Abstract
In recent years grid which facilitates the sharing and integration of large scale heterogenous resources has been recognized as the future framework of distributed computing. Modern software is plagued by security flaws at many levels. Implementation of an autonomic system provides an inherent self-managing capability to the system overcoming the shortcomings of the manual system. This paper presents a new self-protection model- SASM based upon few principles of genetics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mohamed, Y.A., Abdulla, A.B.: Immune Inspired Framework for Securing Hybrid MANET. In: ISIEA. IEEE, Los Alamitos (2009)
Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. Springer, Heidelberg (2006)
Nou, R., Julia, F., Torres, J.: The need for self-managed access nodes in grid environments. IEEE, EASe (2007)
Romberg, M.: The unicore grid infrastructure (2002), http://www.unicore.org
Sotomayor, B., Childers, L.: Globus Toolkit 4: Programming Java Services (2005)
Guo, H., Gao, J., Zhu, P., Zhang, F.: A Self-Organized Model of Agent-Enabling Autonomic Computing for Grid Environment. In: 6th Word Congress on Inteligent Control (2006)
Ganek, A.: Overview of Autonomic Computing: Origins. In: Evolution, Direction. CRC Press, Boca Raton (2004)
Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer (2003)
Humphrey, M., Thompson, M.: Security Implications of Typical Grid Computing Usage Scenarios. Cluster Computing 5(3) (2002)
Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group (2004)
Hartmut, P.: Genetic and Evolutionary Algorithms: Principles, Methods, and Algorithms. In: Genetic and Evolutionary Algorithm Toolbox (2003)
Stopping insider attacks: how organizations can protect their sensitive information (September 2006), ibm.com/services
Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. Springer, Heidelberg (2006)
Chopra, I., Singh, M.: Agent based Self-Healing System for Grid Computing. In: ICWET, pp. 31–35. ACM, New York (2010)
Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: The physiology of the Grid. Global Grid Forum (2002)
Hariri, S., Qu, G., et al.: Quality-of-Protection (QoP)-An Online Monitoring and Self-Protection Mechanism. IEEE Journal on Selected Areas in Communications 23(10) (2005)
Horn, P.: Autonomic computing: IBM’s perspective on the state of information technology (2001), http://www.research.ibm.com/autonomic/
Humphrey, M., Thompson, M.: Security Implications of Typical Grid Computing Usage Scenarios. Cluster Computing 5(3) (July 2002)
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid. John Wiley and Sons, Chichester (2003)
Wang, J., Liu, X., Chien, A.: Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network. In: Proceedings of the 14th Conference on USENIX Security Symposium (2005)
Ferreira, L., Berstis, V., et al.: Introduction to Grid Computing with Globus, IBM, http://www.liv.ac.uk/escience/beowulf/IBM_globus.pdf
Montero, R.S.: The Grid Way Meta-Scheduler. In: Open Source Grid and Cluster, Oakland, CA (May 2008)
Parashar, M., Hariri, S.: Autonomic Computing: An Overview. Springer, Heidelberg (2005)
Tesauro, G., Chess, D.M., Walsh, W.E., Das, R., et al.: A Multi-Agent Systems Approach to Autonomic Computing. In: AAMAS 2004. ACM, New York (2004)
Kreibich, C., Crowcroft, J.: Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. ACM SIGCOMM (January 2004)
Chakrabarti, A.: Grid Computing Security, ch. 6, p. 105. Springer, Heidelberg (2007)
Snort, https://edge.arubanetworks.com/article/leveraging-centralized-encryption-snort-part-1
Stephen, M., Sukumaran Nair, V.S., Abraham, J.: Distributed Computing Grids- Safety and Security. In: Security in Distributed, Grid, Mobile, and Pervasive Computing, ch. 14
Chakrabarti, A.: Grid Computing Security, ch. 8, p. 159. Springer, Heidelberg (2007)
Kenny, S., Coghlan, B.: Towards a Grid-Wide Intrusion Detection System. In: Advances in Grid Computing, pp. 275–284. Springer, Heidelberg (2005)
Schulter, A., Navarro, F., Koch, F., Westphall, C.: Towards Gridbased Intrusion Detection. In: 10th IEEE/IFIP, Network Operations and Management Symposium, NOMS 2006, pp. 1–4 (2006)
Witold Jarmo lkowicz, M.: A Grid-aware Intrusion Detection System, Technical University of Denmark, IMM-THESIS-2007-109
Leu, F.-Y., Li, M.-C., Lin, J.-C.: Intrusion Detection based on Grid. In: ICCGI 2006 (2006)
Srinivas, M., Patnaik, L.M.: Genetic algorithms: A survey. IEEE Computer 27(6), 17–26 (1994)
Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group (2004)
Brennan, M.P.: Using Snort For a Distributed Intrusion Detection System. SANS Institute (2002)
Sallay, H., AlShalfan, K.A., Fredj, O.B.: A scalable distributed IDS Architecture for High speed Networks. IJCSNSÂ 9(8) (August 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chopra, I., Singh, M. (2011). SASM- An Approach towards Self-protection in Grid Computing. In: Dua, S., Sahni, S., Goyal, D.P. (eds) Information Intelligence, Systems, Technology and Management. ICISTM 2011. Communications in Computer and Information Science, vol 141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19423-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-19423-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19422-1
Online ISBN: 978-3-642-19423-8
eBook Packages: Computer ScienceComputer Science (R0)