Self-Protection in a Clustered Distributed System
Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is bas...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on parallel and distributed systems 2012-02, Vol.23 (2), p.330-336 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 336 |
---|---|
container_issue | 2 |
container_start_page | 330 |
container_title | IEEE transactions on parallel and distributed systems |
container_volume | 23 |
creator | De Palma, N. Hagimont, D. Boyer, F. Broto, L. |
description | Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications. |
doi_str_mv | 10.1109/TPDS.2011.161 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_5871599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5871599</ieee_id><sourcerecordid>1010883806</sourcerecordid><originalsourceid>FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</originalsourceid><addsrcrecordid>eNpd0EFLwzAUB_AiCs7p0ZOX4kkPne8lTZscx6ZOGDjYPIc0TTGja2fSCvv2plQ8mEsejx8vL_8oukWYIYJ42m2W2xkBxBlmeBZNkDGeEOT0PNSQskQQFJfRlfd7AEwZpJMIt6auko1rO6M72zaxbWIVL-red8aZMl5a3zlb9F2ot6fQPFxHF5Wqvbn5vafRx8vzbrFK1u-vb4v5OtGUYZeI4QleaqULQ8twCAda0CLTJi-hIooywjDNMiyhqArBNctUwdMMgRtSpnQaPY5zP1Utj84elDvJVlm5mq_l0AMQKdKcfmOwD6M9uvarN76TB-u1qWvVmLb3EiFM5ZRDFuj9P7pve9eEn0iBJBeUgAgoGZF2rffOVH8LIMghazlkLYesZcg6-LvRW2PMn2U8RyYE_QFs3XeX</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>912793209</pqid></control><display><type>article</type><title>Self-Protection in a Clustered Distributed System</title><source>IEEE Electronic Library (IEL)</source><creator>De Palma, N. ; Hagimont, D. ; Boyer, F. ; Broto, L.</creator><creatorcontrib>De Palma, N. ; Hagimont, D. ; Boyer, F. ; Broto, L.</creatorcontrib><description>Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2011.161</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Channels ; clustered systems ; Clustering ; Clusters ; Communication channels ; Computation and Language ; Computer architecture ; Computer networks ; Computer Science ; Design engineering ; Illegal ; Intrusion ; Intrusion detection ; Law ; Middleware ; Prototypes ; self-protection ; Servers ; Software</subject><ispartof>IEEE transactions on parallel and distributed systems, 2012-02, Vol.23 (2), p.330-336</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2012</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</citedby><cites>FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</cites><orcidid>0000-0002-4603-4041 ; 0000-0002-0978-2155 ; 0000-0003-4638-7266</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5871599$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5871599$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://inria.hal.science/hal-00941373$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>De Palma, N.</creatorcontrib><creatorcontrib>Hagimont, D.</creatorcontrib><creatorcontrib>Boyer, F.</creatorcontrib><creatorcontrib>Broto, L.</creatorcontrib><title>Self-Protection in a Clustered Distributed System</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.</description><subject>Channels</subject><subject>clustered systems</subject><subject>Clustering</subject><subject>Clusters</subject><subject>Communication channels</subject><subject>Computation and Language</subject><subject>Computer architecture</subject><subject>Computer networks</subject><subject>Computer Science</subject><subject>Design engineering</subject><subject>Illegal</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>Law</subject><subject>Middleware</subject><subject>Prototypes</subject><subject>self-protection</subject><subject>Servers</subject><subject>Software</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0EFLwzAUB_AiCs7p0ZOX4kkPne8lTZscx6ZOGDjYPIc0TTGja2fSCvv2plQ8mEsejx8vL_8oukWYIYJ42m2W2xkBxBlmeBZNkDGeEOT0PNSQskQQFJfRlfd7AEwZpJMIt6auko1rO6M72zaxbWIVL-red8aZMl5a3zlb9F2ot6fQPFxHF5Wqvbn5vafRx8vzbrFK1u-vb4v5OtGUYZeI4QleaqULQ8twCAda0CLTJi-hIooywjDNMiyhqArBNctUwdMMgRtSpnQaPY5zP1Utj84elDvJVlm5mq_l0AMQKdKcfmOwD6M9uvarN76TB-u1qWvVmLb3EiFM5ZRDFuj9P7pve9eEn0iBJBeUgAgoGZF2rffOVH8LIMghazlkLYesZcg6-LvRW2PMn2U8RyYE_QFs3XeX</recordid><startdate>20120201</startdate><enddate>20120201</enddate><creator>De Palma, N.</creator><creator>Hagimont, D.</creator><creator>Boyer, F.</creator><creator>Broto, L.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-4603-4041</orcidid><orcidid>https://orcid.org/0000-0002-0978-2155</orcidid><orcidid>https://orcid.org/0000-0003-4638-7266</orcidid></search><sort><creationdate>20120201</creationdate><title>Self-Protection in a Clustered Distributed System</title><author>De Palma, N. ; Hagimont, D. ; Boyer, F. ; Broto, L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c351t-900148dcacbe3dddd2803b3b6ce7d0f2a352514661d0bfb98c56ab846108e2d43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Channels</topic><topic>clustered systems</topic><topic>Clustering</topic><topic>Clusters</topic><topic>Communication channels</topic><topic>Computation and Language</topic><topic>Computer architecture</topic><topic>Computer networks</topic><topic>Computer Science</topic><topic>Design engineering</topic><topic>Illegal</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>Law</topic><topic>Middleware</topic><topic>Prototypes</topic><topic>self-protection</topic><topic>Servers</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>De Palma, N.</creatorcontrib><creatorcontrib>Hagimont, D.</creatorcontrib><creatorcontrib>Boyer, F.</creatorcontrib><creatorcontrib>Broto, L.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>De Palma, N.</au><au>Hagimont, D.</au><au>Boyer, F.</au><au>Broto, L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Self-Protection in a Clustered Distributed System</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2012-02-01</date><risdate>2012</risdate><volume>23</volume><issue>2</issue><spage>330</spage><epage>336</epage><pages>330-336</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets clustered distributed applications. Our approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used. The current prototype is a self-protected JEE infrastructure (Java 2 Enterprise Edition) with firewall-based intrusion detection. Our prototype induces low-performance penalty for applications.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2011.161</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0002-4603-4041</orcidid><orcidid>https://orcid.org/0000-0002-0978-2155</orcidid><orcidid>https://orcid.org/0000-0003-4638-7266</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1045-9219 |
ispartof | IEEE transactions on parallel and distributed systems, 2012-02, Vol.23 (2), p.330-336 |
issn | 1045-9219 1558-2183 |
language | eng |
recordid | cdi_ieee_primary_5871599 |
source | IEEE Electronic Library (IEL) |
subjects | Channels clustered systems Clustering Clusters Communication channels Computation and Language Computer architecture Computer networks Computer Science Design engineering Illegal Intrusion Intrusion detection Law Middleware Prototypes self-protection Servers Software |
title | Self-Protection in a Clustered Distributed System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T12%3A45%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Self-Protection%20in%20a%20Clustered%20Distributed%20System&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=De%20Palma,%20N.&rft.date=2012-02-01&rft.volume=23&rft.issue=2&rft.spage=330&rft.epage=336&rft.pages=330-336&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2011.161&rft_dat=%3Cproquest_RIE%3E1010883806%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912793209&rft_id=info:pmid/&rft_ieee_id=5871599&rfr_iscdi=true |