PolySwarm is a threat intelligence marketplace with Microengines supplying intelligence, Ambassadors brokering access to the intelligence and Arbiters determining ground truth, mediating the marketplace.
How it works (refer to this illustration):
- An Ambassador "bounties" a suspect
artifact(a file, URL, IP address or domain) on behalf of its customer.
- Microenginess are alerted to the bounty and decide whether the artifact is within their area of expertise.
- If the Microengines feels that it is able to correctly categorize the artifact as malicious or benign, it produces an
assertionand places a
stakeof money in the form of a token, Nectar (NCT), on that
- The Ambassador considers all the Microengines'
assertionsand returns a
verdictto their customer.
- Some time passes.
- Arbiters offer ground truth regarding the malintent of the artifact.
- Microenginess whose
assertionsmatch ground truth are rewarded with the escrowed funds of Microenginess that disagreed.
For full details, please refer to the PolySwarm whitepaper.
Going forward, Engines is a blanket term for both Microengines and Arbiters.
Engines have gone through a major revision at PolySwarm. Webhooks have replaced websockets as the means to receive new Bounties. This means Engines only receive Bounties containing artifacts that the Engine is configured to process. Engines no longer have to filter the bounties themselves, reducing the complexity and total time to scan.
The webhook bounty flow is summarized in the following list.
- PolySwarm sends a relevant bounty webhook to the Engine's HTTP server.
- Engine validates that PolySwarm is the sender by checking the signed HMAC against the body using a shared secret.
- The scan is started, using some concurrency tool to keep the server from being blocked.
- Engine responds with
- During the scan, the Engine fetches the artifact according to the given artifact uri.
- After the scan, the Engine sends a response to the given response uri.
Microengines offer threat intelligence in exchange for NCT.
Microengines are developed by individuals or organizations who have a knack for identifying malware. If you have unique insight into a particular malware family, class, file type, etc and want to access samples, boost your engine reputation, and earn money/tokens (NCT), then you want to develop a Microengine!
Microengines encapsulate security expertise in an autonomous process that earns Nectar (NCT) rewards for accurately identifying new strands of malware.
- Are notified of bounties by a webhook call
- Download artifacts from PolySwarm
- Scan/analyze the artifacts
- Determine a Nectar (NCT) bid value
- Deliver an assertion (their
bid) back to the marketplace
Ready to develop your first Engine and start earning NCT?
Arbiters are paid (via marketplace transaction fees) to determine ground truth.
Arbiters marshall the marketplace by way of determining "ground truth". The Arbiter-derived ground truth is used to determine which Microengines are correct and thus rewarded.
PolySwarm is manually selecting Arbiters at this time, but we plan to develop a process where a Microengine can be promoted to an Arbiter, based on performance.
Developing Microengines and Arbiters is a virtually identical process. As a first step, we'll need to set up a development environment.
Ambassadors place bounties (artifacts + NCT) and receive timely crowdsourced threat intelligence in response.
Swarm Technologies is the only Ambassador currently supported by the PolySwarm Marketplace. Enterprises seeking to query PolySwarm for threat intelligence may purchase a subscription directly from Swarm Technologies