Genetics Inspired Research Prevents Cyber Attacks

Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.

Now Wake Forest University researchers are fighting the continual evolution of viruses, worms and malware with evolution by developing the first-ever automated computer configurations that adjust as quickly as the threats.

Computer Science Associate Professor Errin Fulp and graduate student Michael Crouse are refining a genetically inspired algorithm that proactively discovers more secure computer configurations by leveraging the concept of “survival of the fittest.” Early simulations have shown the increased diversity of each device’s configuration improves overall network safety, without putting undue stress on IT administrators.

“Typically, administrators configure hundreds and sometimes thousands of machines the same way, meaning a virus that infects one could affect any computer on the same network,” says Crouse, who was recently named one of the “nation’s top new inventors” by Inventor’s Digest magazine. “If successful, automating the ability to ward off attacks could play a crucial role in protecting highly sensitive data within large organizations.”

Funded by a grant from Pacific Northwest National Laboratory (PNNL), the researchers aim to improve defense mechanisms of similar computing infrastructures with minimal human interaction.

Cyber attacks usually take place in two phases, says Fulp. In the reconnaissance phase, a virus simply observes the landscape, identifies possible defense mechanisms and looks for the best way in. If nothing has changed since the reconnaissance phase upon return, the virus strikes. But security experts say even the slightest change in environment can make a huge difference in deterring potential attackers.

“If we can automatically change the landscape by adding the technological equivalent of security cameras or additional lighting, the resulting uncertainty will lower the risk of attack,” Fulp says.

Researchers are currently testing their work to transform cyber security. Planned assessment includes integrating the automated system into the computer science department’s annual “hackathon,” giving budding developers the opportunity to improve the system.

Though no one has successfully modeled this complex process before, this is not the first time Fulp and Crouse have turned to nature to guide their research. Read more about their bio-inspired projects to improve cyber security here.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.