TY - GEN
T1 - Self-protection against attacks in an autonomic computing environment
AU - Qu, Guangzhi
AU - Rawashdeh, Osamah A.
AU - Hariri, Salim
PY - 2009
Y1 - 2009
N2 - Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.
AB - Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very specialized computing systems and applications. Autonomic systems, as an alternative approach, can control and manage themselves automatically with minimal intervention by users or system administrators. This paper presents an autonomic framework in developing and implementing autonomic computing services and applications. Firstly, it shows how to apply this framework to autonomi-cally manage the security of networks. Then an approach is presented to develop autonomic components from existing legacy components such as software modules/applications or hardware resources (router, processor, server, etc.). Experimental evaluation of the prototype shows that the system can be programmed dynamically to enable the components to operate autonomously.
UR - http://www.scopus.com/inward/record.url?scp=84883665348&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883665348&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84883665348
SN - 9781615676668
T3 - 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
SP - 13
EP - 18
BT - 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
T2 - 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009
Y2 - 4 November 2009 through 6 November 2009
ER -