Skip to main content

Self-adaptability and Vulnerability Assessment of Secure Autonomic Communication Networks

  • Conference paper
Managing Next Generation Networks and Services (APNOMS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4773))

Included in the following conference series:

Abstract

Risk and Vulnerability Analysis (RVA) aims at identifying the weaknesses of the networks that may be exploited to compromise the normal functions, such as service deployment, file system access permissions, applications activations and so on. Autonomic Communication Networks (ACNs) are recently proposed as business-objective driven high-level self-managed telecommunication networks with the adaptation capability to cope with increasing dynamics. Adaptation capability termed as adaptability becomes the premise of realizing thorough autonomy. As a theoretic foundation, we firstly propose an innovative Object-oriented Management Information Base (O:MIB). Secondly, a new information-theoretic security awareness strategy inspired from human immune system is proposed to reconfigure file access right, which has a direct relation with adaptability. The experimental results validate this methodology and find out a statistical bound for operators to set a vulnerability level of warning in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kreidl, O., Frazier, T.: Feedback control applied to survivability: a host-based autonomic defense system. IEEE Transactions on Reliability 53(1), 148–166 (2004)

    Article  Google Scholar 

  2. Kephart, J., Chess, D.: The vision of autonomic computing. Computer 36(1), 41–50 (2003)

    Article  MathSciNet  Google Scholar 

  3. Chiang, F., Braun, R., Hughes, J.: A biologically inspired multi-agent architecture for autonomic service management. Journal of Pervasive Computing and Communications 2(3), 261–275 (2006)

    Article  Google Scholar 

  4. Sweitzer, J.W., Thompson, P., Westerinen, A.R., Williams, R.C., Bumpus, W.: Common Information Model: Implementing the Object Model for Enterprise Management. John Wiley and Sons, Chichester (1999)

    Google Scholar 

  5. Kohonen, T.: Self-organizing maps. Springer, Berlin, New York (2001)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Shingo Ata Choong Seon Hong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chiang, F., Braun, R. (2007). Self-adaptability and Vulnerability Assessment of Secure Autonomic Communication Networks. In: Ata, S., Hong, C.S. (eds) Managing Next Generation Networks and Services. APNOMS 2007. Lecture Notes in Computer Science, vol 4773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75476-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75476-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75475-6

  • Online ISBN: 978-3-540-75476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics