Skip to main content
Erschienen in: The Journal of Supercomputing 2/2014

01.02.2014

SHAPE—an approach for self-healing and self-protection in complex distributed networks

verfasst von: Inderpreet Chopra, Maninder Singh

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Increasing complexity of large scale distributed systems is creating problem in managing faults and security attacks because of the manual style adopted for management. This paper proposes a novel approach called SHAPE to self-heal and self-protect the system from various kinds of faults and security attacks. It deals with hardware, software, and network faults and provides security against DDoS, R2L, U2L, and probing attacks. SHAPE is implemented and evaluated against various standard metrics. The results are provided to support the approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Foster I, Kesselman C, Nick JM, Tuecke S (2004) The physiology of the grid. Global Grid Forum Foster I, Kesselman C, Nick JM, Tuecke S (2004) The physiology of the grid. Global Grid Forum
2.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58 CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58 CrossRef
3.
Zurück zum Zitat Sun W, Zhang X, Guo CJ, Sun P, Su H (2008) Software as a service: configuration and customization perspectives. In: Congress on services part II, SERVICES-2, 23–26 Sept. IEEE Press, New York Sun W, Zhang X, Guo CJ, Sun P, Su H (2008) Software as a service: configuration and customization perspectives. In: Congress on services part II, SERVICES-2, 23–26 Sept. IEEE Press, New York
4.
Zurück zum Zitat Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: IEEE grid computing environments GCE08 Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: IEEE grid computing environments GCE08
5.
Zurück zum Zitat Chopra I, Singh M (2010) Analysing the need for autonomic behaviour in grid computing. In: Computer and automation engineering (ICCAE). IEEE Press, New York, pp 535–539 Chopra I, Singh M (2010) Analysing the need for autonomic behaviour in grid computing. In: Computer and automation engineering (ICCAE). IEEE Press, New York, pp 535–539
6.
Zurück zum Zitat Ganek AG, Corbi TA (2003) The dawning of the autonomic computing era. IBM Syst J 42(1):5–18 CrossRef Ganek AG, Corbi TA (2003) The dawning of the autonomic computing era. IBM Syst J 42(1):5–18 CrossRef
7.
Zurück zum Zitat Psaier H Dustdar S (2011) A survey on self-healing systems: approaches and systems. Computing. Springer, Berlin Psaier H Dustdar S (2011) A survey on self-healing systems: approaches and systems. Computing. Springer, Berlin
8.
Zurück zum Zitat Ghosh D, Sharman R, Raghav Rao H, Upadhyaya S (2006) Self-healing systems—survey and synthesis. Elsevier, Amsterdam Ghosh D, Sharman R, Raghav Rao H, Upadhyaya S (2006) Self-healing systems—survey and synthesis. Elsevier, Amsterdam
9.
Zurück zum Zitat Parashar M, Hariri S (2005) Autonomic computing: an overview Springer, Berlin, pp 247–259 Parashar M, Hariri S (2005) Autonomic computing: an overview Springer, Berlin, pp 247–259
10.
Zurück zum Zitat Garg R, Singh AK (2011) Fault tolerance in grid computing: state of art and open issues. Int J Comput Sci Eng Surv IJCSES Garg R, Singh AK (2011) Fault tolerance in grid computing: state of art and open issues. Int J Comput Sci Eng Surv IJCSES
11.
Zurück zum Zitat Hoffmann H, Eastep J et al (2010) Application heartbeats: a generic interface for specifying program performance and goals in autonomous computing environments. In: Proceeding of the 7th international conference on autonomic computing, ICAC. New York, NY, USA. ACM, New York, 7988 pp Hoffmann H, Eastep J et al (2010) Application heartbeats: a generic interface for specifying program performance and goals in autonomous computing environments. In: Proceeding of the 7th international conference on autonomic computing, ICAC. New York, NY, USA. ACM, New York, 7988 pp
12.
Zurück zum Zitat Maggio M, Hoffmann H, Leva A (2010) Controlling software applications via resource allocation within the heartbeats framework In: Proceeding of the 49th international conference on decision and control, Atlanta, USA. IEEE Press, New York Maggio M, Hoffmann H, Leva A (2010) Controlling software applications via resource allocation within the heartbeats framework In: Proceeding of the 49th international conference on decision and control, Atlanta, USA. IEEE Press, New York
13.
Zurück zum Zitat Maggio M, Hoffmann H, Santambrogio MD, Agarwal A, Leva A (2011) A comparison of autonomic decision making techniques. Computer science and artificial intelligence laboratory technical report, MIT Maggio M, Hoffmann H, Santambrogio MD, Agarwal A, Leva A (2011) A comparison of autonomic decision making techniques. Computer science and artificial intelligence laboratory technical report, MIT
14.
Zurück zum Zitat Amoon M (2011) A development of fault-tolerant and scheduling system for grid computing. GESJ, Comput Sci Telecommun Amoon M (2011) A development of fault-tolerant and scheduling system for grid computing. GESJ, Comput Sci Telecommun
15.
Zurück zum Zitat Zhao L, Ren Y, Xiang Y, Sakurai K (2010) Faulttolerant scheduling with dynamic number of replicas in heterogeneous systems. In: High performance computing and communications (HPCC), pp 434–441 Zhao L, Ren Y, Xiang Y, Sakurai K (2010) Faulttolerant scheduling with dynamic number of replicas in heterogeneous systems. In: High performance computing and communications (HPCC), pp 434–441
16.
Zurück zum Zitat Claudel B, De Palma N, Lachaize R, Hagimont D (2006) Self-protection for distributed component based applications. Springer, Berlin Claudel B, De Palma N, Lachaize R, Hagimont D (2006) Self-protection for distributed component based applications. Springer, Berlin
17.
Zurück zum Zitat Networks A (2012) Arbor special report: worldwide infrastructure security report, vol VIII Networks A (2012) Arbor special report: worldwide infrastructure security report, vol VIII
18.
Zurück zum Zitat Varalakshmi P, Thamarai Selvi S (2013) Thwarting DDoS attacks in grid using information divergence. Future Gener Comput Syst Varalakshmi P, Thamarai Selvi S (2013) Thwarting DDoS attacks in grid using information divergence. Future Gener Comput Syst
19.
Zurück zum Zitat Cappelli D, Moore A, Trzeciak R (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). SEI series in software engineering. Addison–Wesley, Reading, 28 pp Cappelli D, Moore A, Trzeciak R (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). SEI series in software engineering. Addison–Wesley, Reading, 28 pp
20.
Zurück zum Zitat Humphrey M, Thompson M (2002) Security implications of typical grid computing usage scenarios, cluster computing, vol 5, issue 3, July Humphrey M, Thompson M (2002) Security implications of typical grid computing usage scenarios, cluster computing, vol 5, issue 3, July
21.
Zurück zum Zitat Kendall K (1999) In: A database of computer attacks for the evaluation of intrusion detection systems, June Kendall K (1999) In: A database of computer attacks for the evaluation of intrusion detection systems, June
22.
Zurück zum Zitat McAfee (2006) Archived from the original on rootkits, part 1 of 3: the growing threat McAfee (2006) Archived from the original on rootkits, part 1 of 3: the growing threat
24.
Zurück zum Zitat Bace R (2000) Intrusion detection. Macmillan Technical Publishing, Indianapolis Bace R (2000) Intrusion detection. Macmillan Technical Publishing, Indianapolis
26.
Zurück zum Zitat Roesch M (1999) Snort—lightweight intrusion detection for networks. In: Proceedings of the 13th LISA conference of USENIX association Roesch M (1999) Snort—lightweight intrusion detection for networks. In: Proceedings of the 13th LISA conference of USENIX association
27.
Zurück zum Zitat Ali Aydin M, Halim Zaim A, Gökhan Ceylan K (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35:517–526 CrossRefMATH Ali Aydin M, Halim Zaim A, Gökhan Ceylan K (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35:517–526 CrossRefMATH
28.
Zurück zum Zitat Ding Y-X, Xiao M, Liu A-W (2009) Research and implementation on snort-based hybrid intrusion detection system. In: Proceedings of the eighth international conference on machine learning and cybernetics, Baoding, 12–15 July. IEEE Press, New York. doi:10.1109/ICMLC.2009.5212282 Ding Y-X, Xiao M, Liu A-W (2009) Research and implementation on snort-based hybrid intrusion detection system. In: Proceedings of the eighth international conference on machine learning and cybernetics, Baoding, 12–15 July. IEEE Press, New York. doi:10.​1109/​ICMLC.​2009.​5212282
29.
Zurück zum Zitat Gomez J, Gil C, Padilla N, Banos R, Jimenez C (2009) Design of a snort-based hybrid intrusion detection system. In: IWANN 2009, part II. LNCS, vol 5518, pp 515–522 Gomez J, Gil C, Padilla N, Banos R, Jimenez C (2009) Design of a snort-based hybrid intrusion detection system. In: IWANN 2009, part II. LNCS, vol 5518, pp 515–522
30.
Zurück zum Zitat Katkar V, Bhirud SG (2012) Novel DoS/DDoS attack detection and signature generation. Int J Comput Appl 47(10):18–24 Katkar V, Bhirud SG (2012) Novel DoS/DDoS attack detection and signature generation. Int J Comput Appl 47(10):18–24
31.
Zurück zum Zitat Diaz-Verdejo JE, Garcia-Teodoro P, Munoz P, Macia-Fernandez G (2007) A Snort-based approach for the development and deployment of hybrid IDS. IEEE Lat Am Trans 5(6):386–392 CrossRef Diaz-Verdejo JE, Garcia-Teodoro P, Munoz P, Macia-Fernandez G (2007) A Snort-based approach for the development and deployment of hybrid IDS. IEEE Lat Am Trans 5(6):386–392 CrossRef
32.
Zurück zum Zitat Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Trans Dependable Secure Comput 4(1):41–55 CrossRef Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Trans Dependable Secure Comput 4(1):41–55 CrossRef
33.
Zurück zum Zitat Wuu LC, Hung CH, Chen SF (2007) Building intrusion pattern miner for Snort network intrusion detection system. J Syst Softw 80(10):1699–1715 CrossRef Wuu LC, Hung CH, Chen SF (2007) Building intrusion pattern miner for Snort network intrusion detection system. J Syst Softw 80(10):1699–1715 CrossRef
34.
Zurück zum Zitat Brahmi I, Yahia SB, Poncelet P (2011) A Snort-based mobile agent for a distributed intrusion detection system. In: SECRYPT 2011—proceedings of the international conference on security and cryptography, Seville, Spain, 18–21 July Brahmi I, Yahia SB, Poncelet P (2011) A Snort-based mobile agent for a distributed intrusion detection system. In: SECRYPT 2011—proceedings of the international conference on security and cryptography, Seville, Spain, 18–21 July
35.
Zurück zum Zitat Suryawanshi GR, Vanjale SB (2010) Mobile agent for distributed intrusion detection system in distributed system. In: Proceedings in international journal of artificial intelligence and computational research (IJAICR), June Suryawanshi GR, Vanjale SB (2010) Mobile agent for distributed intrusion detection system in distributed system. In: Proceedings in international journal of artificial intelligence and computational research (IJAICR), June
36.
Zurück zum Zitat Exposito JA Ametller J Robles S (2010) Configuring the JADE HTTP MTP Exposito JA Ametller J Robles S (2010) Configuring the JADE HTTP MTP
37.
Zurück zum Zitat Zolnowski AP (2012) JADE-PKI 1.0 manual, 9 September Zolnowski AP (2012) JADE-PKI 1.0 manual, 9 September
39.
Zurück zum Zitat Kadav A, Renzelmann MJ, Swift MM (2009) Tolerating hardware device failures in software, SOSP’09, 11–14 October Kadav A, Renzelmann MJ, Swift MM (2009) Tolerating hardware device failures in software, SOSP’09, 11–14 October
40.
Zurück zum Zitat Maciej Szmit, Adamus S, Bugaa S, Szmit A (2012) Anomaly detection 3.0 for Snort. Snort.AD Project Maciej Szmit, Adamus S, Bugaa S, Szmit A (2012) Anomaly detection 3.0 for Snort. Snort.AD Project
41.
Zurück zum Zitat Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: 5th annual ACM workshop on COLT. ACM Press, Pittsburgh, pp 144–152 Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: 5th annual ACM workshop on COLT. ACM Press, Pittsburgh, pp 144–152
Metadaten
Titel
SHAPE—an approach for self-healing and self-protection in complex distributed networks
verfasst von
Inderpreet Chopra
Maninder Singh
Publikationsdatum
01.02.2014
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2014
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-1019-3

Weitere Artikel der Ausgabe 2/2014

The Journal of Supercomputing 2/2014 Zur Ausgabe