Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephanie Forrest is active.

Publication


Featured researches published by Stephanie Forrest.


ieee symposium on security and privacy | 1994

Self-nonself discrimination in a computer

Stephanie Forrest; Alan S. Perelson; Lawrence C. Allen; Rajesh Cherukuri

The problem of protecting computer systems can be viewed generally as the problem of learning to distinguish self from other. The authors describe a method for change detection which is based on the generation of T cells in the immune system. Mathematical analysis reveals computational costs of the system, and preliminary experiments illustrate how the method might be applied to the problem of computer viruses.<<ETX>>


Journal of Computer Security | 1998

Intrusion detection using sequences of system calls

Steven A. Hofmeyr; Stephanie Forrest; Anil Somayaji

A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a good discriminator between normal and abnormal operating characteristics of several common UNIX programs. Normal behavior is collected in two waysc Synthetically, by exercising as many normal modes of usage of a program as possible, and in a live user environment by tracing the actual execution of the program. In the former case several types of intrusive behavior were studieds in the latter case, results were analyzed for false positives.


ieee symposium on security and privacy | 1999

Detecting intrusions using system calls: alternative data models

Christina Warrender; Stephanie Forrest; Barak A. Pearlmutter

Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. We study one such observable-sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several different programs, we compare the ability of different data modeling methods to represent normal behavior accurately and to recognize intrusions. We compare the following methods: simple enumeration of observed sequences; comparison of relative frequencies of different sequences; a rule induction technique; and hidden Markov models (HMMs). We discuss the factors affecting the performance of each method and conclude that for this particular problem, weaker methods than HMMs are likely sufficient.


Communications of The ACM | 1997

Computer immunology

Stephanie Forrest; Steven A. Hofmeyr; Anil Somayaji

This review describes a body of work on computational immune systems that behave analogously to the natural immune system. These artificial immune systems (AIS) simulate the behavior of the natural immune system and in some cases have been used to solve practical engineering problems such as computer security. AIS have several strengths that can complement wet lab immunology. It is easier to conduct simulation experiments and to vary experimental conditions, for example, to rule out hypotheses; it is easier to isolate a single mechanism to test hypotheses about how it functions; agent-based models of the immune system can integrate data from several different experiments into a single in silico experimental system.


electronic commerce | 2000

Architecture for an Artificial Immune System

Steven A. Hofmeyr; Stephanie Forrest

An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynamic learning and adaptation, and self-monitoring. ARTIS is a general framework for a distributed adaptive system and could, in principle, be applied to many domains. In this paper, ARTIS is applied to computer security in the form of a network intrusion detection system called LISYS. LISYS is described and shown to be effective at detecting intrusions, while maintaining low false positive rates. Finally, similarities and differences between ARTIS and Hollands classifier systems are discussed.


workshop on hot topics in operating systems | 1997

Building diverse computer systems

Stephanie Forrest; Anil Somayaji; David H. Ackley

Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advantages, the beneficial effects of diversity in computing systems have been overlooked, specifically in the area of computer security. Several methods of achieving software diversity are discussed based on randomizations that respect the specified behavior of the program. Such randomization could potentially increase the robustness of software systems with minimal impact on convenience, usability, and efficiency. Randomization of the amount of memory allocated on a stack frame is shown to disrupt a simple buffer overflow attack.


international conference on software engineering | 2009

Automatically finding patches using genetic programming

Westley Weimer; ThanhVu Nguyen; Claire Le Goues; Stephanie Forrest

Automatic program repair has been a longstanding goal in software engineering, yet debugging remains a largely manual process. We introduce a fully automated method for locating and repairing bugs in software. The approach works on off-the-shelf legacy applications and does not require formal specifications, program annotations or special coding practices. Once a program fault is discovered, an extended form of genetic programming is used to evolve program variants until one is found that both retains required functionality and also avoids the defect in question. Standard test cases are used to exercise the fault and to encode program requirements. After a successful repair has been discovered, it is minimized using structural differencing algorithms and delta debugging. We describe the proposed method and report experimental results demonstrating that it can successfully repair ten different C programs totaling 63,000 lines in under 200 seconds, on average.


ieee symposium on security and privacy | 1996

An immunological approach to change detection: algorithms, analysis and implications

Patrik D'haeseleer; Stephanie Forrest; Paul Helman

We present new results on a distributable change-detection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating detectors. Two detector-generating algorithms are introduced which run in linear time. The algorithms are analyzed, heuristics are given for setting parameters based on the analysis, and the presence of holes in detector space is examined. The analysis provider a basis for assessing the practicality of the algorithms in specific settings, and some of the implications are discussed.


IEEE Transactions on Software Engineering | 2012

GenProg: A Generic Method for Automatic Software Repair

C. Le Goues; ThanhVu Nguyen; Stephanie Forrest; Westley Weimer

This paper describes GenProg, an automated method for repairing defects in off-the-shelf, legacy programs without formal specifications, program annotations, or special coding practices. GenProg uses an extended form of genetic programming to evolve a program variant that retains required functionality but is not susceptible to a given defect, using existing test suites to encode both the defect and required functionality. Structural differencing algorithms and delta debugging reduce the difference between this variant and the original program to a minimal repair. We describe the algorithm and report experimental results of its success on 16 programs totaling 1.25 M lines of C code and 120K lines of module code, spanning eight classes of defects, in 357 seconds, on average. We analyze the generated repairs qualitatively and quantitatively to demonstrate that the process efficiently produces evolved programs that repair the defect, are not fragile input memorizations, and do not lead to serious degradation in functionality.


new security paradigms workshop | 1998

Principles of a computer immune system

Anil Somayaji; Steven A. Hofmeyr; Stephanie Forrest

Natural immune systems provide a rich source of inspiration for computer security in the age of the Internet. Immune systems have many features that are desirable for the imperfect, uncontrolled, and open environments in which most computers currently exist. These include distributability, diversity, disposability, adaptability, autonomy, dynamic coverage, anomaly detection, multiple layers, identity via behavior, no trusted components, and imperfect detection. These principles suggest a wide variety of architectures for a computer immune system.

Collaboration


Dive into the Stephanie Forrest's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alan S. Perelson

Los Alamos National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Steven A. Hofmeyr

Lawrence Berkeley National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Claire Le Goues

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fernando Esponda

Instituto Tecnológico Autónomo de México

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Paul Helman

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

ThanhVu Nguyen

University of New Mexico

View shared research outputs
Researchain Logo
Decentralizing Knowledge