Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Intelligent Machines

Computer Immunity

Better anti-hacking tools attack invaders.

For years computer scientists have dreamed of building computer security software as effective and versatile as the human immune system, which can swiftly overwhelm even intruders it has never seen before. Such a software tool would free programmers from having to anticipate and respond to the changing array of attacks hackers use; instead, it would simply allow a computer to understand its own normal behavior and shut down deviant processes.

Now such systems are finally going commercial. An intrusion prevention system from Sana Security of San Mateo, CA, is protecting private customer data for companies like Smith and Hawken, a catalogue and Internet retailer in Marin County, CA. Smith and Hawken officials say none of the many attempts to infiltrate their computers have succeeded since they began a trial run of Sana’s software in mid-2002, and that hands-on monitoring has been reduced by dozens of hours a week. “I’ve heard the immune system analogy before in the security business, and usually my eyes roll up in my head,” says Eric Ogren, a senior analyst and computer security specialist at Boston technology consultancy the Yankee Group. “What makes Sana unique is the way their software is able to automatically learn.”

In the body, immune cells learn to recognize invaders by assuming that unfamiliar patterns on the surfaces of cells are foreign. Sana’s software, launched commercially in March, uses a similar trick. It learns a computer’s typical pattern of “system calls,” or requests that a program issues to the operating system in order to carry out actions such as reading or writing on a disk. “When someone is using a flaw in a program to gain access to a system, they are typically forcing the system to do something unusual,” says Sana founder and chief scientist Steven Hofmeyr. “Our self’ is really the sequence of normal system calls, and nonself’ is those that are caused when the system is attacked.”

This story is part of our July/August 2003 Issue
See the rest of the issue
Subscribe

There’s a big incentive to upgrade security: a California law going into effect this summer will require companies to notify-and possibly pay damages to-customers whose private information is exposed through computer breaches. Sana has a handful of competitors, including Hewlett-Packard and IBM, that are also using lessons from human physiology to automate computer security. But considering it took millions of years for immune systems to evolve, it may be a while before the market selects a winner.

Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.

Subscribe today
More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Insider Basic.
  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning print magazine, unlimited online access plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    Print Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.