Abstract
The distributed systems have a noteworthy role in today’s information technology whether it is governmental or nongovernmental organization. Adaptive distributed systems (ADS) are distributed systems that can evolve their behaviors based on changes in their environments (Schlichting and Hiltunen, Designing and implementing adaptive distributed systems, 1998, http://www.cs.arizona.edu/adaptiveds/overview.html). For example, a constant monitoring is required in distributed system to dynamically balance the load using centralized approach (Sarma and Dasgupta, Int J Adv Res Ideas Innov Technol 2:5–10, 2014). A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network systems. The monitoring of network may help to improve the efficiency of the overall network. However, the monitoring system may be compromised by the intruder by gathering the information from the distributed systems. The various secure and insecure monitoring mechanisms have been adopted by adaptive distributed systems. Most of the distributed systems nowadays use monitoring tools to monitor the various parameters of the networking system. The monitoring tool has been implemented to assess the performance overhead during monitoring. The Wireshark monitoring tool and JMonitor tool (Penteado and Trevelin, JMonitor: a monitoring tool for distributed systems. In Proceedings of international conference on systems, man, and cybernetics, COEX, Seoul, Korea, pp 1767–1772, 2012) have been used to monitor the communication between the various users and also to monitor the computational resources used in networked computers. The main concern of this chapter is to investigate the existing monitoring tools for finding the impacts of monitoring activities in the distributed network. The investigations result that, when the monitoring tool collects security-critical information, there is a high risk of information disclosure to unauthorized users. The second concern is that a secure communication channel can be implemented by using the Rivest, Shamir, and Adelman (RSA) algorithm to monitor the confidential information. This chapter illustrates the implementation and experimental results related to authors’ research work and formulation of framework for security mechanisms in the context of adaptive distributed systems (Kotari et al., IOSR J Comput Eng 18:25–36, 2016).
Security issues for existing monitoring tool are investigated in detail here. In this connection, the chapter deals with the several security-related network scenarios experienced during monitoring with the help of Wireshark monitoring tool. The proper use of Wireshark monitoring tool helps to identify the possible security threats such as emerging threats of hackers, corporate data theft, and identifying threats due to viruses. The implementation of secure communication channel is discussed, which minimizes the above set of threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sharpe, R., & Warnicke, E. (2014). Capturing live network of data, Wireshark user’s guide: For Wireshark 1.99. https://www.wireshark.org/docs/
Mittal, H., Jain, M., & Banda, L. (2013). Monitoring local area network using remote method invocation. International Journal of Computer Science and Mobile Computing, 5(2), 50–55.
Moraes, D. M., & Duarte, E. P. (2011). A failure detection service for internet-based multi-as distributed systems. In Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems (pp. 260–267).
Aredo, D., & Yildirim, S. (2006). Security issues in adaptive distributed systems. In Proceedings of the Fourteenth European Conference on Information Systems (ECIS) (pp. 2206–2215).
Kotenko, I., & Doynikova, E. (2014). Evaluation of computer network security based on attack graphs and security event processing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(5), 14–29.
Liu, Y., Xingyu, L., Jian, Y., & Xiao, Y. (2016). A framework of a software defined security architecture. China Communications, 13, 178–188.
Wiczer, J., & Wiczer, M. B. (2015). Improving energy efficiency using customized monitoring tools. In Proceedings of 117th Metalcasting Congress, Modern Casting, Vernon Hills, IL (pp. 36–39).
Wireshark Tutorial (http://www.wireshark.org/docs/wsug_html_chunked/), man pages (http://www.wireshark.org/docs/man-pages/), and a detailed FAQ (http://www.wireshark.org/faq.html) Retrieved April 2015.
Fuginia, M., Hadjichristofib, G., & Teimourikiaa, M. (2015). A web-based cooperative tool for risk management with adaptive security, future generation computer systems (pp. 1–16). Nicosia/Limassol: Frederick University.
Hernandez, C., Pedraza, L. F., & Salgado, C. (2013). A proposal of traffic model that allows estimating throughput mean values. In Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops (pp. 517–522). IEEE Computer Society.
Pop, F., Arcalianu, A., Dobre, C., & Cristea, V. (2011). Enhanced security for monitoring services in large scale distributed systems. In Proceedings of International Conference on Intelligent Computer Communication and Processing (ICCP) (pp. 549–556). IEEE.
Murugan, M., Kant, K., Raghavan, A., & Du, D. H. C. (2014). FlexStore: A software defined, energy adaptive distributed storage framework. In Proceedings of 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (pp. 81–90). IEEE Computer Society.
Jeswani, D., Natu, M., & Ghosh, R. K. (2012). Adaptive monitoring: A framework to adapt passive monitoring using probing. In Proceedings of 8th International Conference on Network and Service Management (CNSM) (pp. 350–356).
Penteado, M. G., & Trevelin, L. C. (2012). JMonitor: A monitoring tool for distributed systems. In Proceedings of International Conference on Systems, Man, and Cybernetics, COEX, Seoul, Korea (pp. 1767–1772).
Kotari, M., Chiplunkar, N. N., & Nagesh, H. R. (2016). Framework of security mechanisms for monitoring adaptive distributed systems. IOSR Journal of Computer Engineering (IOSR-JCE), 18(4), 25–36.
Comuzzi, M., & Martinez, R. I. R. (2014). Customized infrastructures for monitoring business processes. In Proceedings of 8th International Symposium on Service Oriented System Engineering (pp. 122–127). IEEE.
Oikonomou, G., & Apostolopoulos, T. (2007). A framework for the management of distributed systems based on SNMP. In Proceedings of 22nd international symposium on Computer and information Sciences(ISCIS) (pp. 78–83). IEEE.
Chen, S., Nepal, S., & Pandey, S. (2012). A unified monitoring framework for distributed information system management. In Proceedings of 8th International Conference on Computing Technology and Information Management (ICCM) (pp. 259–264). IEEE.
Fonseca, H., Rocha, E., Salvador, P., & Nogueira, A. (2014). Framework for collecting social network events. In Proceedings of 16th International Conference on Telecommunications Network Strategy and Planning Symposium (pp. 1–6). IEEE.
Atighetchi, M., & Adler, A. (2014). A framework for resilient remote monitoring. In Proceedings of 7th International Symposium on Resilient Control Systems (ISRCS) (pp. 1–8).
Jarraya, Y., Raya, S., Soeanua, A., Debbabia, M., Alloucheb, M., & Bergerb, J. (2013). Towards a distributed plan execution monitoring framework. In Proceedings of 3rd International Symposium on Frontiers in Ambient and Mobile Systems (FAMS), Procedia Computer Science 19 (pp. 1034–1039). Elsevier.
Agbogun, J., & Ejiga, F. A. (2013). Network security management: solutions to network intrusion related problems. International Journal of Computer and Information Technology, 4(2), 617–625.
Feyissa, M. (2007). Monitoring distributed systems for adaptive security. Master thesis, Department of Computer Science, School of Graduate Studies of Addis Ababa University, Addis Ababa.
Zhou, Z. (2013). Design and realization of distributed intelligent monitoring systems using power plant (pp. 595–601). Berlin: Springer.
Schlichting, R. D., & Hiltunen, M. (1998). Designing and implementing adaptive distributed systems. University of Arizona, Arizona. Retrieved Feb, 2018, from http://www.cs.arizona.edu/adaptiveds/overview.html
Sarma, B., & Dasgupta, S. (2014). Dynamic load calculation in a distributed system using centralized approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(1), 5–10.
Falai, L. (2007). Observing, monitoring and evaluating distributed systems. Ph.D. Thesis, University of Lisboa, Portugal.
Hanninen, M., Suhonen, J., Hamalainen, T. D., & Hannikainen, M. (2011). Practical monitoring and analysis tool for WSN testing. In Proceedings of International Conference on Design and Architectures for Signal and Image Processing (DASIP) (pp. 23–32). IEEE.
Qadeer, M. A., & Zahid, M. (2010). Network traffic analysis and intrusion detection using packet sniffer. In Proceedings of Second International Conference on Communication Software and Networks (pp. 313–317). IEEE.
RSA elliptic curve cryptography. Retrieved November 30, 2017, from http://www.rsa.com/rsalabs/node.asp?id=2013
Choudhury, S., Bhatnagar, K., & Haque, W. (2002). Public key infrastructure implementation and design. New York: Hungry Minds.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kotari, M., Chiplunkar, N.N. (2020). Investigation of Security Issues in Distributed System Monitoring. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)