Immune-Inspired Self-Protection Model for Securing Grid

作者: Inderpreet Chopra , , Ratinder Kaur

DOI: 10.5815/IJITCS.2016.03.09

关键词:

摘要: The application of human immunology in solving security problems Grid Computing seems to be a thought-provoking research area. involves large number dynamic heterogeneous resources. Manually managing the for such system is always fault prone. This paper presents simple immune based model self-protection (SIMS) grid environment from various attacks like DoS, DDoS, Probing, etc. Like body helps identify and respond harmful pathogens that it doesn't recognize as "self", same manner SIMS incorporates immunological concepts principles safeguarding breaches.

参考文章(27)
Anirban Chakrabarti, Grid computing security ,(2007)
Benoit Claudel, Noël De Palma, Renaud Lachaize, Daniel Hagimont, Self-protection for distributed component-based applications international conference on stabilization safety and security of distributed systems. pp. 184- 198 ,(2006) , 10.1007/978-3-540-49823-0_13
L. Ramakrishnan, Securing next-generation grids IT Professional. ,vol. 6, pp. 34- 39 ,(2004) , 10.1109/MITP.2004.1278860
J. Balthrop, S. Forrest, M.R. Glickman, Revisiting LISYS: parameters and normal behavior congress on evolutionary computation. ,vol. 2, pp. 1045- 1050 ,(2002) , 10.1109/CEC.2002.1004387
Stuart Kenny, Brian Coghlan, Towards a Grid-wide Intrusion Detection System Advances in Grid Computing - EGC 2005. pp. 275- 284 ,(2005) , 10.1007/11508380_29
J.O. Kephart, D.M. Chess, The vision of autonomic computing IEEE Computer. ,vol. 36, pp. 41- 50 ,(2003) , 10.1109/MC.2003.1160055
Andrew Chien, Brad Calder, Stephen Elbert, Karan Bhatia, Entropia: architecture and performance of an enterprise desktop grid system Journal of Parallel and Distributed Computing. ,vol. 63, pp. 597- 610 ,(2003) , 10.1016/S0743-7315(03)00006-6
I. Chopra, M. Singh, Agent based self-healing system for grid computing international conference & workshop on emerging trends in technology. pp. 31- 35 ,(2010) , 10.1145/1741906.1741912
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384