Self-protection against attacks in an autonomic computing environment

Guangzhi Qu, Osamah A. Rawashdeh, Salim A Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.

Original languageEnglish (US)
Title of host publication22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
Pages13-18
Number of pages6
StatePublished - 2009
Event22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009 - San Francisco, CA, United States
Duration: Nov 4 2009Nov 6 2009

Other

Other22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
CountryUnited States
CitySan Francisco, CA
Period11/4/0911/6/09

Fingerprint

Fault tolerance
Routers
Computer hardware
Servers
Industry

ASJC Scopus subject areas

  • Computer Science Applications
  • Industrial and Manufacturing Engineering

Cite this

Qu, G., Rawashdeh, O. A., & Hariri, S. A. (2009). Self-protection against attacks in an autonomic computing environment. In 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009 (pp. 13-18)

Self-protection against attacks in an autonomic computing environment. / Qu, Guangzhi; Rawashdeh, Osamah A.; Hariri, Salim A.

22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009. 2009. p. 13-18.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qu, G, Rawashdeh, OA & Hariri, SA 2009, Self-protection against attacks in an autonomic computing environment. in 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009. pp. 13-18, 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009, San Francisco, CA, United States, 11/4/09.
Qu G, Rawashdeh OA, Hariri SA. Self-protection against attacks in an autonomic computing environment. In 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009. 2009. p. 13-18
Qu, Guangzhi ; Rawashdeh, Osamah A. ; Hariri, Salim A. / Self-protection against attacks in an autonomic computing environment. 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009. 2009. pp. 13-18
@inproceedings{1330b9045714478085aa0fddbd294561,
title = "Self-protection against attacks in an autonomic computing environment",
abstract = "Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.",
author = "Guangzhi Qu and Rawashdeh, {Osamah A.} and Hariri, {Salim A}",
year = "2009",
language = "English (US)",
isbn = "9781615676668",
pages = "13--18",
booktitle = "22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009",

}

TY - GEN

T1 - Self-protection against attacks in an autonomic computing environment

AU - Qu, Guangzhi

AU - Rawashdeh, Osamah A.

AU - Hariri, Salim A

PY - 2009

Y1 - 2009

N2 - Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.

AB - Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.

UR - http://www.scopus.com/inward/record.url?scp=84883665348&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883665348&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84883665348

SN - 9781615676668

SP - 13

EP - 18

BT - 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009

ER -