Skip to Main Content
Boston University
  • Bostonia
  • BU Today
  • The Brink
  • University Publications

    • Bostonia
    • BU Today
    • The Brink
  • School & College Publications

    • The Record
Other Publications
BU Today
  • Sections
News, Research, Community

Information security symposium draws more than 200 researchers

"Computational immunology" predicts biological concepts could protect computers"

April 18, 2006
  • Brian Fitzgerald
Twitter Facebook
Stephanie Forrest: Use biological design principles to defend computer networks against viruses and hackers. Photo by Linda Haas

Because both humans and computers are vulnerable to viruses, some computer scientists have started to look at the ways that living organisms ward off infectious agents, hoping that similar defenses can be applied to machines. Stephanie Forrest, a pioneer in computational immunology, discussed her groundbreaking research in that emerging discipline at the symposium Information Security and Privacy, held at BU on April 10.

Forrest’s talk, titled Computation in the Wild, was one of several lectures in the daylong symposium at the School of Management. The event, which also included two panel discussions, drew more than 200 researchers and marked the inauguration of BU’s Center for Reliable Information Systems and Cyber Security (RISCS), established last summer to promote and coordinate research on ways to reduce computer security risks.

Computational immunology is one of most adventurous methods now on the drawing boards. “Biological design principles are providing new insights in the field of computer security,” said Forrest, a computer science professor at the University of New Mexico, whose 2002 research paper, also titled “Computation in the Wild,” explores similarities between computer systems and biological systems. Forrest argues that we can learn lessons from biological immune systems to protect computers in the “software ecosystem” that now exists.

A decade ago, Forrest’s ideas were met with skepticism, but times — and the complexity of computer systems — have changed. England’s Department of Trade and Industry, in partnership with the Royal Mail and King’s College London, is currently developing the Computational Immunology Fraud Detection System (CIFD) to spot unusual financial transactions. Using Forrest’s theories, CIFD will fight commercial fraud by employing hundreds of thousands of software “antibodies” that detect anomalies in the Royal Mail’s extensive database of over-the-counter transactions — much like the way natural immune systems scans cells for foreign bodies.

Forrest and her colleagues recently developed a prototype network intrusion-detection system called LISYS (lightweight intrusion detection system) that combines properties of human T cells, B cells, and antibodies. The acronym is a play on the word lysis, the process by which the immune system destroys bacteria by rupturing the bacterial membrane.

 “If you look at how infections spread through human populations,” Forrest said, “you see that we are dependent on genetic diversity to fight diseases. Each one of us has something unique in our immune systems. We can apply that quality to software by introducing changes to make each system unique. Computers are still susceptible to attack because of homogeneity — in many ways they’re all the same.”

Based on Forrest’s notion of “artificial heterogeneity,” she and fellow researchers at the University of New Mexico are developing something called randomized instruction set emulation (RISE), a method of defense that performs a hidden randomization of a computer application’s machine code — each piece of software is subtly changed from the others. “Computers are easy targets for standardized binary code injection attacks,” she said. “But this introduces changes so an attacker can’t find a common point of entry.”

Margrit Betke, a College of Arts and Sciences associate professor and director of undergraduate studies in the computer science department, said she was impressed with Forrest’s lecture. “It provided insights into how we can take ideas from biological mechanisms and use them to boost the immune systems of computers,” said Betke. “It’s a fine example of using an interdisciplinary approach to solve a problem.”

 

Explore Related Topics:

  • Computers
  • Research
  • Share this story

Share

Information security symposium draws more than 200 researchers

Share

  • Twitter
  • Facebook
  • Reddit
  • LinkedIn
  • Email

Latest from BU Today

  • Things-to-do

    This Weekend @ BU November 13 to 16

  • Campus Life

    BU Launches Online AI Course For Undergrads; Additional AI Resources for Faculty, Staff

  • University News

    Round of Applause: Craig Childress

  • Visual Arts

    New 808 Gallery Exhibition Showcases Faculty, Alumni Artwork

  • Varsity Sports

    BU Men’s Basketball Hosts Brown in Season Home Opener

  • Varsity Sports

    BU Men’s Soccer Heads to Lehigh for Patriot League Semifinal Tuesday

  • Watch Now

    Video: Leaders Among Us—President Gilliam in Conversation with BU Community

  • University News

    Boston University Tanglewood Institute to Celebrate 60th Anniversary

  • Student Life

    Networking Doesn’t Have to Make You Cringe

  • Campus Life

    BU Food Pantry Helps Students Facing Food Insecurity

  • Fine Arts

    BU, MassArt, Tufts Open Fine Arts Studios to the Public for Second Annual Event

  • Faculty

    Office Artifacts: Leslie Dietiker

  • Varsity Sports

    Chasing Titles: BU Women’s Soccer, Field Hockey Ready for Patriot League Semifinals

  • Things-to-do

    This Weekend @ BU: November 6 to 9

  • Student Life

    Comm Ave Runway: November Edition

  • New to FitRec? Here’s What You Need to Know

  • Watch Now

    Two New Visual Arts Programs Help Boston Medical Center Residents and Fellows Hone Their Skills as Clinicians

  • University News

    BU Seeks Your Input About Campus Spaces

  • Varsity Sports

    BU Women’s Basketball Still Dreaming Big, Eager to Bounce Back This Season

  • Music

    Zombies Attack BU—in Dear Abbeys New Music Video

Section navigation

  • Sections
  • Must Reads
  • Videos
  • Series
  • Close ups
  • Archives
  • About + Contact
Get Our Email

Explore Our Publications

Bostonia

Boston University’s Alumni Magazine

BU Today

News, Research, Community

The Brink

Pioneering Research from Boston University

  • Twitter
  • Facebook
  • Youtube
  • LinkedIn
  • Instagram
  • Weibo
  • TikTok
© Boston University. All rights reserved. www.bu.edu
© 2025 Trustees of Boston UniversityPrivacy StatementAccessibility
Boston University
Notice of Non-Discrimination: Boston University prohibits discrimination and harassment on the basis of race, color, natural or protective hairstyle, religion, sex or gender, age, national origin, ethnicity, shared ancestry and ethnic characteristics, physical or mental disability, sexual orientation, gender identity and/or expression, genetic information, pregnancy or pregnancy-related condition, military service, marital, parental, veteran status, or any other legally protected status in any and all educational programs or activities operated by Boston University. Retaliation is also prohibited. Please refer questions or concerns about Title IX, discrimination based on any other status protected by law or BU policy, or retaliation to Boston University’s Executive Director of Equal Opportunity/Title IX Coordinator, at titleix@bu.edu or (617) 358-1796. Read Boston University’s full Notice of Nondiscrimination.
Search
Boston University Masterplate
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Information security symposium draws more than 200 researchers
0
share this