Self-protection against attacks in an autonomic computing environment

Guangzhi Qu, Osamah A. Rawashdeh, Salim Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.

Original languageEnglish (US)
Title of host publication22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
Pages13-18
Number of pages6
StatePublished - Dec 1 2009
Event22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009 - San Francisco, CA, United States
Duration: Nov 4 2009Nov 6 2009

Publication series

Name22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009

Other

Other22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
CountryUnited States
CitySan Francisco, CA
Period11/4/0911/6/09

ASJC Scopus subject areas

  • Computer Science Applications
  • Industrial and Manufacturing Engineering

Fingerprint Dive into the research topics of 'Self-protection against attacks in an autonomic computing environment'. Together they form a unique fingerprint.

  • Cite this

    Qu, G., Rawashdeh, O. A., & Hariri, S. (2009). Self-protection against attacks in an autonomic computing environment. In 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009 (pp. 13-18). (22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009).