A model-based approach to self-protection in computing system

作者: Qian Chen , Sherif Abdelwahed , Abdelkarim Erradi , None

DOI: 10.1145/2494621.2494639

关键词:

摘要: This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify attacks along with planning sequence of actions effectively protect the networked computing system. In proposed approach, sensors collect system network parameters send data forecasters intrusion detection systems (IDSes). A multi-objective controller selects optimal protection method recover based on signature attacks. The is demonstrated several case studies including Denial Service (DoS) attacks, SQL Injection memory exhaustion Experiments show that ASM can successfully defend victim host from known unknown while maintaining QoS low overheads.

参考文章(20)
Nagesh D Kumar, Srinivasa K Raju, Multicriterion Analysis in Engineering and Management ,(2010)
Jun-Jie Lv, Yuan-Zhuo Wang, A Ranking Method for Information Security Risk Management Based on AHP and PROMETHEE mobile adhoc and sensor systems. pp. 1- 4 ,(2010) , 10.1109/ICMSS.2010.5575678
J.O. Kephart, D.M. Chess, The vision of autonomic computing IEEE Computer. ,vol. 36, pp. 41- 50 ,(2003) , 10.1109/MC.2003.1160055
Markus C. Huebscher, Julie A. McCann, A survey of autonomic computing—degrees, models, and applications ACM Computing Surveys. ,vol. 40, pp. 1- 28 ,(2008) , 10.1145/1380584.1380585
Elvis Pontes, Wagner L. Zucchi, Fibonacci sequence and EWMA for intrusion forecasting system international conference on digital information management. pp. 404- 411 ,(2010) , 10.1109/ICDIM.2010.5664238
Qian Chen, Sherif Abdelwahed, Weston Monceaux, None, Towards automatic security management: a model-based approach cyber security and information intelligence research workshop. pp. 56- ,(2013) , 10.1145/2459976.2460039
Majid Behzadian, R.B. Kazemzadeh, A. Albadvi, M. Aghdasi, PROMETHEE: A comprehensive literature review on methodologies and applications European Journal of Operational Research. ,vol. 200, pp. 198- 215 ,(2010) , 10.1016/J.EJOR.2009.01.021
Dennis Ippoliti, Xiaobo Zhou, A self-tuning self-optimizing approach for automated network anomaly detection systems Proceedings of the 9th international conference on Autonomic computing - ICAC '12. pp. 85- 90 ,(2012) , 10.1145/2371536.2371551
Kenichi Kourai, Takeshi Azumi, Shigeru Chiba, A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds autonomic and trusted computing. pp. 539- 546 ,(2012) , 10.1109/UIC-ATC.2012.139
Noel De Palma, Daniel Hagimont, Fabienne Boyer, Laurent Broto, Self-Protection in a Clustered Distributed System IEEE Transactions on Parallel and Distributed Systems. ,vol. 23, pp. 330- 336 ,(2012) , 10.1109/TPDS.2011.161