2 min readCyber-security Research Inspired by Genetics
Winston-Salem, NC – Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.
Now Wake Forest University researchers are fighting the continual evolution of viruses, worms and malware with evolution by developing the first-ever automated computer configurations that adjust as quickly as the threats.
Computer Science Associate Professor Errin Fulp and graduate student Michael Crouse are refining a genetically inspired algorithm that proactively discovers more secure computer configurations by leveraging the concept of “survival of the fittest.” Early simulations have shown the increased diversity of each device’s configuration improves overall network safety, without putting undue stress on IT administrators.
“Typically, administrators configure hundreds and sometimes thousands of machines the same way, meaning a virus that infects one could affect any computer on the same network,” says Crouse, who recently was named one of the “nation’s top new inventors” by Inventor’s Digest magazine. “If successful, automating the ability to ward off attacks could play a crucial role in protecting highly sensitive data within large organizations.”
Funded by a grant from Pacific Northwest National Laboratory (PNNL), the Wake Forest researchers aim to improve defense mechanisms of similar computing infrastructures with minimal human interaction.
Cyber attacks usually take place in two phases, says Fulp. In the reconnaissance phase, a virus or other threat simply observes the landscape, identifies possible defense mechanisms and looks for the best way in. If nothing has changed since the reconnaissance phase upon return, the virus strikes. But security experts say even the slightest change in environment can make a huge difference in deterring a potential attacker.
“Just as one might try to prevent a home robbery, our goal is to create a ‘moving target defense’ that detects cyber threats when they first case the house,” explains Fulp. “If we can automatically change the landscape by adding the technological equivalent of security cameras or additional lighting, the resulting uncertainty will lower the risk of attack.”
Over the next few months, the team will test its work to transform cyber security. Planned assessment includes integrating the automated system into the computer science department’s annual “hackathon,” giving budding developers the opportunity to improve the system and contribute to its promising outlook.
It’s an important issue of increasing national security concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. The most recent figures show attacks against federal government networks rose nearly 40 percent in 2010. In fact, inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.
Though no one has successfully modelled this complex process before, this is not the first time Fulp and Crouse have used nature as their guide.
Using genetic algorithms for computer configuration adaptation is part of PNNL’s Bio-Inspired Approaches to Moving Target Defense Strategies. In a separate, ongoing cyber security project with PNNL, Fulp and Crouse are training an army of “digital ants” to turn loose into the nation’s power grid to seek out computer viruses trying to wreak havoc on the system. The digital ants technology mimics the way ants think, use scent trails and swarm in nature to detect and prevent cyber attacks.
Fulp is also currently leading a group of Wake Forest faculty in creating an academic centre dedicated to the study and teaching of bio-inspiration and biomimicry, a discipline that applies nature’s design principles to develop innovative new ways of thinking.
“Increasingly, conventional solutions are unable to scale to the information or processing required by the massive influx of data. Furthermore, the complexity of many computer systems will necessitate solutions that are more scalable, robust, and flexible than traditional methods can offer,” says Fulp. “Designs found in nature can serve as a source of inspiration, providing robust and efficient methods that are better suited to address these complex problems.”