Skip to main content

Investigation of Security Issues in Distributed System Monitoring

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

The distributed systems have a noteworthy role in today’s information technology whether it is governmental or nongovernmental organization. Adaptive distributed systems (ADS) are distributed systems that can evolve their behaviors based on changes in their environments (Schlichting and Hiltunen, Designing and implementing adaptive distributed systems, 1998, http://www.cs.arizona.edu/adaptiveds/overview.html). For example, a constant monitoring is required in distributed system to dynamically balance the load using centralized approach (Sarma and Dasgupta, Int J Adv Res Ideas Innov Technol 2:5–10, 2014). A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network systems. The monitoring of network may help to improve the efficiency of the overall network. However, the monitoring system may be compromised by the intruder by gathering the information from the distributed systems. The various secure and insecure monitoring mechanisms have been adopted by adaptive distributed systems. Most of the distributed systems nowadays use monitoring tools to monitor the various parameters of the networking system. The monitoring tool has been implemented to assess the performance overhead during monitoring. The Wireshark monitoring tool and JMonitor tool (Penteado and Trevelin, JMonitor: a monitoring tool for distributed systems. In Proceedings of international conference on systems, man, and cybernetics, COEX, Seoul, Korea, pp 1767–1772, 2012) have been used to monitor the communication between the various users and also to monitor the computational resources used in networked computers. The main concern of this chapter is to investigate the existing monitoring tools for finding the impacts of monitoring activities in the distributed network. The investigations result that, when the monitoring tool collects security-critical information, there is a high risk of information disclosure to unauthorized users. The second concern is that a secure communication channel can be implemented by using the Rivest, Shamir, and Adelman (RSA) algorithm to monitor the confidential information. This chapter illustrates the implementation and experimental results related to authors’ research work and formulation of framework for security mechanisms in the context of adaptive distributed systems (Kotari et al., IOSR J Comput Eng 18:25–36, 2016).

Security issues for existing monitoring tool are investigated in detail here. In this connection, the chapter deals with the several security-related network scenarios experienced during monitoring with the help of Wireshark monitoring tool. The proper use of Wireshark monitoring tool helps to identify the possible security threats such as emerging threats of hackers, corporate data theft, and identifying threats due to viruses. The implementation of secure communication channel is discussed, which minimizes the above set of threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharpe, R., & Warnicke, E. (2014). Capturing live network of data, Wireshark user’s guide: For Wireshark 1.99. https://www.wireshark.org/docs/

  2. Mittal, H., Jain, M., & Banda, L. (2013). Monitoring local area network using remote method invocation. International Journal of Computer Science and Mobile Computing, 5(2), 50–55.

    Google Scholar 

  3. Moraes, D. M., & Duarte, E. P. (2011). A failure detection service for internet-based multi-as distributed systems. In Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems (pp. 260–267).

    Google Scholar 

  4. Aredo, D., & Yildirim, S. (2006). Security issues in adaptive distributed systems. In Proceedings of the Fourteenth European Conference on Information Systems (ECIS) (pp. 2206–2215).

    Google Scholar 

  5. Kotenko, I., & Doynikova, E. (2014). Evaluation of computer network security based on attack graphs and security event processing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(5), 14–29.

    Google Scholar 

  6. Liu, Y., Xingyu, L., Jian, Y., & Xiao, Y. (2016). A framework of a software defined security architecture. China Communications, 13, 178–188.

    Google Scholar 

  7. Wiczer, J., & Wiczer, M. B. (2015). Improving energy efficiency using customized monitoring tools. In Proceedings of 117th Metalcasting Congress, Modern Casting, Vernon Hills, IL (pp. 36–39).

    Google Scholar 

  8. Wireshark Tutorial (http://www.wireshark.org/docs/wsug_html_chunked/), man pages (http://www.wireshark.org/docs/man-pages/), and a detailed FAQ (http://www.wireshark.org/faq.html) Retrieved April 2015.

  9. Fuginia, M., Hadjichristofib, G., & Teimourikiaa, M. (2015). A web-based cooperative tool for risk management with adaptive security, future generation computer systems (pp. 1–16). Nicosia/Limassol: Frederick University.

    Google Scholar 

  10. Hernandez, C., Pedraza, L. F., & Salgado, C. (2013). A proposal of traffic model that allows estimating throughput mean values. In Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops (pp. 517–522). IEEE Computer Society.

    Google Scholar 

  11. Pop, F., Arcalianu, A., Dobre, C., & Cristea, V. (2011). Enhanced security for monitoring services in large scale distributed systems. In Proceedings of International Conference on Intelligent Computer Communication and Processing (ICCP) (pp. 549–556). IEEE.

    Google Scholar 

  12. Murugan, M., Kant, K., Raghavan, A., & Du, D. H. C. (2014). FlexStore: A software defined, energy adaptive distributed storage framework. In Proceedings of 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (pp. 81–90). IEEE Computer Society.

    Google Scholar 

  13. Jeswani, D., Natu, M., & Ghosh, R. K. (2012). Adaptive monitoring: A framework to adapt passive monitoring using probing. In Proceedings of 8th International Conference on Network and Service Management (CNSM) (pp. 350–356).

    Google Scholar 

  14. Penteado, M. G., & Trevelin, L. C. (2012). JMonitor: A monitoring tool for distributed systems. In Proceedings of International Conference on Systems, Man, and Cybernetics, COEX, Seoul, Korea (pp. 1767–1772).

    Google Scholar 

  15. Kotari, M., Chiplunkar, N. N., & Nagesh, H. R. (2016). Framework of security mechanisms for monitoring adaptive distributed systems. IOSR Journal of Computer Engineering (IOSR-JCE), 18(4), 25–36.

    Article  Google Scholar 

  16. Comuzzi, M., & Martinez, R. I. R. (2014). Customized infrastructures for monitoring business processes. In Proceedings of 8th International Symposium on Service Oriented System Engineering (pp. 122–127). IEEE.

    Google Scholar 

  17. Oikonomou, G., & Apostolopoulos, T. (2007). A framework for the management of distributed systems based on SNMP. In Proceedings of 22nd international symposium on Computer and information Sciences(ISCIS) (pp. 78–83). IEEE.

    Google Scholar 

  18. Chen, S., Nepal, S., & Pandey, S. (2012). A unified monitoring framework for distributed information system management. In Proceedings of 8th International Conference on Computing Technology and Information Management (ICCM) (pp. 259–264). IEEE.

    Google Scholar 

  19. Fonseca, H., Rocha, E., Salvador, P., & Nogueira, A. (2014). Framework for collecting social network events. In Proceedings of 16th International Conference on Telecommunications Network Strategy and Planning Symposium (pp. 1–6). IEEE.

    Google Scholar 

  20. Atighetchi, M., & Adler, A. (2014). A framework for resilient remote monitoring. In Proceedings of 7th International Symposium on Resilient Control Systems (ISRCS) (pp. 1–8).

    Google Scholar 

  21. Jarraya, Y., Raya, S., Soeanua, A., Debbabia, M., Alloucheb, M., & Bergerb, J. (2013). Towards a distributed plan execution monitoring framework. In Proceedings of 3rd International Symposium on Frontiers in Ambient and Mobile Systems (FAMS), Procedia Computer Science 19 (pp. 1034–1039). Elsevier.

    Google Scholar 

  22. Agbogun, J., & Ejiga, F. A. (2013). Network security management: solutions to network intrusion related problems. International Journal of Computer and Information Technology, 4(2), 617–625.

    Google Scholar 

  23. Feyissa, M. (2007). Monitoring distributed systems for adaptive security. Master thesis, Department of Computer Science, School of Graduate Studies of Addis Ababa University, Addis Ababa.

    Google Scholar 

  24. Zhou, Z. (2013). Design and realization of distributed intelligent monitoring systems using power plant (pp. 595–601). Berlin: Springer.

    Google Scholar 

  25. Schlichting, R. D., & Hiltunen, M. (1998). Designing and implementing adaptive distributed systems. University of Arizona, Arizona. Retrieved Feb, 2018, from http://www.cs.arizona.edu/adaptiveds/overview.html

  26. Sarma, B., & Dasgupta, S. (2014). Dynamic load calculation in a distributed system using centralized approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(1), 5–10.

    Google Scholar 

  27. Falai, L. (2007). Observing, monitoring and evaluating distributed systems. Ph.D. Thesis, University of Lisboa, Portugal.

    Google Scholar 

  28. Hanninen, M., Suhonen, J., Hamalainen, T. D., & Hannikainen, M. (2011). Practical monitoring and analysis tool for WSN testing. In Proceedings of International Conference on Design and Architectures for Signal and Image Processing (DASIP) (pp. 23–32). IEEE.

    Google Scholar 

  29. Qadeer, M. A., & Zahid, M. (2010). Network traffic analysis and intrusion detection using packet sniffer. In Proceedings of Second International Conference on Communication Software and Networks (pp. 313–317). IEEE.

    Google Scholar 

  30. RSA elliptic curve cryptography. Retrieved November 30, 2017, from http://www.rsa.com/rsalabs/node.asp?id=2013

  31. Choudhury, S., Bhatnagar, K., & Haque, W. (2002). Public key infrastructure implementation and design. New York: Hungry Minds.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kotari, M., Chiplunkar, N.N. (2020). Investigation of Security Issues in Distributed System Monitoring. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics