Tolerating Intrusions in Grid Systems

نویسندگان

  • Luis Sardinha
  • Nuno Ferreira Neves
  • Paulo Veríssimo
چکیده

Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be very tempting for a hacker because they can be used, for example, to break pass-phrases with brute-force attacks or to launch distributed denial of service attacks to a given target. In this paper, we explain how malicious intrusions can be tolerated in the Globus toolkit grid environment, a de facto standard in this

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems

Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant micropr...

متن کامل

Geostatistical simulation of dyke systems in Sungun porphyry copper deposit, Iran

Post-mineralization activities may cause difficulties in the process of ore modeling in porphyry deposits. Sungun, NW Iran, is one of the porphyry copper deposits, in which dyke intrusions have made ore modeling more complicated than expected. Among different kinds of dykes, two types were chosen and the consequent geostatistical analyses were applied on. In this study, simple directional vario...

متن کامل

Cyber-Physical System Security of a Power Grid: State-of-the-Art

As part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the c...

متن کامل

Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical

Given that the majority of future processors will contain an abundance of execution cores, redundant execution can offer a promising method for increasing the availability and resilience against intrusions of computing systems. However, redundant execution systems rely on the premise that when external input is duplicated identically to a set of replicas executing the same program, the replicas...

متن کامل

Integrated Access Control and Intrusion Detection (IACID) Framework for Secure Grid Computing

Traditional Intrusion Detection Systems (IDSs) work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between these components prevents detecting sophisticated attacks and responding to ongoing attacks in real time, before they cause damage. Another disadvantage is a large number of false positives. Reports of attacks c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004