Under Esteemed Guidance Of
J.Nagaraju sir

BY
N.Sahithi
(12C11D5816)
Self-protection refers to the ability for a system to detect
illegal behaviors and to fight-back intrusions with counter-
...


The complexity of today’s distributed computing
environments is such that the presence of bugs and
security holes is st...


Self -protection in a clustered distributed system presents a
self- protected system context of cluster –based
applicat...


A number of surveys focused on classifying security
patterns. Using metrics such as purpose and abstraction
level



S...


The main tools and techniques currently used are

Intrusion detection


Two main approaches have been explored to ensu...
Backtracking tools:


Backtracking tools record data about system activity so
that once intrusion attempt has been detect...


Misuse intrusion detection cannot detect unknown
attacks, Anomaly intrusion detection can detect
unknown attacks but pr...


Any attempt to use an undeclared communication
channel is trapped and a recovery procedure is
executed automatically.

...


Automates the configuration of security components
when the system evolves.



Detects and blocks any deviation from c...
In future self-protection in a clustered distributed
system has to be focused on spotting intruders
targeting different pr...
The detection of an illegal behavior triggers a counter
-measure to isolate the compromised resources and
prevent further ...
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Upcoming SlideShare
Loading in …5
×

Self protecteion in clustered distributed system new

274 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
274
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Self protecteion in clustered distributed system new

  1. 1. Under Esteemed Guidance Of J.Nagaraju sir BY N.Sahithi (12C11D5816)
  2. 2. Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter- measures. Self protection in a clustered distributed system is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows to detect known and unknown attacks if an illegal communication channel is used.
  3. 3.  The complexity of today’s distributed computing environments is such that the presence of bugs and security holes is statistically unavoidable.  A very promising approach to this issue is to implement a self protected system which refers to the capability of a system to protect itself against intrusions.
  4. 4.  Self -protection in a clustered distributed system presents a self- protected system context of cluster –based applications.  We consider that hardware environment is composed of a cluster of machines interconnected through a local area network.  The software environment is composed of a set of application components deployed on the cluster.
  5. 5.  A number of surveys focused on classifying security patterns. Using metrics such as purpose and abstraction level  Security patterns which are applicable to classifying selfprotection approaches based on: Confidentiality, Integrity, and Availability.
  6. 6.  The main tools and techniques currently used are Intrusion detection  Two main approaches have been explored to ensure intrusion detection : I)misuse intrusion detection and II)Anomaly intrusion detection.  These approaches are used in firewalls and intrusion detection system.
  7. 7. Backtracking tools:  Backtracking tools record data about system activity so that once intrusion attempt has been detected, it is possible to detect sequence of events that led to intrusion and potential extent of damage.
  8. 8.  Misuse intrusion detection cannot detect unknown attacks, Anomaly intrusion detection can detect unknown attacks but price a lot.  Backtracking tools can help to automate parts but human expertise is required for accurate understanding of attack.
  9. 9.  Any attempt to use an undeclared communication channel is trapped and a recovery procedure is executed automatically.  Legal communication channels are automatically calculated from hardware and software architectures of the system and are used to generate protection rules that forbid the use of unspecified channels.
  10. 10.  Automates the configuration of security components when the system evolves.  Detects and blocks any deviation from communication channels.  Isolate the machine belonging to cluster that breaks communication channels.
  11. 11. In future self-protection in a clustered distributed system has to be focused on spotting intruders targeting different protocols.
  12. 12. The detection of an illegal behavior triggers a counter -measure to isolate the compromised resources and prevent further damages. Self -protection in a clustered distributed system targets controlled environments and silent attacks rather than open grid and denial-of-service attacks.

×