other ants. Each time a digital ant identifies some evidence, it is programmed to leave behind a stronger scent. Stronger scent trails attract more ants, producing the swarm that marks a potential computer infection."

I know we mimicked a number of animals for computer security in the past. Even some mythological characters such as three headed Cerberus watching Hades! What other animals or even plants could we model for computer security? Please illustrate your thoughts with your real and/or imaginative animals and their cognitive expertise such as smell, taste, touch, bite are a few for the consideration of your imagination!

Regards,
Mehmet

Dr. Mehmet YILDIZ || IBM || IT Philosophy || Future|| Leadership || My blog || Twitter || Linkedin || Yasni ||Google || Naymz|| Superfan

No comments:

Post a Comment

Powerful Life Changing Hacks That Truly Transformed My Life: Using simple yet effective hacks to transform physical, mental and emotional health rapidly and sustainably

In this post, I'd like to introduce one of my recent books reflecting my transformational development. It is titled " Powerful L...