Efficient Self Protection in Clustered Distributed System Using Access Detection
نویسنده
چکیده
The complexity of today's distributed computing environment is such that the presence of bugs and security holes is statistically unavoidable. A very promising approach to the present issue is to implement a self-protected system. Self-protection refers to the ability for a system to detect illegal behaviors. This article demonstrates the implementation of self-protection manager which targets clustered distributed systems. Our approach is based on the global database of the clustered distributed applications. This knowledge permits to detect known and unknown attacks if an prohibited (illegal) access is performed. The prototype is designed using access detection. Keywords— Cluster security, self-protection, LAN device.
منابع مشابه
Self-protection for Distributed Component-Based Applications
The complexity of today’s distributed computing environments is such that the presence of bugs and security holes is statistically unavoidable. A very promising approach to this issue is to implement a self-protected system, similarly to a natural immune system which has the ability to detect the intrusion of foreign elements and react while it is still in progress. This paper describes an appr...
متن کاملAdaptive Protection Based on Intelligent Distribution Networks with the Help of Network Factorization in the Presence of Distributed Generation Resources
Factorizing a system is one of the best ways to make a system intelligent. Factorizing the protection system, providing the right connecting agents, and transmitting the information faster and more reliably can improve the performance of a protection system and maintain system reliability against distributed generation resources. This study presents a new method for coordinating network protect...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملNomad: A Scalable Operating System for Clusters of Uni and Multiprocessors
The recent improvements in workstation and interconnection network performance have popularized the clusters of off-the-shelf workstations. However, the usefulness of these clusters is yet to be fully exploited, mostly due to the inadequate management of cluster resources implemented by current distributed operating systems. In order to eliminate this problem and approach the computational powe...
متن کاملANTIDS: Self Orga nized Ant-Based C lustering Model for Intrusion Det ection System
Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014