www.darkreading.com Open in urlscan Pro
2606:4700::6811:7863  Public Scan

URL: https://www.darkreading.com/vulnerabilities-threats/swarm-intelligence-may-be-just-the-ticket-for-improved-network-device-se...
Submission: On December 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 

Event
Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event |
December 8, 2021 <REGISTER NOW>
Alert
Check out our NEW section called "DR Tech" for comprehensive coverage of new &
emerging cybersecurity technology.
PreviousNext

Vulnerabilities/Threats

Commentary


SWARM INTELLIGENCE MAY BE JUST THE TICKET FOR IMPROVED NETWORK & DEVICE SECURITY

Based on the reaction of a single insect in a swarm, messages are passed along
peer to peer, and an entire environment can respond without a central leader
processing data and giving orders.
Morey Haber
CTO and CISO, BeyondTrust
November 18, 2021
Source: Andreas Häuslbetz via Alamy Stock Photo
PDF


The motion of bees, ants, and other insects looking for food and protecting
their colony from attacks involves complex peer-to-peer communications with no
centralized command and control. Insects use a variety of communication methods,
from auditory sounds to chemicals, in order to transmit messages to peers,
conveying a message and spreading information about a situation.



Once the message is passed and acknowledged (in some form) by others in the
"swarm," a decentralized mission is formed to manage the situation. Based on the
reaction of just one insect in the swarm, and the passing of messages to others
in a peer-to-peer fashion, an entire environment can react without the need of a
central leader processing data and giving orders. This is a foreign concept to
most people who are accustomed to a hierarchy of authority, but it's a crucial
development in understanding a potential modern approach to cybersecurity.

In the last few years, the world has embraced a massive digital transformation,
moving to the cloud. With this metamorphosis, new technology has led to an
explosion of Internet and cloud-enabled devices. The use cases for these devices
range from personal digital assistants to home appliances and are classified as
Internet of Things (IoT).



In 1989, the term "swarm intelligence" was coined by Gerardo Beni and Jing Wang
based on basic artificial intelligence models using self-organized and
decentralized systems. Then in 2019, researchers at Glasglow Caledonian
University and COMSATS University in Pakistan developed a model that could
potentially protect the Internet and cloud resources from cyberattacks. The
attack method was presented at the IEEE's China Emerging Technologies Conference
and is derived from an artificial bee colony (ABC) and a random neural network
(RNN).



To mitigate IoT cloud threats, an ABC algorithm is a swarm intelligence model
that uses AI to simulate the searching behavior of honeybees and applies the
concepts to solve real-world computational problems. To make this work, an RNN
is applied to the ABC model using machine learning based on the behavior of
biological neural networks in the human brain.

"In this paper, an anomaly-based intrusion detection scheme is proposed that can
protect sensitive information and detect novel cyber-attacks," the researchers
noted in their paper. "The artificial bee colony (ABC) algorithm is used to
train the random neural network (RNN) based system (RNN-ABC)".

The researchers trained their intrusion detection model based on ABC and RNN
using a dataset that was used to establish algorithms to detect a cyberattack
and contained a large quantity of Internet traffic data for training and
analysis. After priming their RNN-ABC, the researchers carried out a sequence of
assessments to measure its performance in identifying and quantifying
cyberattacks.



The research produced findings that were highly effective in classifying new
attacks with an astonishing accuracy of 91.65%. The researchers also concluded
that the model's accuracy in classifying cyberattacks was greater when the
"colony" size of its ABC swarm intelligence was larger. Therefore, a greater
number of "artificial bees" contributing to the model improved the overall
confidence in the solution. With the increasing number of IoT devices present on
the Internet and connecting to the cloud, the potential increase in using these
devices as a part of a swarm to identity a potential threat can ultimately lead
to mitigating the risk. So, how do we pull this all together?

First, and most importantly, swarm intelligence needs a large colony size to
enable devices that can communicate information and process relevant data for
the swarm versus just network traffic alone. With the increasing presence of IoT
devices that have a simple behavioral model, this is possible. 

Second, we need a mesh-style Internet protocol that allows a reliable method for
the devices to communicate and provide information to the ABC-RNN model and each
other. This large-scale, peer-to-peer protocol does not yet exist at the time of
writing this article. 

Third, the ABC-RNN model needs rules, policies, and output that can classify any
findings in human-readable, actionable results and for machine-to-machine
automation. Technology like STIX and TAXII have begun to embrace and address
this type of problem but fall short for peer-to-peer communications at scale
(requirement No. 2). Finally, there is cloud security. The trust of data being
processed in the model must be reliable and accurate or the entire system can be
abused.

The purpose of swarm intelligence is to create a new method for determining the
risk of cyberattacks via an untraditional method. This concept, using something
new, innovative, and potentially highly reliable, is what the cloud needs for
protection versus traditional methods migrated to the cloud. While you consider
the protection you need for the cloud, sometimes you need to think outside of
the box. Swarm intelligence is just one potential method and, realistically, if
you read this 10 years from now, it might be the de facto method for protecting
the cloud and/or IoT devices.

Vulnerability ManagementAdvanced ThreatsInsider Threats
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe



Recommended Reading:
7 Ways to Reduce Cyber Threats From Remote Workers Reuven Aronashvili 5 April
2021 darkreading.com 7 Ways to Reduce Cyber Threats From Remote Workers The
pandemic's decline won't stop the work-from-home trend nor the im… Software,
Incident Response Among Big Focus Areas in Biden's Cybersecu… Jai Vijayan 13 May
2021 darkreading.com Software, Incident Response Among Big Focus Areas in
Biden's Cybersecurity Executive Order Overall objectives are good, … Attackers
Compromised Code-Checking Vendor's Tool for Two Months Robert Lemos 20 April
2021 darkreading.com Attackers Compromised Code-Checking Vendor's Tool for Two
Months A script used to upload sensitive reports-with access t… How to Build a
Resilient IoT Framework Samuel Greengard 1 April 2021 darkreading.com How to
Build a Resilient IoT Framework For all of their benefits, IoT devices weren't
built with security in mind -- and… How the Biden Administration Can Make
Digital Identity a Reality Hal Granoff 16 April 2021 darkreading.com How the
Biden Administration Can Make Digital Identity a Reality A digital identity
framework is the answer to the US go… Watch Out for These Cyber-Risks Ken Todd
30 March 2021 darkreading.com Watch Out for These Cyber-Risks It's difficult to
predict what will materialize in the months ahead in terms of cyber-ri…
More Insights
White Papers
 * 
   Protecting Your Mainframe Against Relentless Ransomware
 * 
   2021 Ransomware Threat Report

More White Papers
Webinars
 * 
   Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * 
   Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2021
 * 
   Enterprise Cybersecurity Plans in a Post-Pandemic World

More Reports

Editors' Choice
In Appreciation: Dark Reading's Tim Wilson
Dark Reading Staff, Dark Reading
Finding Your Niche in Cybersecurity
Kristina Balaam, Senior Security Intelligence Engineer, Lookout
HP Issues Firmware Updates for Printer Product Vulnerabilities
Jai Vijayan, Contributing Writer
10 Stocking Stuffers for Security Geeks
Ericka Chickowski, Contributing Writer
Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
 * Cybersecurity Outlook 2022 Virtual Event
 * Modernizing Cybersecurity Through a Single Solution Approach
 * Security Alert Fatigue: Tips for Taking Control

More Webinars
White Papers
 * Protecting Your Mainframe Against Relentless Ransomware
 * 2021 Ransomware Threat Report
 * Lock Down the Core of your Hybrid IT Environment with Zero Trust Architecture
 * Elastic Cloud Networking: Six Tests You Need Now
 * Unit 42 Incident Response and Data Breach Report

More White Papers
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
More Insights
White Papers
 * 
   Protecting Your Mainframe Against Relentless Ransomware
 * 
   2021 Ransomware Threat Report

More White Papers
Webinars
 * 
   Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * 
   Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2021
 * 
   Enterprise Cybersecurity Plans in a Post-Pandemic World

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2021 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept