Modeling Security Software To Mimic Ant Behavior 68
wiredmikey writes "Researchers from universities and national laboratories in the United States are developing software that mimics ant behavior, as a new approach to network security."
The concept has been around for a while, but this summer researchers are working to train the "digital ants" well enough that they can turn them loose into the power grid to seek out computer viruses trying to wreak havoc on the system.
Ant bait? (Score:1)
Re: (Score:2)
A new definition of honey-trap.
Skynet (Score:1)
Turn them loose? Sounds like skynet. What could possibly go wrong?
Re: (Score:2)
Well. If the ants consider computer viruses to be food then they will take them back to the nest.
or just like how real ants herd aphids and mulch fungus farms, these digi-ants might introduce vulnerabilities in known good software to keep their food supply high. Thank God that's not how they're programmed except in the mind of a mediocre sci-fi writer.
Re: (Score:1)
But could a malicious person write another, malicious ant which manipulates the existing ant colony for his own goals? Those malicious ants could leave false scents at completely harmless computers, or remove scents left by other ants. Maybe it could even manage to free some part of the network from ants by leading ants at its borders to other parts of the network through strategically placed scents. Indeed, it could even be a DoS attack by simply creating lots of copies of the existing ants, which then wil
Re: (Score:2)
But could a malicious person write another, malicious ant which manipulates the existing ant colony for his own goals?
Sure they could.
What, you didn't think that was what existing botnet viruses do? They co-opt the millions of computers left unpatched and unsecured by clueless users everywhere for their own purposes.
What's being described by the "ants" concept is nothing more than the age-old "can we make a beneficial computer virus" crap that constantly gets spread around. The answer is no, because if it g
Re: (Score:2)
Re: (Score:2)
Was thinking the same thing. Let me know when they are about to start so I can make sure I am out of possible nuke targets.
There was an old power grid (Score:4, Funny)
Re: (Score:1)
I wonder why it swallowed a fly?...
Re: (Score:2)
Probably because it was glowing.
Re: (Score:2)
Obligatory (Score:3, Informative)
Re: (Score:3, Funny)
Not this bollocks again. (Score:1)
So, in order for these "ant-like" software agents to "roam" around a network, presumably all the machines on the net will have to keep a port open to accept random downloads of software to run locally?
Sure, that'll work.
Why on earth would they "wander" (Score:3)
I'd like my security software to stay resident at all times, thank you very much.
And "swarming"? I suppose that is an effective response, sucking up CPU by making meaningless copies of itself will keep the virus from doing much. But I'd rather remove the malware.
Re: (Score:2)
I like ants; I've owned ant farms, but c'mon, they can't be used for everything. Digging sand from under your garden path? Sure. Farming aphids? Yeah, they do a better job than I ever could ever do...
Leave the computer stuff to the intelligent animals.
Uh...WTF? (Score:5, Interesting)
"In nature, we know that ants defend against threats very successfully," Fulp said. "They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We're trying to achieve that same framework in a computer system."
Yeah, that's what we need. One Symantec AV can't stop a virus it doesn't know about, so we need TEN SYMANTEC AVS on the job.
The problem in computer security is one of DISCERNING INTENT. Good code and bad code look the same. The call the same functions, perform mostly the same tasks.
Think of VNC or Windows Remote Help vs a backdoor trojan. Same basic thing, just different intent.
FTP, Dropbox or other file transfer vs a trojan that uploads your files. Intent again.
Ants don't do any better at recognizing bad guys than AV software does. Faced with an enemy that is TRYING to disguise itself, they are fooled or sidelined. http://www.securityweek.com/researchers-model-security-software-mimic-behavior-ants [securityweek.com]
On the bight side, I'll be they can squeeze a few research grants out of it.
Re: (Score:2)
ZoneAlarm and Comodo DO detect RealVNC as possible threat, asking for authorization to run, then another to connect. Same with Crossloop (which is just a shell for RealVNC with a custom connection schema, though).
Re: (Score:3)
Yes, but that isn't a solution. That is just passing it on to the user to say "I see something, what is it?" Again, it defers determining intent to the user.
In real world application, ZoneAlarm and Comodo are next to useless because clueless users just keep clicking "allow" to make it stop bothering them.
God help them when "svchost.exe" pops up asking for permission.
Re: (Score:2)
Re: (Score:1)
Well, just add another program to the box which monitors the firewall and emulates clicking OK whenever that window appears. :-)
Re: (Score:2)
Re: (Score:2)
I got fed up by the pro version's insane resource utilization when updating. It was enough to actually break USB connection to my phone. So off it went, and I switched to Comodo. Since I can't pay for the license (being a student and whatnot), I'd rather my AV/Firewall was free... :)
Re: (Score:2)
I think the broad theory is that each computer on a network behaves like an ant, passing information to other computers about the network environment. If one computer starts misbehaving, the others can communicate this information and avoid the infected machine or the source of the incoming traffic. If the security software on the infected PC is compromised, they might even be able to force the infected machine to run some different security software that can help combat the threat. This is all just off the
Re: (Score:2)
Hm, looks like I replied to the wrong comment. Oh well.
Re: (Score:2)
Nice concept... (Score:2)
computer viruses in the power grid? (Score:2)
"this summer researchers are working to train the "digital ants" well enough that they can turn them loose into the power grid to seek out computer viruses trying to wreak havoc on the system".
The only way 'computer viruses` could get into the power grid is if you run your SCADA units on Microsoft Windows and connect them directly to the Internet. Designing a system that allows 'digital ants` to scurry about and be secure at the same time is a contradiction in terms. What happens if the 'digital ants` are
Re: (Score:2)
What happens if the 'digital ants` are hijacked by the .cyber->terrorists :)
This will be the inevitable outcome. Random software is not allowed inside, or at least we put a measurable although microscopic effort into it. Digital ants are allowed in. Therefore they will be the infection vector of the future. "who watches the watchers"
Re: (Score:2)
"who watches the watchers"
The ant lion watches them.
Re: (Score:1)
What part of don't connect your SCADA units to the Internet don't these 'security experts' understand?
The "don't" part, of course.
never heard of USB sticks? (Score:1)
Re: (Score:2)
What part of don't connect your SCADA units to the Internet don't these 'security experts' understand?
When they're not connected to the Internet, they're connected to a modem with no authentication...
Sounds like buggy code (Score:4, Funny)
Hahahahawhawhaw.
Carry on.
Re: (Score:2)
Ants aren't bugs. "How wude." :P
Computer Fungus Infection (Score:1)
viruses are a bad analogy (Score:2)
"In nature, we know that ants defend against threats very successfully," Fulp said. "They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We're trying to achieve that same framework in a computer system." link [securityweek.com]
Except computer viruses are no way near analogous to the biological kind. In nature the virus first has to latch onto the outside of the cell before injecting its genetic payload. It does this by hijacking biological processes necessary t
Re: (Score:1)
Sure. Ants are particularly prolific even as insects go. They can take hundred-to-one losses against virtually anything and still win by sheer numbers.
Off the top of my head the only creature I can think of that can consistently wipe out entire colonies of ants and prevent them from coming back is a human.
In other words, the analogy is stupid.
The security technology may or may not be stupid. It's hard to tell, because unfortunately
Terry Pratchett was right ! (Score:2)
http://www.paulkidby.com/stickers/index.html/ [paulkidby.com]
What will this do... (Score:1)
...to honeypots?
Re: (Score:1)
Resulting in... (Score:2)
...crispy ant jerky
With apologies to Scott Adams, whomever he is signed in as today
The DigiAnts are a Godsend (Score:1)
Well, I was wrong. The DigiAnts are a godsend.
But isn’t that a bit short-sighted? What happens when we’re overrun by DigiAnts?
No problem. We simply release wave after wave of Chinese DigiAnteater. They’ll wipe out the DigiAnts.
But aren’t the DigiAnteaters even worse?
Yes, but we’re prepared for that. We’ve lined up a fabulous type of DigiGorilla that thrives on DigiAnteater bits.
But then we’re stuck with DigiGorillas!
No, that’s the beautiful part. When IPv6 rol
Magnifying Glass (Score:2)
Anthill inside... (Score:2)
Man questions? (Score:2)
From TFA:
Berenhaut and Hilton are working to answer man questions: How do the ants migrate across different computer platforms and systems operating at different speeds?
I'm not entirely sure how that's a "man question", and I certainly don't want MANswers [wikipedia.org] to attempt to answer it.
Re: (Score:2)
It's quite simple really [youtube.com]
Well, that's how it works around here anyway :(
Easily broken (Score:1)
All it takes is a 10 year old with a magnifying glass to wipe out your entire security system.
Ants? Why not lions? (Score:1)
"In nature, we know that ants defend against threats very successfully," Fulp said.
Yeah, I'd say lions defend against threats even better. Why not model our security software to mimic lion behavior?
First it would conceal among other packets until the virus gets distracted. Then it will run at it in an angle so that the virus will run straight into an ambush mounted by other lions. Then they will bite the virus neck until it dies. Done! No more virus!
You may be vulnerable while your security software is napping though...
Melissa again? (Score:1)
100 years later... (Score:1)
100 years later:
Agent Smith: I'd like to share a revelation that I've had during my time here. It came to me when I tried to classify your species and I realized that you're not actually mammals. Every mammal on this planet instinctively develops a natural equilibrium with the surrounding environment but you humans do not. You move to an area and you multiply and multiply until every natural resource is cons
this software (Score:2)
Great idea! (Score:2)
Just read a Cory Doctorow short about this... (Score:1)
"Human Readable" in his short story collection "With a Little Help". :-)
Really enjoyable read, as are all his books. And you can read 'em for free if you like (most, if not all, are under creative commons), so there's no harm in checking it out
I'd love to explain the story, cause it's really great, but that'd give away too much.