Computer Genomics: Towards Self- Change and Configuration Management (http://research.microsoft.com/sn/strider) Yi-Min Wang Senior Researcher & Group Manager.

Slides:



Advertisements
Similar presentations
The Ultimate Troubleshooter TUT July 26, 2005 Lorain County Computer Computer Users Group Users Group.
Advertisements

Working with the Windows Registry Computer Club of the Sandhills November 12, 2012.
Configuration management
Automatic Misconfiguration Troubleshooting with PeerPressure Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang Microsoft Research Presenter:
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
R. Barret, P. Maglio, E. Kandogan, J. Bailey, Usable Autonomic Computing Systems: the Administrators' Perspective, ICAC 2004Usable Autonomic Computing.
MCT260-Operating Systems I Operating Systems I Managing Your System.
Lesson 18: Configuring Application Restriction Policies
Working with the Windows XP Registry
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
1 Automatic Misconfiguration Disagnosis with PeerPressure Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, and Yi-Min Wang Microsoft Research OSDI 2004,
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Human Genome Project by: Amanda Mosello. What is the Human Genome Project? created in 1990, by the National Institutes of Health and the US Department.
A Crawler-based Study of Spyware on the Web A.Moshchuk, T.Bragin, D.Gribble, M.Levy NDSS, 2006 * Presented by Justin Miller on 3/6/07.
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems Archana Ganapathi (UC Berkeley) Yi-Min Wang (Microsoft Research)
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Performing Software Installation with Group Policy Lesson 9.
Module 7 Configure User and Computer Environments By Using Group Policy.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
SPEAKING ‘Information Technology’ ‘Computers’. Make dialogues on a spot, without preparation. Use active vocabulary from the topics ‘Information Technology’
Automatically Repairing Broken Workflows for Evolving GUI Applications Sai Zhang University of Washington Joint work with: Hao Lü, Michael D. Ernst.
Recovery-Oriented Computing Discovering Correctness Constraints for Self-Management of System Configuration Emre Kıcıman and Yi-Min Wang
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
CISC Machine Learning for Solving Systems Problems Presented by: Suman Chander B Dept of Computer & Information Sciences University of Delaware Automatic.
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
Configuring Debugging as Search: Finding the Needle in the Haystack Andrew Whitaker, Richard S. Cox and Steven D. Gribble. University of Washington Presented.
W elcome to our Presentation. Presentation Topic Virus.
How to Fix Binkw32.dll Error
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Chapter 7 Live Data Collection Spring Incident Response & Computer Forensics.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Advance startup options Shift Restart. Restart options.
How to Fix Missing WMVCore.dll Error in Windows 10
How to fix Missing Windows Sockets Registry Entries required for Network Connectivity in Windows 10 /pages/Reimage- Repair- Tool/ /u/6/b/

Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Support for How to Fix Bitdefender Antivirus Error 100?
Lesson 19: Configuring and Managing Updates
Interpreting exomes and genomes: a beginner’s guide
KEY CONCEPT Entire genomes are sequenced, studied, and compared.
Biotechnology.
oad or wrong installation or Call
Steps to Fix McAfee Error Code Call
Call Steps to fix Webroot Secureanywhere Error 10
xhxhxfhxf
njh
How to Troubleshoot Norton 360 Error Code “3039 1”?
Call to Fix QuickBooks Error
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Call to Fix QuickBooks has Stopped Working
How to Fix Norton Antivirus Sonar Protection Error.
How To Solve Software Failure Issues By I FIX PC
How To Resolve Blue Screen Errors By I FIX PC
New genes can be added to an organism’s DNA.
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
KEY CONCEPT Entire genomes are sequenced, studied, and compared.
KEY CONCEPT Entire genomes are sequenced, studied, and compared.
KEY CONCEPT Entire genomes are sequenced, studied, and compared.
The Troubleshooting theory
Presentation transcript:

Computer Genomics: Towards Self- Change and Configuration Management ( Yi-Min Wang Senior Researcher & Group Manager Systems Management Research Group (

OUTLINE Change & Configuration Management Genomics & Computer Genomics What We’ve Learned From The Analogy Systems Management –Configuration Troubleshooting –Patch Impact Analysis –Spyware Management Towards Self-Management

Change & Configuration Management Problem Scope –Setting changes through Control Panel, program executions, etc. –Software installations, updates, and patching –Drive-by downloads of spyware … O(10 1 ) to O(10 2 ) processes … … O(10 5 ) Registry entries and files Setting Change Spyware Download Patching

Configuration Errors Persistent: cannot be solved by restart / reboot A major contributor to Internet service unavailability and computer user frustration Executable Files Process Persistent Configuration Settings Aging Volatile State App Restart Rejuvenation Machine Reboot App Reinstallation System Restore OS Re-imaging Patching

Genomics & Computer Genomics “A”, “C”, “G”, and “T” are the four DNA letters of the genetic alphabet –“1” and “0” are the binary letters of the computer genetic alphabet 3 billion base pairs arranged into 24 distinct chromosomes –Windows Registry is typically 50MB (or 400 mega bits) arranged into several hives

Gene: a stretch of sequence in a specific position on a DNA strand –Computer gene: a Registry entry (a stretch of bit sequence) in a specific position of a hive identified by a hierarchical path name Gene carries the instructions for making a particular protein through gene expression –Registry entry carries the instructions for configuring a particular process instantiation

Less than 2 percent of the human genome is made up of protein-coding sequences The rest labeled as ‘junk’ DNA –A lot of Registry entries are not configuration settings, but rather “operational states” such as usage counts, most recently used files, etc. –They can be labeled as ‘junk’ entries as far as configuration management is concerned

Any two persons’ genome is >99.9% identical –Registry snapshots from two different days on the same machine typically have about 99% of the entries identical between them Even between mouse and human genes, the similarities range from 70% to 90% –Even across different machines, there is a high degree of similarity

Majority of variations in the genome sequence simply create diversity –Majority of variations in Registry simply reflect diversity in hardware/software installation and user preferences But some genetic differences are responsible for causing diseases: the gene for Huntington’s disease was found at the tip of the short arm of Chromosome 4 –Some differences in Registry data are responsible for configuration problems. –For example, the gene for the “Short-cuts-do-not- work” problem was found at the following Registry location: HKEY_CLASSES_ROOT\CLSID\{ C }\shellex\MayChangeDefaultMenu

Huntington’s Gene & Human Chromosomes Short-cuts-do-not-work’s Gene

Most diseases involve the interaction of several genes Studies have shown irrefutable evidence of the role environment plays in gene expression –Studies of Registry problems reveal that the “healthy” or “sick” values of many entries are not absolute on their own and very often depend on the environment of individual machines

Gene therapy can potentially treat diseases by using normal genes to replace a defective gene But some failed experiments have shown the risk of unexpected side effects of creating new diseases –The equivalent of gene therapy can be easily performed with a Registry or file editor –But direct modifications to these low-level state information can potentially cause inconsistency and lead to more serious problems

What We’ve Learned From The Analogy Configuration problems are solvable –One order of magnitude easier than the genomics problem Techniques for complexity reduction –Noise filtering through “junk” labeling –Diff can be very powerful: two orders of magnitude reduction –Attack the Mess with the Mass: statistical analysis across multiple machines Computer Genomics Database for problem detection and repair –Problems with known root causes: which gene causes which problem and how to fix it –Problems with unknown root causes: which action should be tried to provide safe gene therapy

No.1: Configuration Troubleshooting “It worked yesterday, but not today.” “It worked for that user, but not this user.” “It worked on that machine, but not this machine.” “I restarted the application, rebooted the machine, but still can’t fix the problem!”

Noise Filtering Strider Process for Configuration Troubleshooting Context Information Gathering phase Complexity Reduction Phase It was working Now it doesn’t work User Tool State Diff The program keeps failing Tracing Support Database Lookup Support Articles Intersection Filtered & Ranked Candidate Set State Ranking PC Genomics Database Ownership Mapping Config Action UI App Info Doc

Cross-Restore-Point Results Average Registry size After diff & trace intersection Another Two Orders Of Magnitude After state diff Two Orders After noise filtering Root cause Order-ranking

No.2: Patch Impact Analysis “If I apply this security patch, which one of the 3,000 applications in my company is going to be affected?”

Strider Process for Patch Impact Analysis Context Information Gathering phase Complexity Reduction Phase Before Patching After Patching User Tool State Diff All Program Executions Tracing Intersection Filtered & Ranked Candidate Set State Ranking (Process Criticality) Noise Filtering (System Processes) PC Genomics Database Process-to-Application Mapping Applications Requiring High-Priority Testing

No.3: Spyware Management “I’m getting lots of pop-ups and my browser is crashing a lot. What software got installed on my machine?”

Strider Process for Spyware Management Context Information Gathering phase Complexity Reduction Phase Before Spyware Infection After Spyware Infection User Tool State Diff Reboot Machine & Launch IE Tracing Known-* Database Lookup Objective Criteria Evaluation, Bundle Information, & Support Articles Intersection Filtered & Ranked Candidate Set State Ranking (Behavior Criticality) Noise Filtering (Known Goods) PC Genomics Database

Towards Self-Management Flight Data Recorder (FDR) –Always-on tracing, diff’ing, intersection, noise filtering, and state ranking –Automatic genomic lookup for known problems “Self-healing”, “known-bad”, and “wait for user complaint” –Automatic PeerPressure analysis for anomaly detection –Automatic generation of black-box application dependency database –Automatic trace analysis for new ASEP hooks ASEP = Auto-Start Extensibility Point

Summary The Strider Process for Handling Persistent-State Complexity 1.Diff 2.Trace 3.Intersection 4.Noise Filtering 5.State Ranking 6.Look-up

For More Information Google  “MSR Strider” or Configuration Management –Strider Troubleshooting: DSN’03, LISA’04, DSN’04, LISA’05 –Glean: ICAC’04 –Flight Data Recorder (FDR): LISA’05 –Friends Troubleshooting Network (FTN): IPTPS’04 –PeerPressure: SigMetrics’04 (poster) Patch Management –ICAC’04 Spyware Management –LISA’05

Thank You! International Conference on Autonomic Computing (ICAC’05) –Tentative: May 2005 in Seattle