Skip to Main Content
Boston University
  • Bostonia
  • BU-Today
  • The Brink
  • University Publications

    • Bostonia
    • BU-Today
    • The Brink
Other Publications
BU-Today
  • Sections
News, Opinion, Community

Information security symposium draws more than 200 researchers

"Computational immunology" predicts biological concepts could protect computers"

April 18, 2006
  • Brian Fitzgerald
Twitter Facebook
Stephanie Forrest: Use biological design principles to defend computer networks against viruses and hackers. Photo by Linda Haas

Because both humans and computers are vulnerable to viruses, some computer scientists have started to look at the ways that living organisms ward off infectious agents, hoping that similar defenses can be applied to machines. Stephanie Forrest, a pioneer in computational immunology, discussed her groundbreaking research in that emerging discipline at the symposium Information Security and Privacy, held at BU on April 10.

Forrest’s talk, titled Computation in the Wild, was one of several lectures in the daylong symposium at the School of Management. The event, which also included two panel discussions, drew more than 200 researchers and marked the inauguration of BU’s Center for Reliable Information Systems and Cyber Security (RISCS), established last summer to promote and coordinate research on ways to reduce computer security risks.

Computational immunology is one of most adventurous methods now on the drawing boards. “Biological design principles are providing new insights in the field of computer security,” said Forrest, a computer science professor at the University of New Mexico, whose 2002 research paper, also titled “Computation in the Wild,” explores similarities between computer systems and biological systems. Forrest argues that we can learn lessons from biological immune systems to protect computers in the “software ecosystem” that now exists.

A decade ago, Forrest’s ideas were met with skepticism, but times — and the complexity of computer systems — have changed. England’s Department of Trade and Industry, in partnership with the Royal Mail and King’s College London, is currently developing the Computational Immunology Fraud Detection System (CIFD) to spot unusual financial transactions. Using Forrest’s theories, CIFD will fight commercial fraud by employing hundreds of thousands of software “antibodies” that detect anomalies in the Royal Mail’s extensive database of over-the-counter transactions — much like the way natural immune systems scans cells for foreign bodies.

Forrest and her colleagues recently developed a prototype network intrusion-detection system called LISYS (lightweight intrusion detection system) that combines properties of human T cells, B cells, and antibodies. The acronym is a play on the word lysis, the process by which the immune system destroys bacteria by rupturing the bacterial membrane.

 “If you look at how infections spread through human populations,” Forrest said, “you see that we are dependent on genetic diversity to fight diseases. Each one of us has something unique in our immune systems. We can apply that quality to software by introducing changes to make each system unique. Computers are still susceptible to attack because of homogeneity — in many ways they’re all the same.”

Based on Forrest’s notion of “artificial heterogeneity,” she and fellow researchers at the University of New Mexico are developing something called randomized instruction set emulation (RISE), a method of defense that performs a hidden randomization of a computer application’s machine code — each piece of software is subtly changed from the others. “Computers are easy targets for standardized binary code injection attacks,” she said. “But this introduces changes so an attacker can’t find a common point of entry.”

Margrit Betke, a College of Arts and Sciences associate professor and director of undergraduate studies in the computer science department, said she was impressed with Forrest’s lecture. “It provided insights into how we can take ideas from biological mechanisms and use them to boost the immune systems of computers,” said Betke. “It’s a fine example of using an interdisciplinary approach to solve a problem.”

 

Explore Related Topics:

  • Computers
  • lectures
  • Research
  • Share this story

Share

Information security symposium draws more than 200 researchers

Share

  • Twitter
  • Facebook
  • Reddit
  • LinkedIn
  • Email
  • Print

Latest from BU Today

  • Varsity Sports

    Women’s Basketball Advances to Patriot League Semifinals for First Time

  • Student Life

    Terriers in Charge: Elizabeth Slade (ENG’20)

  • Varsity Sports

    Men’s Basketball Terriers Go Head-to-Head with Colgate in Patriot League Championship Wednesday in New York

  • University News

    BU Puts Plan for Remote Learning in Place if Coronavirus Forces Campus Closure

  • Student Life

    Terriers in Charge: Valerie Nam (Sargent’20)

  • Varsity Sports

    BU Men’s Basketball Advances to Patriot League Semifinals, Hosts Bucknell Sunday

  • Fine Arts

    Accurate Art

  • Things-to-do

    Spring Break in Boston? There’s Lots on Offer

  • Varsity Sports

    Men’s Lacrosse Hungry to Take Program to Next Level

  • Campus Life

    BU Suspends Out-of-State Alternative Service Break Trips as Coronavirus Spreads

  • Student Clubs

    What’s New, What’s Hot on WTBU

  • Voices & Opinion

    POV: We Need Unemployment Insurance to Protect Workers and the Economy from Coronavirus

  • In the City

    Getting to Know Your Neighborhood: Roxbury

  • Arts & Culture

    Creator and Cast of ABC’s A Million Little Things Visits BU Tomorrow, Will Screen Latest Episode

  • Varsity Sports

    Women’s Lacrosse Sees Offense as Key to a 2020 Patriot League Championship

  • Computational Science

    Game Changer: Azer Bestavros’ Journey from Egypt to Cambridge to BU’s Computing Mastermind

  • Coronavirus

    Explaining BU’s Coronavirus Plan

  • Construction

    Private Development Project Advances Albany Street Makeover

  • University News

    BU Launches Coronavirus Website

  • Politics

    Video: Students on the Issues That Matter Most to Them in the 2020 Presidential Election

Section navigation

  • Sections
  • Must Reads
  • Videos
  • Series
  • Close-ups
  • Archives
  • About + Contact
Get Our Email

Explore Our Publications

Bostonia

Boston University’s Alumni Magazine

BU-Today

News, Opinion, Community

The Brink

Pioneering Research from Boston University

  • Twitter
  • Facebook
  • Youtube
  • Linked-In
© Boston University. All rights reserved. www.bu.edu
© 2025 Trustees of Boston UniversityPrivacy StatementAccessibility
Boston University
Notice of Non-Discrimination: Boston University policy prohibits discrimination against any individual on the basis of race, color, religion, sex, age, national origin, physical or mental disability, sexual orientation, gender identity, genetic information, military service, pregnancy or pregnancy-related condition, or because of marital, parental, or veteran status, and acts in conformity with all applicable state and federal laws. This policy extends to all rights, privileges, programs and activities, including admissions, financial assistance, educational and athletic programs, housing, employment, compensation, employee benefits, and the providing of, or access to, University services or facilities. See BU’s Equal Opportunity/Affirmative Action Policy.
Search
Boston University Masterplate
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Information security symposium draws more than 200 researchers
0
share this