Advertisement

The nature lover’s guide to cybersecurity

Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using defense mechanisms found in nature.

Imitation, it’s said, is the sincerest form of flattery. It is also antithetical to innovation, which is supposed to be entirely new. No one wants to be accused of plagiarism, right? Today, though, being a “copycat” is de rigueur if the source material comes from nature.

Biomemetics, or, as it’s popularly known, “biomimicry,” is a fast-growing field in which researchers explore how animals, plants, humans, and even micro-organisms perform certain tasks, and appropriate their designs to endow technologies with the same powers. Rather than re-invent the wheel, developers of medicine, agriculture, the military, fashion, computers and more are making improvements based on what already exists in the natural world.

The implications are many, and varied. Nature already precedes human ingenuity in a plethora of ways, scientist Janine M. Benyus points out in her book, “Biomimicry: Innovation Inspired by Nature”:

“Our most clever architectural struts and beams are already featured in lily pads and bamboo stems. Our central heating and air-conditioning are bested by the termite tower’s steady 86 degrees F. Our most stealthy radar is hard of hearing compared to the bat’s multifrequency transmission. And our new ‘smart materials’ can’t hold a candle to the dolphin’s skin or the butterfly’s proboscis. Even the wheel, which we always took to be a uniquely human creation, has been found in the tiny rotary motor that propels the flagellum of the world’s most ancient bacteria.”

Advertisement

Modern innovators, too, are taking cues from nature—including designers of new technologies.

  • The soles of geckos’ feet recently helped a Stanford University researcher develop an adhesive allowing robots to climb buildings and other smooth surfaces.
  • A new type of robotic arm designed after elephants’ trunks is said to be powerfully strong and flexible, able to expand and contract by deflating sacs between the “vertebrae”).
  • The fins of humpback wales inspired improvements to fan and turbine blades that reduce drag, increase speed, and improve energy efficiency (Read “14 Smart Inventions Inspired by Nature: Biomimicry.”)

JR-Reagan-Deloitte-portrait

Now biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using defense mechanisms found in nature.

Bornean moths, for instance, protect themselves from birds by creating leaf tents. Using a similar principle, “data masking” shields sensitive personal information from unauthorized viewers by replacing it with phony data.

Advertisement

The chameleon protects itself from predators by changing colors to blend in with its surroundings, rendering itself nearly invisible. In cybersecurity, steganography disguises sensitive data to make it look like something else: a picture of a flower, perhaps, or a music file.

Ants and bees work collaboratively to accomplish such tasks as hive or nest building, defense, and repair. Cybersecurity researchers apply “swarm intelligence” in various ways. In one project, “digital ants” constantly monitor systems for anomalies such as malware, and drop “markers” where unusual activity occurs, similar to the pheromonal markers ants place along paths to food. When enough markers appear at a location, an alarm is triggered.

The body’s immune system is a popular source of inspiration for cybersecurity design: immunity-based systems are always on; alert to anything out of the ordinary; able to quickly rush in to attack and repair; and adaptive, “remembering” the intruder for increasingly efficient and effective defenses. Some data security systems operate similarly, knowing the “baseline” for normal behaviors such as the keystroke speeds and patterns of specific users in order to detect “insider”

What other functions might cybersecurity designers borrow from nature?

Capsids, the strong, stable containers housing viral DNA, assemble themselves automatically. Could we design digital security that does the same, with multiple organizations on a network all responding automatically and in sync to defend against an attack?

Advertisement

After leaving their chicks to find food, returning penguins can identify their offspring even in a crowd. How might we program our security systems to identify which users don’t belong, such as “advanced persistent threat” data thieves hiding in our networks?

Salmon hurl themselves upstream to spawn in the place where they were hatched. They then die, their life’s work completed. What if data, after serving its purpose, “expired” and disappeared, no longer vulnerable to theft?

It seems paradoxical, this borrowing from the natural world to safeguard a virtual one. But humans have engaged in biomimicry for eons, starting, perhaps, with wearing animal hides for warmth. Now, as then, we may find some of the best solutions to our problems in our own backyards—on nature’s path.

JR Reagan is the global chief information security officer of Deloitte. He also serves as professional faculty at Johns Hopkins, Cornell and Columbia universities. Follow him @IdeaXplorer. Read more from JR Reagan.

Wyatt Kash

Written by Wyatt Kash

Wyatt Kash is an award-winning editor and journalist who has been following government IT trends for the past decade. He joined Scoop News Group in June 2014, as Vice President of Content Strategy, where he heads up the company's content strategy and editorial product development. Prior to joining SNG, Mr. Kash served as Editor of , where he developed content and community relations for the government technology market, covering big data, cloud computing, cybersecurity, enterprise architecture, mobile technology, open government and leadership trends. Previously, he co-led an AOL start team, where he helped create, launch, manage and market an online news platform, featuring advanced social media strategies, aimed at government, defense and technology industry executives. Mr. Kash has also held positions with The Washington Post Co. and subsequently 1105 Media, as Editor-in-Chief of and , where he directed editorial strategy and content operations for print, online, and mobile products and industry events. Contact the writer at wyatt.kash@fedscoop.com or on Twitter at @wyattkash.

Latest Podcasts