Abstract — The complexity of today's distributed computing environment is such that the presence of bugs and security holes is statistically unavoidable. A very promising approach to the present issue is to implement a self-protected system. Self-protection refers to the ability for a system to detect illegal behaviors. This article demonstrates the implementation of self-protection manager which targets clustered distributed systems. Our approach is based on the global database of the clustered distributed applications. This knowledge permits to detect known and unknown attacks if an prohibited (illegal) access is performed. The prototype is designed using access detection
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
International audienceSelf-protection refers to the ability for a system to detect illegal behaviors...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
International audienceThe complexity of today's distributed computing environments is such that the ...
The complexity of today's distributed computing environment is such that the presence of bugs a...
The complexity of today’s distributed computing environment is such that the presence of bugs and se...
The community and tools for illegal access are getting well organized and sophisticated. However, wi...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
number of domains: academic, research, and industrial environments. At the same time, these clusters...
Network security tests should be periodically conducted to detect vulnerabilities before they are ex...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
In today’s world, the use of computers and net-works is growing and the vision of a single infrastru...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
International audienceSelf-protection refers to the ability for a system to detect illegal behaviors...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
International audienceThe complexity of today's distributed computing environments is such that the ...
The complexity of today's distributed computing environment is such that the presence of bugs a...
The complexity of today’s distributed computing environment is such that the presence of bugs and se...
The community and tools for illegal access are getting well organized and sophisticated. However, wi...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
number of domains: academic, research, and industrial environments. At the same time, these clusters...
Network security tests should be periodically conducted to detect vulnerabilities before they are ex...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
In today’s world, the use of computers and net-works is growing and the vision of a single infrastru...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...