Skip to main content

SASM- An Approach towards Self-protection in Grid Computing

  • Conference paper
Information Intelligence, Systems, Technology and Management (ICISTM 2011)

Abstract

In recent years grid which facilitates the sharing and integration of large scale heterogenous resources has been recognized as the future framework of distributed computing. Modern software is plagued by security flaws at many levels. Implementation of an autonomic system provides an inherent self-managing capability to the system overcoming the shortcomings of the manual system. This paper presents a new self-protection model- SASM based upon few principles of genetics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mohamed, Y.A., Abdulla, A.B.: Immune Inspired Framework for Securing Hybrid MANET. In: ISIEA. IEEE, Los Alamitos (2009)

    Google Scholar 

  2. Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. Springer, Heidelberg (2006)

    Book  Google Scholar 

  3. Nou, R., Julia, F., Torres, J.: The need for self-managed access nodes in grid environments. IEEE, EASe (2007)

    Book  Google Scholar 

  4. Romberg, M.: The unicore grid infrastructure (2002), http://www.unicore.org

  5. Sotomayor, B., Childers, L.: Globus Toolkit 4: Programming Java Services (2005)

    Google Scholar 

  6. Guo, H., Gao, J., Zhu, P., Zhang, F.: A Self-Organized Model of Agent-Enabling Autonomic Computing for Grid Environment. In: 6th Word Congress on Inteligent Control (2006)

    Google Scholar 

  7. Ganek, A.: Overview of Autonomic Computing: Origins. In: Evolution, Direction. CRC Press, Boca Raton (2004)

    Google Scholar 

  8. Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer (2003)

    Google Scholar 

  9. Humphrey, M., Thompson, M.: Security Implications of Typical Grid Computing Usage Scenarios. Cluster Computing 5(3) (2002)

    Google Scholar 

  10. Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group (2004)

    Google Scholar 

  11. Hartmut, P.: Genetic and Evolutionary Algorithms: Principles, Methods, and Algorithms. In: Genetic and Evolutionary Algorithm Toolbox (2003)

    Google Scholar 

  12. Stopping insider attacks: how organizations can protect their sensitive information (September 2006), ibm.com/services

  13. Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. Springer, Heidelberg (2006)

    Book  Google Scholar 

  14. Chopra, I., Singh, M.: Agent based Self-Healing System for Grid Computing. In: ICWET, pp. 31–35. ACM, New York (2010)

    Chapter  Google Scholar 

  15. Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: The physiology of the Grid. Global Grid Forum (2002)

    Google Scholar 

  16. Hariri, S., Qu, G., et al.: Quality-of-Protection (QoP)-An Online Monitoring and Self-Protection Mechanism. IEEE Journal on Selected Areas in Communications 23(10) (2005)

    Google Scholar 

  17. Horn, P.: Autonomic computing: IBM’s perspective on the state of information technology (2001), http://www.research.ibm.com/autonomic/

  18. Humphrey, M., Thompson, M.: Security Implications of Typical Grid Computing Usage Scenarios. Cluster Computing 5(3) (July 2002)

    Google Scholar 

  19. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid. John Wiley and Sons, Chichester (2003)

    Book  Google Scholar 

  20. Wang, J., Liu, X., Chien, A.: Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network. In: Proceedings of the 14th Conference on USENIX Security Symposium (2005)

    Google Scholar 

  21. Ferreira, L., Berstis, V., et al.: Introduction to Grid Computing with Globus, IBM, http://www.liv.ac.uk/escience/beowulf/IBM_globus.pdf

  22. Montero, R.S.: The Grid Way Meta-Scheduler. In: Open Source Grid and Cluster, Oakland, CA (May 2008)

    Google Scholar 

  23. Parashar, M., Hariri, S.: Autonomic Computing: An Overview. Springer, Heidelberg (2005)

    Google Scholar 

  24. Tesauro, G., Chess, D.M., Walsh, W.E., Das, R., et al.: A Multi-Agent Systems Approach to Autonomic Computing. In: AAMAS 2004. ACM, New York (2004)

    Google Scholar 

  25. Kreibich, C., Crowcroft, J.: Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. ACM SIGCOMM (January 2004)

    Google Scholar 

  26. Chakrabarti, A.: Grid Computing Security, ch. 6, p. 105. Springer, Heidelberg (2007)

    Book  MATH  Google Scholar 

  27. Snort, https://edge.arubanetworks.com/article/leveraging-centralized-encryption-snort-part-1

  28. Stephen, M., Sukumaran Nair, V.S., Abraham, J.: Distributed Computing Grids- Safety and Security. In: Security in Distributed, Grid, Mobile, and Pervasive Computing, ch. 14

    Google Scholar 

  29. Chakrabarti, A.: Grid Computing Security, ch. 8, p. 159. Springer, Heidelberg (2007)

    Book  MATH  Google Scholar 

  30. Kenny, S., Coghlan, B.: Towards a Grid-Wide Intrusion Detection System. In: Advances in Grid Computing, pp. 275–284. Springer, Heidelberg (2005)

    Google Scholar 

  31. Schulter, A., Navarro, F., Koch, F., Westphall, C.: Towards Gridbased Intrusion Detection. In: 10th IEEE/IFIP, Network Operations and Management Symposium, NOMS 2006, pp. 1–4 (2006)

    Google Scholar 

  32. Witold Jarmo lkowicz, M.: A Grid-aware Intrusion Detection System, Technical University of Denmark, IMM-THESIS-2007-109

    Google Scholar 

  33. Leu, F.-Y., Li, M.-C., Lin, J.-C.: Intrusion Detection based on Grid. In: ICCGI 2006 (2006)

    Google Scholar 

  34. Srinivas, M., Patnaik, L.M.: Genetic algorithms: A survey. IEEE Computer 27(6), 17–26 (1994)

    Article  Google Scholar 

  35. Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group (2004)

    Google Scholar 

  36. Brennan, M.P.: Using Snort For a Distributed Intrusion Detection System. SANS Institute (2002)

    Google Scholar 

  37. Sallay, H., AlShalfan, K.A., Fredj, O.B.: A scalable distributed IDS Architecture for High speed Networks. IJCSNS 9(8) (August 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chopra, I., Singh, M. (2011). SASM- An Approach towards Self-protection in Grid Computing. In: Dua, S., Sahni, S., Goyal, D.P. (eds) Information Intelligence, Systems, Technology and Management. ICISTM 2011. Communications in Computer and Information Science, vol 141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19423-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19423-8_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19422-1

  • Online ISBN: 978-3-642-19423-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics