SlideShare a Scribd company logo
Università	
  degli	
  Studi	
  dell’Aquila
Software	
  Engineering	
  for	
  Resilient	
  Systems
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  
for	
  Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Biological	
  Immunity	
  and	
  Software	
  Resilience:	
  
two	
  faces	
  of	
  the	
  same	
  coin?
Marco	
  Autili,	
  Amleto	
  Di	
  Salle,	
  Francesco	
  Gallo,	
  Alexander	
  Perucci,	
  Massimo	
  Tivoli
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Massimo Tivoli
PhD / Associate Professor
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Marco Autili
PhD / Assistant Professor
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Amleto Di Salle
PhD
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Alexander Perucci
PhD Student
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Francesco Gallo
PhD / Research Fellow
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Roadmap
• Introduction
• Software Resilience
• Immune System Actor Model Overview
• Bio-inspired concept architecture for resilient
systems
• Consideration and Future Works
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Roadmap
• Introduction
• Software Resilience
• Immune System
• Actor Model Overview
• Bio-inspired concept architecture for resilient systems
• Consideration and Future Works
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Roadmap
• Introduction
• Software Resilience
• Immune System
• Actor Model Overview
• Bio-inspired concept architecture for resilient systems
• Consideration and Future Works
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Roadmap
• Introduction
• Software Resilience
• Immune System
• Actor Model Overview
• Bio-inspired concept architecture for resilient systems
• Consideration and Future Works
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction
Biological Immunity and Software Resilience are two faces of the same coin?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction
Biological Immunity and Software Resilience are two faces of the same coin?
?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction – Software Resilience
Resilient systems have the ability to endure and successfully recover from
disturbances by identifying problems and mobilizing the available resources to
cope with the disturbance. Resiliency lets a system recover from disruptions,
variations, and a degradation of expected working conditions1.
[1] - Synergy between biology and systems resilience - Ashik Chandra
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction - Immune System
?
Biological systems are resilient?
And in particular, Immune System is resilient?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction - Immune System
?
Immune systems are highly adaptive and scalable, with the ability to cope with
multiple data sources, fuse information together, makes decisions, have
multiple interacting agents, operate in a distributed manner over a multiple
scales, and have a memory structure to facilitate learning in order to defence
body against infectious organism (pathogens) and other invaders.
Biological systems are resilient?
And in particular, Immune System is resilient?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction - Immune System
?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction - System Resilient and Immune System
?
Biological systems are resilient?
And in particular, Immune System is resilient?
Resilient systems have the ability to endure and successfully recover from
disturbances by identifying problems and mobilizing the available resources to
cope with the disturbance. Resiliency lets a system recover from disruptions,
variations, and a degradation of expected working conditions.
Immune systems are highly adaptive and scalable, with the ability to cope with
multiple data sources, fuse information together, makes decisions, have
multiple interacting agents, operate in a distributed manner over a multiple
scales, and have a memory structure to facilitate learning in order to defence
body against infectious organism (pathogens) and other invaders.
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Introduction – System Resilient and Immune System
?
Biological systems are resilient?
And in particular, Immune System is resilient?
Resilient systems have the ability to endure and successfully recover from
disturbances by identifying problems and mobilizing the available resources to
cope with the disturbance. Resiliency lets a system recover from disruptions,
variations, and a degradation of expected working conditions.
Immune systems are highly adaptive and scalable, with the ability to cope with
multiple data sources, fuse information together, makes decisions, have
multiple interacting agents, operate in a distributed manner over a multiple
scales, and have a memory structure to facilitate learning in order to defence
body against infectious organism (pathogens) and other invaders.
May be Yes
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Actor Model Overview
How	
  we	
  combine	
  Immune System	
  and	
  Resilient	
  Software?	
  
Actor Model is a formal mathematical model of concurrent computation, and
actually several programming language employing the notion of actor (ex.
Java, Scala)
The Actor Model is characterized by:
• inherent concurrency of computation within and among Actors,
• dynamic creation/replication of Actors,
• interaction only through direct asynchronous message passing.
Resilience is achieved through replication, containment, isolation and
delegation mechanisms.
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Actor Model Overview
We focus on the Akka toolkit2, which is a framework that natively permits a
programming style based on the Actor Model.
The Actor Model is characterized by:
• inherent concurrency of computation within and among Actors,
• dynamic creation/replication of Actors,
• interaction only through direct asynchronous message passing.
Resilience is achieved through replication, containment, isolation and
delegation mechanisms.
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
[2] - http://akka.io
Bio-­‐inspired	
  concept	
  architecture	
  for	
  resilient	
  systems	
  -­‐ I
?
-­‐ The System actor creates the KillerSupervisor ,	
  
HelperSupervisor and ConsumerSupervisoractors
- The supervisor actors are in charge of detecting
changes, intrusions, failures, and undesired behaviours
- Supervisor actors are in charge of creating respective
sub actors, namely KillerActor ,	
  HelperActor and
ConsumerActor
-­‐ Each message activates specific instances of
HelperActor and	
  KillerActor
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Bio-inspired concept architecture for resilient systems - II
Agility:
undesired behaviours or changes represent the software
counterpart of pathogens.
Redundancy:
Akka toolkit offers persistence.
Dynamic learning:
if some change or undesired behaviour occurs at run time,
and the affected actor is not able to manage it, the actor
initially treats it as an unknown message.
Flexibility:
the actors can be dynamically produced or replicated, without
blocking the system.
Robustness:
it uses the let it crash policy to manage the programmed
death of faulty components that can be dynamically killed or
stopped for preserving the system functioning
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Consideration and Future Works - I
From our point view…..YES
Biological Immunity and Software Resilience are two faces of the same coin?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Consideration and Future Works - II
- automatic recognition of software failures/changes;
- dynamic learning of the solutions required to correctly react to the recognized failures/changes;
- modular actuation of the (learned) solution, without compromising the over all system function;
- self-stabilization of the self-*actions;
- multilayer management of failures/changes (and related strategies) in a modular, yet cohesive, way
depending on the affected layer(s), e.g., application, middleware, operating system, network layer.
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
Consideration and Future Works - II
- automatic recognition of software failures/changes;
- dynamic learning of the solutions required to correctly react to the recognized failures/changes;
- modular actuation of the (learned) solution, without compromising the over all system function;
- self-stabilization of the self-*actions;
- multilayer management of failures/changes (and related strategies) in a modular, yet cohesive, way
depending on the affected layer(s), e.g., application, middleware, operating system, network layer.
The opportunity to explore to use our formalism to create executable software models of biological
systems can be used for predictions, preparation and elimination of unnecessary, dangerous or
unethical laboratory experiments
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris
THANKS	
  FOR	
  YOUR	
  ATTENTION!!!
Question?
7th	
  International	
  Workshop	
  on	
  Software	
  Engineering	
  for	
  
Resilient	
  Systems,	
  7-­‐8th	
  September 2015, Paris

More Related Content

Viewers also liked

Towards Robust and Safe Autonomous Drones
Towards Robust and Safe Autonomous DronesTowards Robust and Safe Autonomous Drones
Towards Robust and Safe Autonomous Drones
SERENEWorkshop
 
Future Research in (Software) Resilience
Future Research in (Software) ResilienceFuture Research in (Software) Resilience
Future Research in (Software) Resilience
Henry Muccini
 
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"
SERENEWorkshop
 
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...
SERENEWorkshop
 
SERENE 2014 School: Incremental Model Queries over the Cloud
SERENE 2014 School: Incremental Model Queries over the CloudSERENE 2014 School: Incremental Model Queries over the Cloud
SERENE 2014 School: Incremental Model Queries over the Cloud
SERENEWorkshop
 
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...
SERENEWorkshop
 
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...
SERENEWorkshop
 
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...
SERENEWorkshop
 
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...
SERENEWorkshop
 
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...
SERENEWorkshop
 
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...
SERENEWorkshop
 
SERENE 2014 School: Challenges in Cyber-Physical Systems
SERENE 2014 School: Challenges in Cyber-Physical SystemsSERENE 2014 School: Challenges in Cyber-Physical Systems
SERENE 2014 School: Challenges in Cyber-Physical Systems
SERENEWorkshop
 
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENEWorkshop
 

Viewers also liked (13)

Towards Robust and Safe Autonomous Drones
Towards Robust and Safe Autonomous DronesTowards Robust and Safe Autonomous Drones
Towards Robust and Safe Autonomous Drones
 
Future Research in (Software) Resilience
Future Research in (Software) ResilienceFuture Research in (Software) Resilience
Future Research in (Software) Resilience
 
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"
 
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...
 
SERENE 2014 School: Incremental Model Queries over the Cloud
SERENE 2014 School: Incremental Model Queries over the CloudSERENE 2014 School: Incremental Model Queries over the Cloud
SERENE 2014 School: Incremental Model Queries over the Cloud
 
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...
 
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...
 
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...
 
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...
 
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...
 
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...
 
SERENE 2014 School: Challenges in Cyber-Physical Systems
SERENE 2014 School: Challenges in Cyber-Physical SystemsSERENE 2014 School: Challenges in Cyber-Physical Systems
SERENE 2014 School: Challenges in Cyber-Physical Systems
 
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
 

Similar to Biological Immunity and Software Resilience: Two Faces of the Same Coin?

SmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationSmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine Computation
Hong-Linh Truong
 
Accelerating Application Development in the Internet of Things using Model-dr...
Accelerating Application Development in the Internet of Things using Model-dr...Accelerating Application Development in the Internet of Things using Model-dr...
Accelerating Application Development in the Internet of Things using Model-dr...
Pankesh Patel
 
There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?
Nane Kratzke
 
Elastic Security Labs Brief
Elastic Security Labs BriefElastic Security Labs Brief
Elastic Security Labs Brief
Joseph DeFever
 
Seminar and workshop on Embedded Systems
Seminar and workshop on Embedded SystemsSeminar and workshop on Embedded Systems
Seminar and workshop on Embedded Systems
NAILBITER
 
AI model security.pdf
AI model security.pdfAI model security.pdf
AI model security.pdf
StephenAmell4
 
Operationalise with alerting, custom dashboards, and timelines
Operationalise with alerting, custom dashboards, and timelinesOperationalise with alerting, custom dashboards, and timelines
Operationalise with alerting, custom dashboards, and timelines
Elasticsearch
 
Trends and innovations in Embedded System Education
Trends and innovations in Embedded System EducationTrends and innovations in Embedded System Education
Trends and innovations in Embedded System Education
Santosh Verma
 
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
stirlingvwriters
 
VALEO.pptx
VALEO.pptxVALEO.pptx
VALEO.pptx
VaradKadtan1
 
Non Functional Requirements in Requirement Engineering.pdf
Non Functional Requirements in Requirement Engineering.pdfNon Functional Requirements in Requirement Engineering.pdf
Non Functional Requirements in Requirement Engineering.pdf
JeevaPadmini
 
TAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentationTAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentation
Henry Muccini
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
DrAmarNathDhebla
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
IRJET Journal
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
Unlimited Attempts AllowedDetailsVirtual Labs Sniffing & Social
Unlimited Attempts AllowedDetailsVirtual Labs Sniffing & SocialUnlimited Attempts AllowedDetailsVirtual Labs Sniffing & Social
Unlimited Attempts AllowedDetailsVirtual Labs Sniffing & Social
daniatrappit
 
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
ClaraZara1
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
Elasticsearch
 
Embedded Platforms and Ecosystems 2015
Embedded Platforms and Ecosystems 2015Embedded Platforms and Ecosystems 2015
Embedded Platforms and Ecosystems 2015
Endeavour Partners
 

Similar to Biological Immunity and Software Resilience: Two Faces of the Same Coin? (20)

SmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationSmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine Computation
 
Accelerating Application Development in the Internet of Things using Model-dr...
Accelerating Application Development in the Internet of Things using Model-dr...Accelerating Application Development in the Internet of Things using Model-dr...
Accelerating Application Development in the Internet of Things using Model-dr...
 
CaselliM_CV
CaselliM_CVCaselliM_CV
CaselliM_CV
 
There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?There is no impenetrable system - So, why we are still waiting to get breached?
There is no impenetrable system - So, why we are still waiting to get breached?
 
Elastic Security Labs Brief
Elastic Security Labs BriefElastic Security Labs Brief
Elastic Security Labs Brief
 
Seminar and workshop on Embedded Systems
Seminar and workshop on Embedded SystemsSeminar and workshop on Embedded Systems
Seminar and workshop on Embedded Systems
 
AI model security.pdf
AI model security.pdfAI model security.pdf
AI model security.pdf
 
Operationalise with alerting, custom dashboards, and timelines
Operationalise with alerting, custom dashboards, and timelinesOperationalise with alerting, custom dashboards, and timelines
Operationalise with alerting, custom dashboards, and timelines
 
Trends and innovations in Embedded System Education
Trends and innovations in Embedded System EducationTrends and innovations in Embedded System Education
Trends and innovations in Embedded System Education
 
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
Unlimited Attempts AllowedDetails Virtual Sniffing Social Engineering Conside...
 
VALEO.pptx
VALEO.pptxVALEO.pptx
VALEO.pptx
 
Non Functional Requirements in Requirement Engineering.pdf
Non Functional Requirements in Requirement Engineering.pdfNon Functional Requirements in Requirement Engineering.pdf
Non Functional Requirements in Requirement Engineering.pdf
 
TAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentationTAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentation
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Unlimited Attempts AllowedDetailsVirtual Labs Sniffing & Social
Unlimited Attempts AllowedDetailsVirtual Labs Sniffing & SocialUnlimited Attempts AllowedDetailsVirtual Labs Sniffing & Social
Unlimited Attempts AllowedDetailsVirtual Labs Sniffing & Social
 
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
 
Embedded Platforms and Ecosystems 2015
Embedded Platforms and Ecosystems 2015Embedded Platforms and Ecosystems 2015
Embedded Platforms and Ecosystems 2015
 

Recently uploaded

GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdfMudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
frank0071
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
ronaldlakony0
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
Richard Gill
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
Nistarini College, Purulia (W.B) India
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
IshaGoswami9
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
David Osipyan
 
Introduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptxIntroduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptx
zeex60
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
Wasswaderrick3
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
tonzsalvador2222
 

Recently uploaded (20)

GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdfMudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
 
Introduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptxIntroduction to Mean Field Theory(MFT).pptx
Introduction to Mean Field Theory(MFT).pptx
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
 

Biological Immunity and Software Resilience: Two Faces of the Same Coin?

  • 1. Università  degli  Studi  dell’Aquila Software  Engineering  for  Resilient  Systems 7th  International  Workshop  on  Software  Engineering   for  Resilient  Systems,  7-­‐8th  September 2015, Paris Biological  Immunity  and  Software  Resilience:   two  faces  of  the  same  coin? Marco  Autili,  Amleto  Di  Salle,  Francesco  Gallo,  Alexander  Perucci,  Massimo  Tivoli
  • 2. 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris Massimo Tivoli PhD / Associate Professor Dep. of Information Engineering, Computer Science and Mathematics – University of L’Aquila Marco Autili PhD / Assistant Professor Dep. of Information Engineering, Computer Science and Mathematics – University of L’Aquila Amleto Di Salle PhD Dep. of Information Engineering, Computer Science and Mathematics – University of L’Aquila Alexander Perucci PhD Student Dep. of Information Engineering, Computer Science and Mathematics – University of L’Aquila Francesco Gallo PhD / Research Fellow Dep. of Information Engineering, Computer Science and Mathematics – University of L’Aquila
  • 3. Roadmap • Introduction • Software Resilience • Immune System Actor Model Overview • Bio-inspired concept architecture for resilient systems • Consideration and Future Works 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 4. Roadmap • Introduction • Software Resilience • Immune System • Actor Model Overview • Bio-inspired concept architecture for resilient systems • Consideration and Future Works 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 5. Roadmap • Introduction • Software Resilience • Immune System • Actor Model Overview • Bio-inspired concept architecture for resilient systems • Consideration and Future Works 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 6. Roadmap • Introduction • Software Resilience • Immune System • Actor Model Overview • Bio-inspired concept architecture for resilient systems • Consideration and Future Works 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 7. Introduction Biological Immunity and Software Resilience are two faces of the same coin? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 8. Introduction Biological Immunity and Software Resilience are two faces of the same coin? ? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 9. Introduction – Software Resilience Resilient systems have the ability to endure and successfully recover from disturbances by identifying problems and mobilizing the available resources to cope with the disturbance. Resiliency lets a system recover from disruptions, variations, and a degradation of expected working conditions1. [1] - Synergy between biology and systems resilience - Ashik Chandra 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 10. Introduction - Immune System ? Biological systems are resilient? And in particular, Immune System is resilient? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 11. Introduction - Immune System ? Immune systems are highly adaptive and scalable, with the ability to cope with multiple data sources, fuse information together, makes decisions, have multiple interacting agents, operate in a distributed manner over a multiple scales, and have a memory structure to facilitate learning in order to defence body against infectious organism (pathogens) and other invaders. Biological systems are resilient? And in particular, Immune System is resilient? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 12. Introduction - Immune System ? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 13. Introduction - System Resilient and Immune System ? Biological systems are resilient? And in particular, Immune System is resilient? Resilient systems have the ability to endure and successfully recover from disturbances by identifying problems and mobilizing the available resources to cope with the disturbance. Resiliency lets a system recover from disruptions, variations, and a degradation of expected working conditions. Immune systems are highly adaptive and scalable, with the ability to cope with multiple data sources, fuse information together, makes decisions, have multiple interacting agents, operate in a distributed manner over a multiple scales, and have a memory structure to facilitate learning in order to defence body against infectious organism (pathogens) and other invaders. 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 14. Introduction – System Resilient and Immune System ? Biological systems are resilient? And in particular, Immune System is resilient? Resilient systems have the ability to endure and successfully recover from disturbances by identifying problems and mobilizing the available resources to cope with the disturbance. Resiliency lets a system recover from disruptions, variations, and a degradation of expected working conditions. Immune systems are highly adaptive and scalable, with the ability to cope with multiple data sources, fuse information together, makes decisions, have multiple interacting agents, operate in a distributed manner over a multiple scales, and have a memory structure to facilitate learning in order to defence body against infectious organism (pathogens) and other invaders. May be Yes 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 15. Actor Model Overview How  we  combine  Immune System  and  Resilient  Software?   Actor Model is a formal mathematical model of concurrent computation, and actually several programming language employing the notion of actor (ex. Java, Scala) The Actor Model is characterized by: • inherent concurrency of computation within and among Actors, • dynamic creation/replication of Actors, • interaction only through direct asynchronous message passing. Resilience is achieved through replication, containment, isolation and delegation mechanisms. 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 16. Actor Model Overview We focus on the Akka toolkit2, which is a framework that natively permits a programming style based on the Actor Model. The Actor Model is characterized by: • inherent concurrency of computation within and among Actors, • dynamic creation/replication of Actors, • interaction only through direct asynchronous message passing. Resilience is achieved through replication, containment, isolation and delegation mechanisms. 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris [2] - http://akka.io
  • 17. Bio-­‐inspired  concept  architecture  for  resilient  systems  -­‐ I ? -­‐ The System actor creates the KillerSupervisor ,   HelperSupervisor and ConsumerSupervisoractors - The supervisor actors are in charge of detecting changes, intrusions, failures, and undesired behaviours - Supervisor actors are in charge of creating respective sub actors, namely KillerActor ,  HelperActor and ConsumerActor -­‐ Each message activates specific instances of HelperActor and  KillerActor 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 18. Bio-inspired concept architecture for resilient systems - II Agility: undesired behaviours or changes represent the software counterpart of pathogens. Redundancy: Akka toolkit offers persistence. Dynamic learning: if some change or undesired behaviour occurs at run time, and the affected actor is not able to manage it, the actor initially treats it as an unknown message. Flexibility: the actors can be dynamically produced or replicated, without blocking the system. Robustness: it uses the let it crash policy to manage the programmed death of faulty components that can be dynamically killed or stopped for preserving the system functioning 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 19. Consideration and Future Works - I From our point view…..YES Biological Immunity and Software Resilience are two faces of the same coin? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 20. Consideration and Future Works - II - automatic recognition of software failures/changes; - dynamic learning of the solutions required to correctly react to the recognized failures/changes; - modular actuation of the (learned) solution, without compromising the over all system function; - self-stabilization of the self-*actions; - multilayer management of failures/changes (and related strategies) in a modular, yet cohesive, way depending on the affected layer(s), e.g., application, middleware, operating system, network layer. 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 21. Consideration and Future Works - II - automatic recognition of software failures/changes; - dynamic learning of the solutions required to correctly react to the recognized failures/changes; - modular actuation of the (learned) solution, without compromising the over all system function; - self-stabilization of the self-*actions; - multilayer management of failures/changes (and related strategies) in a modular, yet cohesive, way depending on the affected layer(s), e.g., application, middleware, operating system, network layer. The opportunity to explore to use our formalism to create executable software models of biological systems can be used for predictions, preparation and elimination of unnecessary, dangerous or unethical laboratory experiments 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris
  • 22. THANKS  FOR  YOUR  ATTENTION!!! Question? 7th  International  Workshop  on  Software  Engineering  for   Resilient  Systems,  7-­‐8th  September 2015, Paris