Skip to Main Content
Boston University
  • Bostonia
  • BU Today
  • The Brink
  • University Publications

    • Bostonia
    • BU Today
    • The Brink
  • School & College Publications

    • The Record
Other Publications
BU Today
  • Sections
News, Research, Community

Information security symposium draws more than 200 researchers

"Computational immunology" predicts biological concepts could protect computers"

April 18, 2006
  • Brian Fitzgerald
Twitter Facebook
Stephanie Forrest: Use biological design principles to defend computer networks against viruses and hackers. Photo by Linda Haas

Because both humans and computers are vulnerable to viruses, some computer scientists have started to look at the ways that living organisms ward off infectious agents, hoping that similar defenses can be applied to machines. Stephanie Forrest, a pioneer in computational immunology, discussed her groundbreaking research in that emerging discipline at the symposium Information Security and Privacy, held at BU on April 10.

Forrest’s talk, titled Computation in the Wild, was one of several lectures in the daylong symposium at the School of Management. The event, which also included two panel discussions, drew more than 200 researchers and marked the inauguration of BU’s Center for Reliable Information Systems and Cyber Security (RISCS), established last summer to promote and coordinate research on ways to reduce computer security risks.

Computational immunology is one of most adventurous methods now on the drawing boards. “Biological design principles are providing new insights in the field of computer security,” said Forrest, a computer science professor at the University of New Mexico, whose 2002 research paper, also titled “Computation in the Wild,” explores similarities between computer systems and biological systems. Forrest argues that we can learn lessons from biological immune systems to protect computers in the “software ecosystem” that now exists.

A decade ago, Forrest’s ideas were met with skepticism, but times — and the complexity of computer systems — have changed. England’s Department of Trade and Industry, in partnership with the Royal Mail and King’s College London, is currently developing the Computational Immunology Fraud Detection System (CIFD) to spot unusual financial transactions. Using Forrest’s theories, CIFD will fight commercial fraud by employing hundreds of thousands of software “antibodies” that detect anomalies in the Royal Mail’s extensive database of over-the-counter transactions — much like the way natural immune systems scans cells for foreign bodies.

Forrest and her colleagues recently developed a prototype network intrusion-detection system called LISYS (lightweight intrusion detection system) that combines properties of human T cells, B cells, and antibodies. The acronym is a play on the word lysis, the process by which the immune system destroys bacteria by rupturing the bacterial membrane.

 “If you look at how infections spread through human populations,” Forrest said, “you see that we are dependent on genetic diversity to fight diseases. Each one of us has something unique in our immune systems. We can apply that quality to software by introducing changes to make each system unique. Computers are still susceptible to attack because of homogeneity — in many ways they’re all the same.”

Based on Forrest’s notion of “artificial heterogeneity,” she and fellow researchers at the University of New Mexico are developing something called randomized instruction set emulation (RISE), a method of defense that performs a hidden randomization of a computer application’s machine code — each piece of software is subtly changed from the others. “Computers are easy targets for standardized binary code injection attacks,” she said. “But this introduces changes so an attacker can’t find a common point of entry.”

Margrit Betke, a College of Arts and Sciences associate professor and director of undergraduate studies in the computer science department, said she was impressed with Forrest’s lecture. “It provided insights into how we can take ideas from biological mechanisms and use them to boost the immune systems of computers,” said Betke. “It’s a fine example of using an interdisciplinary approach to solve a problem.”

 

Explore Related Topics:

  • Computers
  • Research
  • Share this story

Share

Information security symposium draws more than 200 researchers

Share

  • Twitter
  • Facebook
  • Reddit
  • LinkedIn
  • Email

Latest from BU Today

  • WORLD CUP CALLOUT

    Is Your Country Playing in the World Cup? Tell Us!

  • SUPER BOWL LX

    Super Bowl Sunday: Where to Watch, What to Know

  • Campus Life

    Terriers Show Their School Pride for BU’s First Spirit Day

  • Organizational Behavior

    The Patriots Went from Worst to First. Can Businesses and Organizations Turn Around Too?

  • University News

    A Peek Inside What’s Happening at Warren Towers

  • Student Life

    From Boston to Vichy: BU Wheelock Launches New Study Abroad Program

  • Things-to-do

    This Weekend @ BU: February 5 to 8

  • Food

    Five Easy Snacks to Make for Your 2026 Super Bowl Party

  • University News

    Boston University Ranks 41st in Time’s Inaugural Ranking of World’s Top Universities

  • Books

    BU’s 2026 Ha Jin Lecturer, Award-Winning Novelist Garth Greenwell, on How Singing, Poetry Have Shaped His Fiction

  • Varsity Sports

    Men’s Beanpot Semifinal Recap 2026

  • Tips for students

    A Guide for CGS Students: How to Kick-Start Your BU Experience

  • Terrier Spirit Days

    First Terrier Spirit Day Is February 5—Wear Your BU Gear

  • Lady Gaga, Mister Rogers Revive Memories of Iconic BU Commencement Moment

  • Varsity Sports

    Men’s Hockey Terriers Out to Defend Their Reigning Beanpot Title

  • Religion

    BU Chaplains Panel to Discuss Fasting for Lent and Ramadan

  • Student Life

    Accounting vs Finance: What Is the Difference Between These Two Majors?

  • Campus Life

    Are You a Terrier Married to a Terrier? Tell Us About Your Wedding Proposal

  • Things-to-do

    This Weekend @ BU: January 29 to February 1

  • University News

    BU Launches New Faculty Development Office

Section navigation

  • Sections
  • Must Reads
  • Videos
  • Series
  • Close ups
  • Archives
  • About + Contact
Get Our Email

Explore Our Publications

Bostonia

Boston University’s Alumni Magazine

BU Today

News, Research, Community

The Brink

Pioneering Research from Boston University

  • Twitter
  • Facebook
  • Youtube
  • LinkedIn
  • Instagram
  • Weibo
  • TikTok
© Boston University. All rights reserved. www.bu.edu
© 2026 Trustees of Boston UniversityPrivacy StatementAccessibility
Boston University
Notice of Non-Discrimination: Boston University prohibits discrimination and harassment on the basis of race, color, natural or protective hairstyle, religion, sex or gender, age, national origin, ethnicity, shared ancestry and ethnic characteristics, physical or mental disability, sexual orientation, gender identity and/or expression, genetic information, pregnancy or pregnancy-related condition, military service, marital, parental, veteran status, or any other legally protected status in any and all educational programs or activities operated by Boston University. Retaliation is also prohibited. Please refer questions or concerns about Title IX, discrimination based on any other status protected by law or BU policy, or retaliation to Boston University’s Executive Director of Equal Opportunity/Title IX Coordinator, at titleix@bu.edu or (617) 358-1796. Read Boston University’s full Notice of Nondiscrimination.
Search
Boston University Masterplate
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Information security symposium draws more than 200 researchers
0
share this