Experts

Profile image for Errin Fulp

Errin Fulp

Professor of Computer Science

Fulp is an expert in cyber security and computer networks.

Biography

Errin Fulp is an expert in cyber security and computer networks. As cyber attacks become an increasing concern to national security and personal privacy, Fulp has focused his research on issues related to the next generation of high-speed and QoS-enabled networks and prediction methods for critical computer failures. Recently, his research group developed a genetically inspired algorithm that leverages the concept of “survival of the fittest” to fighting the continual evolution of Read More »

Errin Fulp is an expert in cyber security and computer networks. As cyber attacks become an increasing concern to national security and personal privacy, Fulp has focused his research on issues related to the next generation of high-speed and QoS-enabled networks and prediction methods for critical computer failures. Recently, his research group developed a genetically inspired algorithm that leverages the concept of “survival of the fittest” to fighting the continual evolution of viruses, worms and malware. Fulp’s team aims to improve defense mechanisms of computing infrastructures with minimal human interaction by developing the first-ever automated computer configurations that adjust as quickly as the threats. In an ongoing project with scientists at Pacific Northwest National Laboratory (PNNL), Fulp is training an army of “digital ants” to turn loose into the power grid to seek out computer viruses trying to wreak havoc on the system. The project has received national attention, leading one of the graduate students under Fulp’s mentorship to be named one of the “nation’s top new inventors” by Inventor’s Digest magazine. And in a National Science Foundation (NSF) sponsored research project, Fulp and William Turkett, an assistant professor of computer science, are investigating how the usage and intent of Internet users can be discerned based on interaction patterns. The method is inspired by techniques initially developed for bioinformatics, and can be used to better manage network resources and enforce network security policies. Fulp is also currently leading an interdisciplinary group of faculty in creating an academic center dedicated to the study and teaching of bio-inspiration and biomimicry, a discipline that applies nature’s design principles to develop innovative new ways of thinking. In addition to NSF and PNNL, many prominent national agencies, foundations, and corporations – including AFOSR, DARPA, Lawrence Livermore National Laboratory, NEC C&CRL USA, Shively Family Fellowship, and U.S. Department of Energy – have sponsored his research.

Media Appearances

Popular Mechanics makes 110 predictions for the next 110 years

Io9

December 17, 2012

2012 - 2022 Digital "ants" will protect the U.S. power grid from cyber attacks. Programmed to wander networks in search of threats, the high-tech sleuths in this software, developed by Wake Forest University security expert Errin Fulp, leave behind a digital trail modeled after the scent streams of their real-life cousins. When a digital ant designed to perform a task spots a problem, others rush to the location to do their own analysis. If operators see a swarm, they know there's trouble...

Can 'digital ants' protect computer networks?

InfoSecurity

June 1, 2011

This type of "swarming intelligence", say researchers, is at the heart of the software under development and, claims Errin Fulp, the university's professor of computer science, has the ability to monitor an electrical power grid, looking of all types of malware. If the approach proves successful in safeguarding the power grid, Fulp's team say it could have wide-ranging applications on protecting anything connected to SCADA (Supervisory Control and Data Acquisition) networks, the computer systems that control everything from water and sewer management systems to mass transit systems to manufacturing systems...

Cyber 'ants' patrol PC networks against computer worms and other threats

Gizmag

September 29, 2009

"Our agents use an ant model for movement, feeding, spawning, and dying," Prof. Errin Fulp, who led the team's research efforts, explained to us in an e-mail. "ACO algorithms do the same, but an important difference is that our agents aren't working to achieve a one-time goal. Instead, for our system, the goal is more dynamic, the agents continually move looking for food, which they are given if they find evidence of a security event. Of course they can die if they are not successful."...

Articles

Predicting Computer System Failures Using Support Vector Machines

Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure and limit the impact. Such strategies are especially important for multi-computer ...

Optimization of network firewall policies using ordered sets and directed acyclical graphs

Firewalls enforce a security policy by inspecting and filtering traffic arriving or departing from a secure network. This is typically done by comparing an arriving packet to a list of rules and performing the matching rule action, which is accept or deny. ...

Bandwidth provisioning and pricing for networks with multiple classes of service

Network service providers purchase large point-to-point connections from network owners, then offer individual users network access at a price. Appropriately provisioning (purchasing) and allocating (pricing) connections remains a difficult problem due to ...

Paying for QoS: an optimal distributed algorithm for pricing network resources

Network applications require certain individual performance guarantees that can be provided if enough network resources are available. Consequently, contention for the limited network resources may occur. For this reason, networks use flow control to manage ...

On-line dynamic bandwidth allocation

Network multimedia applications require certain performance guarantees that can be provided through proper resource allocation. Allocation techniques are needed to provide these guarantees as efficiently as possible since resources are limited. This paper presents an allocation method called Dynamic Search Algorithm (DSA+)...

All Experts

More Information

Areas of Expertise

  • Cyber Security
  • Computer Networks
  • Computer Configurations
  • Bio-Inspiration and Biomimicry
  • Moving Target Defense
  • Multimedia Systems
  • Simulation
  • Programming Languages
  • Deploying “Digital Ants” on the Power Grid
  • Genetically Inspired Computer Configurations to Fight Cyber Threats
  • Determining Network Usage and Intent Based on Interaction Patterns
  • Quality of Service (QoS) Management and Related Security Issues
  • Dynamic Resource Allocation
  • Peer-to-Peer Systems
  • Failure Prediction and Management
  • Network Pricing and Auctions

Education

North Carolina State University: Ph.D., Computer Science

North Carolina State University: M.S., Computer Science

North Carolina State University: B.A., Computer Science

Contact

Television Studio

Wake Forest University’s Office of News and Communications operates a fully equipped, professional television studio to connect faculty members and campus newsmakers with global news media.

Learn More