Biological versus computer viruses

To understand biological viruses, some notions of the fundamental knowledge of the structure of DNA, the genetic code, the biosynthesis of proteins, the transcription, replication and transfer processes,... are presented so as to give an idea as to how the genetic information is decrypted by biological mechanisms and consequently, how viruses work.A computer "virus" can be defined as a piece of code with a self-reproducing mechanism riding on other programs which cannot exist by itself. In contrast, a worm can exist independently. A computer "virus" can be considered as another category of computer user, the problem of protection against such a "virus" can be reduced to the problem of protection against users.The choice of the term Self-Reproducing Program (SRP) appears to be unambiguous in comparison to the word "virus". After having created the computer in 1948, John Von Neumann said in 1949 that it must be possible to imagine logical or mechanical engines that would be able to be self-reproducing. We propose that "good" SRP's should be useful for the automatic maintenance of software, by infection of old versions by the most recent version in the form of such an SRP.Protection is possible by a better understanding of computer systems and their mechanisms of exchange of data and processes. Such a study is presented for the DOS which should be protected by a watchdog system and suggests the need for a real-time analysis on the most vulnerable points. Security models including Cryptography should offer preventive solutions and "vaccines", the treatment of minor troubles...while prevention requires a better understanding of men and their ambiguities.The idea that there is a need for a better knowledge of SRP's, Worms, Trojan horses...justifies a call for the constitution of a special database concerning them.

[1]  Jon A. Rochlis,et al.  With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[2]  Edward J. McCluskey,et al.  Concurrent Error Detection Using Watchdog Processors - A Survey , 1988, IEEE Trans. Computers.

[3]  Jeffrey W. Roberts,et al.  遺伝子の分子生物学 = Molecular biology of the gene , 1970 .

[4]  N. J. A. Sloane,et al.  Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard , 1977, Cryptologia.

[5]  Virgil D. Gligor,et al.  Design and Implementation of Secure Xenix , 1987, IEEE Transactions on Software Engineering.

[6]  Yvo Desmedt,et al.  Defending systems against viruses through cryptographic authentication , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[7]  Harold Joseph Highland,et al.  The brain virus: Fact and fantasy , 1988, Comput. Secur..

[8]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[9]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[10]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[11]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[12]  Daniel Guinier,et al.  D.S.P.P.: a data security pipe protocol for PC's,large scale systems or networks , 1988, SGSC.

[13]  L. Penrose,et al.  Self-Reproducing Machines , 1959 .

[14]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[15]  A. Campbell How viruses insert their DNA into the DNA of the host cell. , 1976, Scientific American.

[16]  Ifip Wg,et al.  Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 , 1984 .

[17]  Martin E. Hellman I. `DES will be totally insecure within ten years¿ , 1979, IEEE Spectrum.

[18]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.