Parallels Between Biological and Computer Epidemics

background image

Tom Chen

SMU

tchen@engr.smu.edu

Parallels Between Biological

and Computer Epidemics

background image

TC/Londonmet/11-10-04

SMU Engineering p. 2

Microscopic: How Biological and
Computer Pathogens Spread

Macroscopic: Biological and Computer
Epidemiology

Human and Artificial Immune Systems

Outline

background image

TC/Londonmet/11-10-04

SMU Engineering p. 3

Viruses and worms are characterized by
capability for self-replication

-

Viruses

: parasitic ability to self-replicate by

modifying (infecting) a normal program/file
with a copy of itself

-

Worms

: stand-alone programs that exploit

security holes to compromise other
computers and transfer copies of itself
through a network

Computer Pathogens

background image

TC/Londonmet/11-10-04

SMU Engineering p. 4

Virus - Biological Parallels?

Viruses named by Fred Cohen in 1983
after biological viruses

-

Biological viruses are strands of RNA or DNA
in protein shell, not alive or complete by
themselves

-

Parasitically infect a normal (host) cell

-

Hijack control of host cell’s reproductive
machinery to reproduce more viruses

background image

TC/Londonmet/11-10-04

SMU Engineering p. 5

Viruses - What are They

Biological virus

Computer virus

DNA or RNA strand
surrounded by protein
shell

Set of instructions

No life outside of host cell

Incomplete program - not
executable by itself

background image

TC/Londonmet/11-10-04

SMU Engineering p. 6

Viruses - How They Infect

Biological virus

Computer virus

Outer protein shell bonds
to normal (host) cell

Virus code attaches to or
overwrites normal (host)
program or file

Virus RNA or DNA takes
over control of host cell

Virus code takes over control
when host program is
executed

background image

TC/Londonmet/11-10-04

SMU Engineering p. 7

Viruses - Replication

Biological virus

Computer virus

Virus RNA or DNA hijacks
host cell’s reproductive
machinery to produce
more viruses

Virus code contains
instructions to copy itself to
other locations (programs,
files, disks,...)

background image

TC/Londonmet/11-10-04

SMU Engineering p. 8

Viruses - Transmission

Biological virus

Computer virus

Transmitted to other
individuals by various
vectors - air, water,
physical contact,...

Transmitted to other
computers by various
vectors - email, disks, file
sharing,...

background image

TC/Londonmet/11-10-04

SMU Engineering p. 9

Worms - Biological Parallels?

Worms named by Shoch and Hupp
(Xerox) in 1979 after electronic network-
based “tapeworm” in John Brunner’s
novel, “The Shockwave Rider”

-

Envisioned multi-segmented distributed
program spread over many computers

-

Impervious to deletion of any segments

-

Not really how modern worms work

background image

TC/Londonmet/11-10-04

SMU Engineering p. 10

Biological Parallels?

Computer

virus

Worm

Biological

virus

Worm

What is a

better

analogy?

background image

TC/Londonmet/11-10-04

SMU Engineering p. 11

Worm Anatomy

- Chooses candidates to target

Target selection

Scanning (optional)

Exploit

Payload

(optional)

- Learns suitability of target

- Compromises security of target

Replicate

- Transmits worm copy to target

- Damage to target

background image

TC/Londonmet/11-10-04

SMU Engineering p. 12

SQL Slammer Example

Starting January 25, 2003, SQL Slammer
worm infected 200,000+

Entire worm is 376 bytes carried in a
single 404-byte UDP packet

Exploited vulnerability in Microsoft SQL
Server Resolution Service, included in MS
SQL Server 2000 and MS Data Engine
2000

background image

TC/Londonmet/11-10-04

SMU Engineering p. 13

SQL Slammer Anatomy

- Chooses random IP addresses

Target selection

Scanning (optional)

Exploit

Payload

(optional)

- No scanning

- Buffer overflow attack to UDP port
1434 (MS SQL Monitor port)

Replicate

- UDP packet carries worm copy;
infected targets are put into infinite
loop to send out worm copies

- No payload

background image

TC/Londonmet/11-10-04

SMU Engineering p. 14

Slammer (cont)

Infected PCs sent

worm copies to

UDP port 1434 as

fast as possible

Links became totally congested -

worm spread was limited only by

available bandwidth

background image

TC/Londonmet/11-10-04

SMU Engineering p. 15

Biological Parallels?

Computer

virus

Worm

Biological

virus

Cancer

Uncontrolled

growth and

metastasis

background image

TC/Londonmet/11-10-04

SMU Engineering p. 16

At Microscopic Level

Despite obvious differences (electronic vs.
biochemical), both computer pathogens
and biological pathogens have found
ways to (i) reproduce (ii) transmit
themselves (iii) infect others

Parallels in general behavior can be
made, but no research done -- no
practical benefit

background image

TC/Londonmet/11-10-04

SMU Engineering p. 17

At Macroscopic Level

Epidemic modeling

is concerned with

spread of diseases among individuals in
population

Epidemic models make simplifying
assumptions to gloss over the
complexities at microscopic level

Models are abstract enough for both
computer pathogens and biological
pathogens

background image

TC/Londonmet/11-10-04

SMU Engineering p. 18

Epidemic Modeling

Epidemic modeling helped devise
vaccination strategies, eg, smallpox

We would like to borrow the deterministic
and stochastic models developed over
250 years of human diseases

Little done so far -- only basic epidemic
models used for viruses and worms

background image

TC/Londonmet/11-10-04

SMU Engineering p. 19

Usual Assumptions

Individuals are assumed to progress
through number of states

Susceptible

Latent

Infectious

Immune or

dead or

susceptible

Pathogens in

individual

Time

background image

TC/Londonmet/11-10-04

SMU Engineering p. 20

Simple Epidemic (S-I) Model

S

I

S

S

S

S

S

S

S

S

S

S

S

S

- Individuals progress from
Susceptible → Infected
states (hence, “S-I model”)

S = number Susceptibles

I = number Infecteds

N = S + I

= fixed population

- Susceptibles and
Infecteds mix randomly

S

background image

TC/Londonmet/11-10-04

SMU Engineering p. 21

Law of Mass Action

In chemical reactions, rate of reaction is
proportional to product of masses (X·Y)

-

Fastest reaction when both X and Y large

X

Y

background image

TC/Londonmet/11-10-04

SMU Engineering p. 22

Simple Epidemic (cont)

Simple epidemic model applies law of
mass action:

-

Rate of interactions between Susceptibles
and Infecteds is proportional to product S·I

d

dt

I

=

β

SI

β= infection rate parameter

background image

TC/Londonmet/11-10-04

SMU Engineering p. 23

Simple Epidemic (cont)

Solution: number of Infecteds shows
logistic growth

I

t

=

I

0

N

I

0

+ (N I

0

)e

β

Nt

I

t

background image

TC/Londonmet/11-10-04

SMU Engineering p. 24

General Epidemic Model

In addition, assume individuals progress
from Susceptible → Infected →
Removed (dead or immune)

-

Also called

S-I-R model

-

R = number of Removed

Assume Infecteds become removed at
constant rate γ per capita

background image

TC/Londonmet/11-10-04

SMU Engineering p. 25

General Epidemic (cont)

No closed solution to S-I-R model:

d

dt

S

= −

β

SI

d

dt

I

=

β

SI

γ

I

d

dt

R

=

γ

I

background image

TC/Londonmet/11-10-04

SMU Engineering p. 26

General Epidemic (cont)

Researchers have tried to apply S-I-R
model to worm epidemics

-

Modifications include making β and γ
parameters dependent on other factors,
instead of constants

Models need to take network
characteristics into account, but not much
progress

background image

TC/Londonmet/11-10-04

SMU Engineering p. 27

Artificial Immunity

Researchers want to design artificial
immune systems inspired by human
immune system

-

Obvious differences (electronic vs.
biochemical) but seek to borrow general
principles

-

Human immune system is not perfect but
amazingly effective against even new
pathogens

background image

TC/Londonmet/11-10-04

SMU Engineering p. 28

Human Immunity

3 layers

Physical

barriers

(skin,...)

Innate immune

system

(common to all

animals)

Adaptive immune

system

(prompted to

action when

needed)

background image

TC/Londonmet/11-10-04

SMU Engineering p. 29

Innate Immune System

Innate immune system includes diverse
weapons for fast defenses:

-

Phagocytes: white blood cells to “eat” cells

-

Complement system: proteins bind to
chemical groups on common viruses, marks
them for phagocytes

-

Natural killer cells: a mystery how decide
which cells to kill, most potent when activated
by interferon produced by infected cells

background image

TC/Londonmet/11-10-04

SMU Engineering p. 30

Adaptive Immune System

When innate immune system struggles a
while, it can trigger adaptive immune
system including:

-

B cells producing antibodies

-

Killer T cells

background image

TC/Londonmet/11-10-04

SMU Engineering p. 31

Adaptive Immune System

B cells:

-

100 million different B cells are produced by
various combinations of 120 different gene
segments

-

When B cell binds to a matching virus, it
produces masses of matching antibodies that
mark viruses for phagocytes

-

Some B cells become “memory B cells” to
remember a detected virus for later

background image

TC/Londonmet/11-10-04

SMU Engineering p. 32

Adaptive Immune System

Killer T cells:

-

Diverse as B cells, constructed by various
combinations of gene segments

-

Work by looking inside cells -- can detect
cells already infected by virus

-

Kill infected cells to stop virus from replicating

background image

TC/Londonmet/11-10-04

SMU Engineering p. 33

Interesting Features

Multiple layers

-- for robustness

Distributed detection

-- detectors circulate

around body

Specific detectors

-- antibodies bind only

to matching viruses

Diversity of detectors

-- many, many

different B cells created through
combinatorics of gene segments

background image

TC/Londonmet/11-10-04

SMU Engineering p. 34

Interesting Features (cont)

Adaptive

-- antibodies finding a matching

virus are replicated

Learning and memory

-- memory B cells

remember detected viruses

Detection of new viruses by

anomaly

detection

-- detectors recognize “self”

(normal cells) vs. “non-self” (pathogen)

-

Thymus deletes self-reacting B and T cells

background image

TC/Londonmet/11-10-04

SMU Engineering p. 35

Artificial Immune Systems

Researchers have tried to borrow specific
(not all) principles, with limited success

Symantec’s Digital Immune System

-

Suspicious files detected by antivirus
software are automatically sent to Symantec

-

Symantec analyzes and creates signature

-

New signatures are automatically
downloaded to update clients’ antivirus
software

background image

TC/Londonmet/11-10-04

SMU Engineering p. 36

Artificial Immunity

Intrusion detection systems (IDSs) use
anomaly detection

-

“Normal” traffic or system behavior is defined
(”self”)

-

Anything else is classified as suspicious
(”non-self”)

-

But definition of normal is problematic

background image

TC/Londonmet/11-10-04

SMU Engineering p. 37

Conclusions

Parallels at microscopic level are not

being pursued

Epidemic modeling at macroscopic level is

promising but unclear how to progress

Human immunity is inspirational, but

limited success in applying principles to

artificial immune systems


Wyszukiwarka

Podobne podstrony:
4 Ten Important Differences Between Brains and Computers
A Behavioral Genetic Study of the Overlap Between Personality and Parenting
Berkeley, Three Dialogues between Hylas and Philonous
Guide to the properties and uses of detergents in biology and biochemistry
52 737 754 Relationship Between Microstructure and Mechanical Properts of a 5%Cr Hot Works
2009 6 NOV Small Animal Parasites Biology and Control
15 Multi annual variability of cloudiness and sunshine duration in Cracow between 1826 and 2005
Duality between Electric and Magnetic Black Holes
positive-pytania, III, IV, V ROK, SEMESTR II, POSITIVE PSYCHOLOGY BETWEEN HAPPINESS AND GOOD LIFE, p
Between Life and Death id 83155 Nieznany (2)
Genomic differences between C glabrata and S cerevisiea
Image Procesing and Computer Vision part3
(ebook pdf) Mathematics A Brief History Of Algebra And Computing
between trust and domination social contracts between humans and animals
A Behavioral Genetic Study of the Overlap Between Personality and Parenting
Berkeley, Three Dialogues between Hylas and Philonous
Guide to the properties and uses of detergents in biology and biochemistry

więcej podobnych podstron