Biologically Inspired Defenses Against Computer Viruses

Today's anti-virus technology, based largely on analysis of existing viruses by human experts, is just barely able to keep pace with the more than three new computer viruses that are written daily. In a few years, intelligent agents navigating through highly connected networks are likely to form an extremely fertile medium for a new breed of viruses. At IBM, we are developing novel, biologically inspired antivirus techniques designed to thwart both today's and tomorrow's viruses. Here we describe two of these: a neural network virus detector that learns to discriminate between infected and uninfected programs, and a computer immune system that identifies new viruses, analyzes them automatically, and uses the results of its analysis to detect and remove all copies of the virus that are present in the system. The neural-net technology has been incorporated into IBM's commercial anti-virus product; the computer immune system is in prototype.

[1]  J. Davenport Editor , 1960 .

[2]  W. Mcneill Plagues and Peoples , 1977, The Review of Politics.

[3]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[4]  Geoffrey E. Hinton,et al.  Learning internal representations by error propagation , 1986 .

[5]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[6]  William Hugh Murray,et al.  The application of epidemiology to computer viruses , 1988, Comput. Secur..

[7]  Jon A. Rochlis,et al.  With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[8]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[9]  Eugene H. Spafford,et al.  Computer Viruses--A Form of Artificial Life? , 1990 .

[10]  Harold Joseph Highland Computer virus handbook , 1990, Computers and security.

[11]  今西 武 SCIENTIFIC AMERICAN LIBRARY 1分子と人間, P.W.Atkins著, 千原秀昭・稲葉章訳, 24.5×22cm, 194頁, 4,200円(本体4,078円), 東京化学同人 , 1991 .

[12]  Anders Krogh,et al.  Introduction to the theory of neural computation , 1994, The advanced book program.

[13]  Charles E. Taylor,et al.  Artificial Life II , 1991 .

[14]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  P. Marrack,et al.  How the immune system recognizes the body. , 1993, Scientific American.

[16]  Steve R. White,et al.  Computers and epidemiology , 1993, IEEE Spectrum.

[17]  C. Janeway How the immune system recognizes invaders. , 1993, Scientific American.

[18]  Jeffrey O. Kephart,et al.  Measuring and modeling computer virus prevalence , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[19]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[20]  Wojciech Rytter,et al.  Text Algorithms , 1994 .

[21]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  B. Larke The Coming Plague: Newly Emerging Diseases in a World Out of Balance. , 1995 .

[23]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.