Ants Vs. Worms — Computer Security Mimics Nature 104
An anonymous reader writes with this excerpt from Help Net Security:
"In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature's hardiest creatures — the ant. Unlike traditional security devices, which are static, these 'digital ants' wander through computer networks looking for threats ... When a digital ant detects a threat, it doesn't take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate. 'Our idea is to deploy 3,000 different types of digital ants, each looking for evidence of a threat,' [says Wake Forest Professor of Computer Science Errin Fulp.] 'As they move about the network, they leave digital trails modeled after the scent trails ants in nature use to guide other ants. Each time a digital ant identifies some evidence, it is programmed to leave behind a stronger scent. Stronger scent trails attract more ants, producing the swarm that marks a potential computer infection.'"
ridiculous references (Score:5, Insightful)
What's with the ridiculous reference to ants? If they had said this in a technical way, I might actually even understand what they mean. Now it's basically "ants travel inside your network". The article doesn't tell a lot more.
Obviously nothing is "traveling" inside your lan cable. So do they mean they have every machine in promiscuous lan that tries to seek what is traveling there? What kind of "scent" does it leave when it detects some threat and how are the other computers interact with that?
Stop doing some stupid nature references just for the hell of it, give technical details.
Re:ridiculous references (Score:5, Informative)
They are talking about an ant-based algorithm, often used in optimization (routing, for example). Some information is here http://en.wikipedia.org/wiki/Artificial_Ants [wikipedia.org] and here.
Re:ridiculous references (Score:5, Informative)
Second link: http://en.wikipedia.org/wiki/Ant_colony_optimization [wikipedia.org] (sorry)
I think this is just some theoretical research that got picked up by someone never heard of Ant algorithms (it sounds impressive when you hear it the first time), but it can often be outperformed.
Oblig (Score:2)
Re:ridiculous references (Score:4, Informative)
He just uses "ants and swarms" to replace "daemon and daemons".
His research is based on a network of 64 computers and has identified all sorts of different types of security breach that can be detected on a network (unauthorized ssh/ftp, botnet commands, spam-mailer, virus-in-a-mail-message, backdoor trojan) and that it might not be possible to detect where the originating commands are coming from - a whole load of servers or PC's might be infected.
The article states that there is a performance gain from having a separate task to detect each of these (he calls these ants). Since there are so many files, ports and devices to be checked, it is better to have multiple copies of each task. OS people would call these 'daemons'. Testing for all of these security breach requires a "swarm of ants" or a "plague of daemons" (whatever the aggreggate work of daemon is).
I guess talking about daemons in the server network would probably scare the h*ll out of Christian Managers.
Re: (Score:1)
Re: (Score:2)
Just get nmap, configure it to run as multiple instances form multiple computers, and configure each running instance to have certain search parameters. If this is what they are talking about, not much to see here, you just downplay the load on a server, by telling it to play only certain vulnerabilities, leaving others to look for different types.
Seriously, sounds like alot of BS just to fill up a story, once you find an exploit, it stops there, sends you an email and waits for you to log back on to fix or
Re:ridiculous references (Score:5, Insightful)
And ant colony algorithms by themselves are just an obfuscated way of defining ad-hoc probabilistic algorithms.
It's not "obfuscated", they are explicitly in that class of algorithms.
In other words it's completely heuristic, there is no actual theory that justifies defining the algorithms in that particular way.
Yeah and there's no theory a priori justifying simulated annealing or genetic algorithms work in their particular way. But they work. Random heuristics work (and there is theory explaining why, in general, they do). Different heuristics have different properties that are beneficial in some circumstances. That's why there's more than one. That's why Monte Carlo simulations weren't the final word on random heuristics.
And what they do has precious little to do with actual ants.
As much as genetic algorithms have to do with biological evolution or simulated annealing has to do with cooling metal. As in... next to nothing in a literal sense, but quite a bit in an inspirational or metaphorical sense. Probabilistically following previous paths through the solution space, with those paths 'evaporating' over time unless reinforced, is a pretty good analogy for what ants really do, and a good hint as to the algorithms advantages -- it does a good job of finding and tracking changes in the solution space in dynamic situations.
Basically, "Oh it's just a heuristic and not literally like the inspiration its named after" is the worst way to dismiss an algorithm ever.
Though, on the other hand, why this is a good idea for network security, I don't know. Why would you want a bunch of agents to "swarm" a location where problems are found, rather than just, say, deleting any instances of virus/worms found, and closing any security holes found (or notifying the sysadmin so they can), is beyond me.
Re: (Score:3, Interesting)
They are talking about an ant-based algorithm, often used in optimization (routing, for example).
I'm sorry, but neither you nor the article make any fucking sense whatsoever. This is an IT geek site, stop with the fucking metaphores. Why do these people expect us to understand "virtual ants wander around the network" any more than "a network scanner that looks for the same security holes as the worms, only this notifies the sysadmin about them"?
Re: (Score:2)
Re: (Score:2)
Having stuff "wander around" networks isn't going to be very useful, especially when you don't want stuff wandering around all your networks in the first place.
What might be useful is machines that raise an alert when they think something is going wrong, or even quarantine themselves (or networks). I believe such systems already exist.
Anyway, just put some controls over info flow via firewalls and proxies. Then get use
Re: (Score:2)
I've tried explaining computer technology to my retired relatives..
Me: "Ok, here's your power cable - that plugs into the back of the base unit just like your DVD player. The cable here goes to the screen just like the SCART connctor to the TV. Now this is the keyboard which is just like a typewriter keyboard, and this is the mouse...."
Relative: "What? Where's the mouse? That plastic thing there? It doesn't look much like a mouse to me. Where are it's whiskers, feet and tail?"
Me: "OK, let's call it an input
Re: (Score:2)
The "ant" terminology comes from the chaos/complexity/emergent phenomena fields. Individual ants are stupid, but the behaviour of the colony is not.
It's a technical term from a non-computing field, not a metaphor.
Re: (Score:1)
I can't see anything new either. Let's think about this. There are processes that look for suspicious files or configuration and does something about it. Surely the fundamentals haven't change, you still have to find a threat and then act on it. The article has conveyed no new information.
Re:ridiculous references (Score:5, Funny)
Obviously nothing is "traveling" inside your lan cable.
So why does your network crawl all of or sudden ?
Re: (Score:1)
The EU Serenity Project is using the same approach (Score:4, Interesting)
The Serenity Project [serenity-project.org] in the European Union is using the same approach. They call it "Ambient Intelligence(AmI)." The level of intelligence in the Serenity project may be indicated by the fact that, at present, 2009-09-26, 02:47 PDT, there is no space before "(AmI)". The Ambient Intelligence in the Serenity Project is very low, apparently.
Someone who worked for SAP Labs France [sap.com] told me the SAP Labs France part of the Serenity Project is so poorly managed that smart people leave as soon as they can find other jobs.
Apparently the only way of providing security that actually works is the Open BSD method [openbsd.org]: Audit the code. No number of "ants" can provide the security of audited code.
Want more biological humor? Read about SAP's customer-focused ecosystem [sap.com]. It supposedly fosters "... an ideal environment for ongoing innovation and value creation..." Biological references are apparently the hot new thing in corporate-speak. Biological references concerning computers are very useful to people who have no technical knowledge and don't want any, because they are so vague the speaker can never be found wrong.
Re: (Score:2)
It implies you can put a stop to them by pouring boiling water on their nest!
Re: (Score:1)
Grasshopper: When the water rises the phish eat the ants, and when the water falls the ants eat the phish.
Re: (Score:2)
Re: (Score:2)
If they stopped the stupid nature reference it wouldn't be impressive at all and you'd realise they had made something completely useless.
1. If you know enough about a security threat to detect it, then you also know enough about the threat to actually prevent it.
This is computer security(where you can have complete security) not physical security(where all it takes is time to bypass).
2. These 'ants' are software running on infected machines, and thus any response they give can't be trusted.
3, you want to f
Re: (Score:1)
I believe the "stupid nature reference" is just to state where they got their inspiration from, and it also serves as a non-technical analogy that laymen can understand. It's a pretty standard practice that you'll find in many CS textbooks. Also, you're making a lot of assumptions and outright illogical statements.
1. You clearly aren't very knowledgeable about network/system security. Sure, you can have complete security if you leave your computer off or don't connect it to an external network, but that's n
Re: (Score:2)
They couldn't come up with a decent analogy involving drunken cheerleaders?
Re: (Score:2)
..a decent analogy...
involving automobiles is what is needed.
Re: (Score:3, Funny)
Because hearing "Drunken cheerleader" and "virus" in the same sentence kinda spoils the fantasy.
Imagination. Use it. (Score:1)
Re: (Score:1)
Oh great, now the blackhats will just start using "ant" tech to create their botnets. One will find a big cache of bank data, start shouting, "hey guys, here's a goldmine!" and they'll go nom nom nom all over our computer networks. Sheesh, just require admin password for the installation and first run of ALL executable code.
Obvious questions. (Score:3, Insightful)
Re: (Score:3, Funny)
My idea for network security would be this:
Measure network traffic for a normal week or two, no limitations. Everyone should do the things they usually need to do. Ports, Types of traffic, etc. and Bandwidth is recorded.
Then the admin creates a firewall setting from that (hopefully automatically).
In the following weeks, differences to the behavior is measured, allowing the admin to extend or restrict the rules.
And it would have colorful buttons.
Re: (Score:2)
And walk straight into pitfall #1 with punji sticks in it.
What if there is already something wrong with your network. I should send your comment to Marcus J. Ranum sometime, he's always amused by these ideas.
You HAVE to know exactly what is on the network, not making assumptions that it is clean. Examine everything, catalog everything. Deny all, permit known.
Re: (Score:1)
In the heirarchy of information technology it's the role of the Network Administrator (NA) to identify and defeat threats to the network and its nodes, to be the enterprise's last line of defense against the leakage of proprietary or sensitive information and to defend each node not just against the wider world but also against each other. The network is not a trusted space no matter how many firewalls you have, and it was never intended to be. Far more attention is paid these days to connectivity. Disco
I can defeat the ants (Score:5, Funny)
I just gotta run..
%SystemRoot%\system32\magnify.exe
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Taking the analogy further... (Score:3, Insightful)
In nature, an ant can get infected by many kinds of fungus, and when they return to the colony or meet another ant, the fungus can spread to another host.
Similarly, deploying this kind of "digital agents systems" opens another path of transmission for viruses and worms.
It's nice to see that some people are still active in this research area, but does anyone knows of a product that actually use such a principle for real?
Re:Taking the analogy further... (Score:4, Interesting)
Re: (Score:2)
Well, we already have bit rot.
Re: (Score:2)
Similarly, deploying this kind of "digital agents systems" opens another path of transmission for viruses and worms.
I think they are talking more like digital observers, sort of like a multi-threaded passive search as opposed to a huge beam laser like contemporary virus programs use. As long as this new element uses no added privileges over any other read authorized thread then this doesn't add a path for transmission but it does increase the search area. It also decentralizes the virus protection protocols allowing the system to function despite basic malware attacks on the root level virus protection. Imagine if your v
Re: (Score:3, Interesting)
but does anyone knows of a product that actually use such a principle for real?
Yes. Ants [sourceforge.net]
It's a p2p program that uses a similar principle to vastly increase user anonymity. Currently, the only downside of the program (that I've noticed) is that it is in such minimal usage. The ant-like functionality of it, however, is really quite intelligent.
I'm looking for a new hobby (Score:3, Funny)
Re:I'm looking for a new hobby (Score:4, Funny)
We've got Worms and Spiders, now Ants!? I'm going to have to find a new hobby; computing doesn't seem very entomophobiac-friendly.
We started with bugs years ago. It was only a matter of time before everyone else moved in.
Let's use another analogy (Score:4, Funny)
The internet is a lady of ill repute. My approach to security when "connected" to the internet is like 3 layers (hardware firewall, running as unprivileged user, whitelisting javascript/flash) of prophylactic separated by 2 layers of Deep Heat (logging, and tripwire). If either of the outer layers are "breached", I get a prompt warning.
I for one... (Score:2)
Re: (Score:2)
Rather than humour it is a satirical stab at the meme itself. Consider the irony in using this phrase in reference to "ants" (the original subject of the phrase) when most in most instances of this phrase being used in popular culture the subject is typically replaced with something that has no link or connection to the original.
The meme became irksome because it could be (and was) used in most any circumstance where a new and unconventional technology emerged that was fundamentally different to its already
Re: (Score:2)
That's overladies to you buddy. Hello from your ant Mabel.
Re: (Score:2)
Ants vs. Worms sounds like a great video game.
Re: (Score:1)
Or, use Windows.
Re: (Score:1)
So... bugs? (Score:5, Funny)
If I wanted 3000 bugs swarming inside my computer i'd run Windows.
Re: (Score:3, Funny)
If I wanted 3000 bugs swarming inside my computer i'd run Windows.
This is why, even with just one hard drive, I always load drivers for RAID.
Re: (Score:2)
Ants aren't bugs. They're insects! :P
Bound to fail (Score:4, Insightful)
Taking the obvious problems with this approach aside (using viral programs to identify viral infections), it should be easy to distract the flock of "ants" by one or more decoy infection(s), and then start the 'real' infection on the "other side" of the network. The "ants" have built a highway of warning signs towards the decoy(s), so the probability of ants traversing to the 'really' infected machines is lowered.
It's always fun to apply theories from one field of CS (namely optimization) to another (security), but if you give it a short thought, you know this can't be a good idea. It wouldn't be science if they didn't test that hypothesis, but I certainly hope they're not that stupid to test it in production systems.
Re: (Score:1)
How long before malicious ants will appear? (Score:3, Insightful)
Having anything "crawl" through your network seems like a huge security risk to me. Any security solutions will have be aware of those crawlers and allow them to crawl from computer to computer. What's to stop viruses to simply impersonate such crawling ant - free pass to every computer on the network!
Another problem may be as they all "converge" on threats. What is they bug down the target machine, or the network? If my browser cookie looks "yummy" to the "ant" (no pun intended - browser cookie may be classified as a threat), next thing I know my network interface is crawling with these "ants"! My administrator cannot log in because of all the ants plugging my bandwidth!
like in nature there's always a hack: Phorid flies (Score:3, Insightful)
So yeah, I think I know how this story of swarming ants are going to turn out.
just more bugs (Score:4, Funny)
everything evolves, it will constantly change (Score:1)
The one paralled in nature, I think, is that the whole offense/defense is an evolving dynamic system. There will never be a 'done.'
New attacks will be found/invented each time a new defense is found for existing threats.
For me, it is 'so far, so good!' in using Debian stable, and an unpriviledged user, sudo'ing as needed.
RAID? (Score:2)
Redundant array of inexpensive disks is good! :)
When can we expect the first "fire ant" malware? (Score:2)
n/t
ObReference to Mute (Score:2)
Obligatory reference to MUTE, an anonymous p2p system for file sharing which is apparently based on the process by which ants find food: http://mute-net.sourceforge.net/howAnts.shtml [sourceforge.net]
analogy != idea (Score:2)
Our idea is to deploy 3,000 different types of digital ants, each looking for evidence of a threat
That's not an "idea", that's an analogy. An analogy with nature is a nice way of explaining something, not an idea.
There "idea" seems to be that if there is evidence of an infection, then the infected system should be examined further for evidence of other infection. I'm not sure why that's useful. Why not investigate all systems for all infections? Why continue to run an infected system at all?
it is progra
Re: (Score:1)
ants??? ants!!! (Score:2)
There is no way i let ants in my box.
Lemme buy some insecticide.
You got ants.... I got predators (Score:2)
Or better still, uncles, a type of ant that fights network ants, scattering them and making them useless.
How long? (Score:2)
These are not the ants you are looking for... (Score:2, Interesting)
HP did this 15+ years ago for network management (Score:2)
Hewlett Packard did this 15+ years ago for purposes of device discovery and management.
They had a constrained abstract machine environment in some of their products that was intended to be "infected" by one of their worker programs.
Worker code would "infect" a machine, would send back reports about the machine, would serve as a contact point for management, and try to propagate itself to other machines.
what if ants take over? (Score:2)
which step here involves 'When wintertime rolls around, the gorillas simply freeze to death'? Is it the one that comes right before the 'Profit' line?
reminds me of something (Score:1)
Old idea (Score:1)