[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1317532.1318041guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Self-Configuration of Network Security

Published: 15 October 2007 Publication History

Abstract

The proliferation of networked systems and services along with their exponential growth in complexity and size has increased the control and management complexity of such systems and services by several orders of magnitude. As a result, management tools have failed to cope with and handle the complexity, dynamism, and coordination among network attacks. In this paper, we present a self-configuration approach to control and manage the security mechanisms of large scale networks. Self-configuration enables the system to automatically configure security system and change the configuration of its resources and their operational policies at runtime in order to manage the system security. Our Self-configuration approach is implemented using two software modules: Component Management Interface (CMI) to specify the configuration and operational policies associated with each component that can be a hardware resource or a software component; and Component Runtime Manger (CRM) that manages the component operations using the policies defined in CMI. We have used the Self-configuration framework to experiment with and evaluate different mechanisms and strategies to detect and protect against a wide range of network attacks.

Cited By

View all
  • (2017)Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)Companion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148137(107-112)Online publication date: 5-Dec-2017
  • (2013)Resilient cloud data storage servicesProceedings of the 2013 ACM Cloud and Autonomic Computing Conference10.1145/2494621.2494634(1-9)Online publication date: 9-Aug-2013
  • (2010)Security topology control method for wireless sensor networks with node-failure tolerance based on self-regenerationEURASIP Journal on Wireless Communications and Networking10.1155/2010/2014162010(1-13)Online publication date: 1-Apr-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
EDOC '07: Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference
October 2007
12 pages
ISBN:0769528910

Publisher

IEEE Computer Society

United States

Publication History

Published: 15 October 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)Companion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148137(107-112)Online publication date: 5-Dec-2017
  • (2013)Resilient cloud data storage servicesProceedings of the 2013 ACM Cloud and Autonomic Computing Conference10.1145/2494621.2494634(1-9)Online publication date: 9-Aug-2013
  • (2010)Security topology control method for wireless sensor networks with node-failure tolerance based on self-regenerationEURASIP Journal on Wireless Communications and Networking10.1155/2010/2014162010(1-13)Online publication date: 1-Apr-2010
  • (2010)Plug & execute framework for network traffic generationProceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research10.1145/1852666.1852720(1-4)Online publication date: 21-Apr-2010

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media