Self-Protection in a Clustered Distributed System

Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is bas...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on parallel and distributed systems 2012-02, Vol.23 (2), p.330-336
Hauptverfasser: De Palma, N., Hagimont, D., Boyer, F., Broto, L.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 336
container_issue 2
container_start_page 330
container_title IEEE transactions on parallel and distributed systems
container_volume 23
creator De Palma, N.
Hagimont, D.
Boyer, F.
Broto, L.
description Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.
doi_str_mv 10.1109/TPDS.2011.161
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_5871599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5871599</ieee_id><sourcerecordid>1010883806</sourcerecordid><originalsourceid>FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</originalsourceid><addsrcrecordid>eNpd0EFLwzAUB_AiCs7p0ZOX4kkPne8lTZscx6ZOGDjYPIc0TTGja2fSCvv2plQ8mEsejx8vL_8oukWYIYJ42m2W2xkBxBlmeBZNkDGeEOT0PNSQskQQFJfRlfd7AEwZpJMIt6auko1rO6M72zaxbWIVL-red8aZMl5a3zlb9F2ot6fQPFxHF5Wqvbn5vafRx8vzbrFK1u-vb4v5OtGUYZeI4QleaqULQ8twCAda0CLTJi-hIooywjDNMiyhqArBNctUwdMMgRtSpnQaPY5zP1Utj84elDvJVlm5mq_l0AMQKdKcfmOwD6M9uvarN76TB-u1qWvVmLb3EiFM5ZRDFuj9P7pve9eEn0iBJBeUgAgoGZF2rffOVH8LIMghazlkLYesZcg6-LvRW2PMn2U8RyYE_QFs3XeX</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>912793209</pqid></control><display><type>article</type><title>Self-Protection in a Clustered Distributed System</title><source>IEEE Electronic Library (IEL)</source><creator>De Palma, N. ; Hagimont, D. ; Boyer, F. ; Broto, L.</creator><creatorcontrib>De Palma, N. ; Hagimont, D. ; Boyer, F. ; Broto, L.</creatorcontrib><description>Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2011.161</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Channels ; clustered systems ; Clustering ; Clusters ; Communication channels ; Computation and Language ; Computer architecture ; Computer networks ; Computer Science ; Design engineering ; Illegal ; Intrusion ; Intrusion detection ; Law ; Middleware ; Prototypes ; self-protection ; Servers ; Software</subject><ispartof>IEEE transactions on parallel and distributed systems, 2012-02, Vol.23 (2), p.330-336</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2012</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</citedby><cites>FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</cites><orcidid>0000-0002-4603-4041 ; 0000-0002-0978-2155 ; 0000-0003-4638-7266</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5871599$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5871599$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://inria.hal.science/hal-00941373$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>De Palma, N.</creatorcontrib><creatorcontrib>Hagimont, D.</creatorcontrib><creatorcontrib>Boyer, F.</creatorcontrib><creatorcontrib>Broto, L.</creatorcontrib><title>Self-Protection in a Clustered Distributed System</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.</description><subject>Channels</subject><subject>clustered systems</subject><subject>Clustering</subject><subject>Clusters</subject><subject>Communication channels</subject><subject>Computation and Language</subject><subject>Computer architecture</subject><subject>Computer networks</subject><subject>Computer Science</subject><subject>Design engineering</subject><subject>Illegal</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>Law</subject><subject>Middleware</subject><subject>Prototypes</subject><subject>self-protection</subject><subject>Servers</subject><subject>Software</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0EFLwzAUB_AiCs7p0ZOX4kkPne8lTZscx6ZOGDjYPIc0TTGja2fSCvv2plQ8mEsejx8vL_8oukWYIYJ42m2W2xkBxBlmeBZNkDGeEOT0PNSQskQQFJfRlfd7AEwZpJMIt6auko1rO6M72zaxbWIVL-red8aZMl5a3zlb9F2ot6fQPFxHF5Wqvbn5vafRx8vzbrFK1u-vb4v5OtGUYZeI4QleaqULQ8twCAda0CLTJi-hIooywjDNMiyhqArBNctUwdMMgRtSpnQaPY5zP1Utj84elDvJVlm5mq_l0AMQKdKcfmOwD6M9uvarN76TB-u1qWvVmLb3EiFM5ZRDFuj9P7pve9eEn0iBJBeUgAgoGZF2rffOVH8LIMghazlkLYesZcg6-LvRW2PMn2U8RyYE_QFs3XeX</recordid><startdate>20120201</startdate><enddate>20120201</enddate><creator>De Palma, N.</creator><creator>Hagimont, D.</creator><creator>Boyer, F.</creator><creator>Broto, L.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-4603-4041</orcidid><orcidid>https://orcid.org/0000-0002-0978-2155</orcidid><orcidid>https://orcid.org/0000-0003-4638-7266</orcidid></search><sort><creationdate>20120201</creationdate><title>Self-Protection in a Clustered Distributed System</title><author>De Palma, N. ; Hagimont, D. ; Boyer, F. ; Broto, L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Channels</topic><topic>clustered systems</topic><topic>Clustering</topic><topic>Clusters</topic><topic>Communication channels</topic><topic>Computation and Language</topic><topic>Computer architecture</topic><topic>Computer networks</topic><topic>Computer Science</topic><topic>Design engineering</topic><topic>Illegal</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>Law</topic><topic>Middleware</topic><topic>Prototypes</topic><topic>self-protection</topic><topic>Servers</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>De Palma, N.</creatorcontrib><creatorcontrib>Hagimont, D.</creatorcontrib><creatorcontrib>Boyer, F.</creatorcontrib><creatorcontrib>Broto, L.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>De Palma, N.</au><au>Hagimont, D.</au><au>Boyer, F.</au><au>Broto, L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Self-Protection in a Clustered Distributed System</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2012-02-01</date><risdate>2012</risdate><volume>23</volume><issue>2</issue><spage>330</spage><epage>336</epage><pages>330-336</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2011.161</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0002-4603-4041</orcidid><orcidid>https://orcid.org/0000-0002-0978-2155</orcidid><orcidid>https://orcid.org/0000-0003-4638-7266</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1045-9219
ispartof IEEE transactions on parallel and distributed systems, 2012-02, Vol.23 (2), p.330-336
issn 1045-9219
1558-2183
language eng
recordid cdi_ieee_primary_5871599
source IEEE Electronic Library (IEL)
subjects Channels
clustered systems
Clustering
Clusters
Communication channels
Computation and Language
Computer architecture
Computer networks
Computer Science
Design engineering
Illegal
Intrusion
Intrusion detection
Law
Middleware
Prototypes
self-protection
Servers
Software
title Self-Protection in a Clustered Distributed System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T12%3A45%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Self-Protection%20in%20a%20Clustered%20Distributed%20System&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=De%20Palma,%20N.&rft.date=2012-02-01&rft.volume=23&rft.issue=2&rft.spage=330&rft.epage=336&rft.pages=330-336&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2011.161&rft_dat=%3Cproquest_RIE%3E1010883806%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912793209&rft_id=info:pmid/&rft_ieee_id=5871599&rfr_iscdi=true