www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7863
Public Scan
URL:
https://www.darkreading.com/vulnerabilities-threats/swarm-intelligence-may-be-just-the-ticket-for-improved-network-device-se...
Submission: On December 07 via api from US — Scanned from DE
Submission: On December 07 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code Dec 07, 2021 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Videos > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code Dec 07, 2021 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Videos > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code Dec 07, 2021 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Videos > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. Event Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event | December 8, 2021 <REGISTER NOW> Alert Check out our NEW section called "DR Tech" for comprehensive coverage of new & emerging cybersecurity technology. PreviousNext Vulnerabilities/Threats Commentary SWARM INTELLIGENCE MAY BE JUST THE TICKET FOR IMPROVED NETWORK & DEVICE SECURITY Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders. Morey Haber CTO and CISO, BeyondTrust November 18, 2021 Source: Andreas Häuslbetz via Alamy Stock Photo PDF The motion of bees, ants, and other insects looking for food and protecting their colony from attacks involves complex peer-to-peer communications with no centralized command and control. Insects use a variety of communication methods, from auditory sounds to chemicals, in order to transmit messages to peers, conveying a message and spreading information about a situation. Once the message is passed and acknowledged (in some form) by others in the "swarm," a decentralized mission is formed to manage the situation. Based on the reaction of just one insect in the swarm, and the passing of messages to others in a peer-to-peer fashion, an entire environment can react without the need of a central leader processing data and giving orders. This is a foreign concept to most people who are accustomed to a hierarchy of authority, but it's a crucial development in understanding a potential modern approach to cybersecurity. In the last few years, the world has embraced a massive digital transformation, moving to the cloud. With this metamorphosis, new technology has led to an explosion of Internet and cloud-enabled devices. The use cases for these devices range from personal digital assistants to home appliances and are classified as Internet of Things (IoT). In 1989, the term "swarm intelligence" was coined by Gerardo Beni and Jing Wang based on basic artificial intelligence models using self-organized and decentralized systems. Then in 2019, researchers at Glasglow Caledonian University and COMSATS University in Pakistan developed a model that could potentially protect the Internet and cloud resources from cyberattacks. The attack method was presented at the IEEE's China Emerging Technologies Conference and is derived from an artificial bee colony (ABC) and a random neural network (RNN). To mitigate IoT cloud threats, an ABC algorithm is a swarm intelligence model that uses AI to simulate the searching behavior of honeybees and applies the concepts to solve real-world computational problems. To make this work, an RNN is applied to the ABC model using machine learning based on the behavior of biological neural networks in the human brain. "In this paper, an anomaly-based intrusion detection scheme is proposed that can protect sensitive information and detect novel cyber-attacks," the researchers noted in their paper. "The artificial bee colony (ABC) algorithm is used to train the random neural network (RNN) based system (RNN-ABC)". The researchers trained their intrusion detection model based on ABC and RNN using a dataset that was used to establish algorithms to detect a cyberattack and contained a large quantity of Internet traffic data for training and analysis. After priming their RNN-ABC, the researchers carried out a sequence of assessments to measure its performance in identifying and quantifying cyberattacks. The research produced findings that were highly effective in classifying new attacks with an astonishing accuracy of 91.65%. The researchers also concluded that the model's accuracy in classifying cyberattacks was greater when the "colony" size of its ABC swarm intelligence was larger. Therefore, a greater number of "artificial bees" contributing to the model improved the overall confidence in the solution. With the increasing number of IoT devices present on the Internet and connecting to the cloud, the potential increase in using these devices as a part of a swarm to identity a potential threat can ultimately lead to mitigating the risk. So, how do we pull this all together? First, and most importantly, swarm intelligence needs a large colony size to enable devices that can communicate information and process relevant data for the swarm versus just network traffic alone. With the increasing presence of IoT devices that have a simple behavioral model, this is possible. Second, we need a mesh-style Internet protocol that allows a reliable method for the devices to communicate and provide information to the ABC-RNN model and each other. This large-scale, peer-to-peer protocol does not yet exist at the time of writing this article. Third, the ABC-RNN model needs rules, policies, and output that can classify any findings in human-readable, actionable results and for machine-to-machine automation. Technology like STIX and TAXII have begun to embrace and address this type of problem but fall short for peer-to-peer communications at scale (requirement No. 2). Finally, there is cloud security. The trust of data being processed in the model must be reliable and accurate or the entire system can be abused. The purpose of swarm intelligence is to create a new method for determining the risk of cyberattacks via an untraditional method. This concept, using something new, innovative, and potentially highly reliable, is what the cloud needs for protection versus traditional methods migrated to the cloud. While you consider the protection you need for the cloud, sometimes you need to think outside of the box. Swarm intelligence is just one potential method and, realistically, if you read this 10 years from now, it might be the de facto method for protecting the cloud and/or IoT devices. Vulnerability ManagementAdvanced ThreatsInsider Threats Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Recommended Reading: 7 Ways to Reduce Cyber Threats From Remote Workers Reuven Aronashvili 5 April 2021 darkreading.com 7 Ways to Reduce Cyber Threats From Remote Workers The pandemic's decline won't stop the work-from-home trend nor the im… Software, Incident Response Among Big Focus Areas in Biden's Cybersecu… Jai Vijayan 13 May 2021 darkreading.com Software, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order Overall objectives are good, … Attackers Compromised Code-Checking Vendor's Tool for Two Months Robert Lemos 20 April 2021 darkreading.com Attackers Compromised Code-Checking Vendor's Tool for Two Months A script used to upload sensitive reports-with access t… How to Build a Resilient IoT Framework Samuel Greengard 1 April 2021 darkreading.com How to Build a Resilient IoT Framework For all of their benefits, IoT devices weren't built with security in mind -- and… How the Biden Administration Can Make Digital Identity a Reality Hal Granoff 16 April 2021 darkreading.com How the Biden Administration Can Make Digital Identity a Reality A digital identity framework is the answer to the US go… Watch Out for These Cyber-Risks Ken Todd 30 March 2021 darkreading.com Watch Out for These Cyber-Risks It's difficult to predict what will materialize in the months ahead in terms of cyber-ri… More Insights White Papers * Protecting Your Mainframe Against Relentless Ransomware * 2021 Ransomware Threat Report More White Papers Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code More Webinars Reports * 10 Hot Talks From Black Hat USA 2021 * Enterprise Cybersecurity Plans in a Post-Pandemic World More Reports Editors' Choice In Appreciation: Dark Reading's Tim Wilson Dark Reading Staff, Dark Reading Finding Your Niche in Cybersecurity Kristina Balaam, Senior Security Intelligence Engineer, Lookout HP Issues Firmware Updates for Printer Product Vulnerabilities Jai Vijayan, Contributing Writer 10 Stocking Stuffers for Security Geeks Ericka Chickowski, Contributing Writer Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code * Cybersecurity Outlook 2022 Virtual Event * Modernizing Cybersecurity Through a Single Solution Approach * Security Alert Fatigue: Tips for Taking Control More Webinars White Papers * Protecting Your Mainframe Against Relentless Ransomware * 2021 Ransomware Threat Report * Lock Down the Core of your Hybrid IT Environment with Zero Trust Architecture * Elastic Cloud Networking: Six Tests You Need Now * Unit 42 Incident Response and Data Breach Report More White Papers Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events More Insights White Papers * Protecting Your Mainframe Against Relentless Ransomware * 2021 Ransomware Threat Report More White Papers Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code More Webinars Reports * 10 Hot Talks From Black Hat USA 2021 * Enterprise Cybersecurity Plans in a Post-Pandemic World More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2021 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept