TY - GEN
T1 - Self-configuration of network security
AU - Chen, Huoping
AU - Al-Nashif, Youssif B.
AU - Qu, Guangzhi
AU - Hariri, Salim
PY - 2007
Y1 - 2007
N2 - The proliferation of networked systems and services along with their exponential growth in complexity and size has increased the control and management complexity of such systems and services by several orders of magnitude. As a result, management tools have failed to cope with and handle the complexity, dynamism, and coordination among network attacks. In this paper, we present a self-configuration approach to control and manage the security mechanisms of large scale networks. Self-configuration enables the system to automatically configure security system and change the configuration of its resources and their operational policies at runtime in order to manage the system security. Our Self-configuration approach is implemented using two software modules: Component Management Interface (CMI) to specify the configuration and operational policies associated with each component that can be a hardware resource or a software component; and Component Runtime Manger (CRM) that manages the component operations using the policies defined in CMI. We have used the Self-configuration framework to experiment with and evaluate different mechanisms and strategies to detect and protect against a wide range of network attacks.
AB - The proliferation of networked systems and services along with their exponential growth in complexity and size has increased the control and management complexity of such systems and services by several orders of magnitude. As a result, management tools have failed to cope with and handle the complexity, dynamism, and coordination among network attacks. In this paper, we present a self-configuration approach to control and manage the security mechanisms of large scale networks. Self-configuration enables the system to automatically configure security system and change the configuration of its resources and their operational policies at runtime in order to manage the system security. Our Self-configuration approach is implemented using two software modules: Component Management Interface (CMI) to specify the configuration and operational policies associated with each component that can be a hardware resource or a software component; and Component Runtime Manger (CRM) that manages the component operations using the policies defined in CMI. We have used the Self-configuration framework to experiment with and evaluate different mechanisms and strategies to detect and protect against a wide range of network attacks.
UR - http://www.scopus.com/inward/record.url?scp=47949089659&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=47949089659&partnerID=8YFLogxK
U2 - 10.1109/EDOC.2007.4383985
DO - 10.1109/EDOC.2007.4383985
M3 - Conference contribution
AN - SCOPUS:47949089659
SN - 0769528910
SN - 9780769528915
T3 - Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC
SP - 97
EP - 108
BT - 11th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2007 Proceedings
T2 - 11th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2007
Y2 - 15 October 2007 through 19 October 2007
ER -