Self-configuration of network security

Huoping Chen, Youssif B. Al-Nashif, Guangzhi Qu, Salim Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

The proliferation of networked systems and services along with their exponential growth in complexity and size has increased the control and management complexity of such systems and services by several orders of magnitude. As a result, management tools have failed to cope with and handle the complexity, dynamism, and coordination among network attacks. In this paper, we present a self-configuration approach to control and manage the security mechanisms of large scale networks. Self-configuration enables the system to automatically configure security system and change the configuration of its resources and their operational policies at runtime in order to manage the system security. Our Self-configuration approach is implemented using two software modules: Component Management Interface (CMI) to specify the configuration and operational policies associated with each component that can be a hardware resource or a software component; and Component Runtime Manger (CRM) that manages the component operations using the policies defined in CMI. We have used the Self-configuration framework to experiment with and evaluate different mechanisms and strategies to detect and protect against a wide range of network attacks.

Original languageEnglish (US)
Title of host publication11th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2007 Proceedings
Pages97-108
Number of pages12
DOIs
StatePublished - 2007
Event11th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2007 - Annapolis, MD, United States
Duration: Oct 15 2007Oct 19 2007

Publication series

NameProceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC
ISSN (Print)1541-7719

Other

Other11th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2007
CountryUnited States
CityAnnapolis, MD
Period10/15/0710/19/07

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Self-configuration of network security'. Together they form a unique fingerprint.

Cite this