By exploiting existing vulnerabilities, malicious parties can take advantage of resources made available by grid systems to attack mission-critical websites or the grid itself. In this paper, we present two approaches for protecting against attacks targeting sites outside or inside the grid. Our approach is based on special-purpose software agents that collect provenance and resource usage data in order to perform detection and protection. We show the effectiveness and the efficiency of our approach by conducting various experiments on an emulated grid test-bed
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
Accountability is an important security property of distributed systems. It assures that every actio...
Recently a number of highly publicised incidents of Distributed Denial of Service (DDoS) attacks hav...
Grid computing is rapidly emerging as a dominant field of wide area distributed computing. Grid comp...
The security of Grid-systems assumes the consistency, accessibility and confidentiality of system an...
The demand for computing power and storage is increasing continuously and there are applications lik...
Abstract: The USC GridSec project develops distributed security infrastructure and self-defense capa...
The USC GridSec project develops distributed security infrastructure and self-defense capabilities t...
The goal of the grid computing paradigm is to make computer power as easy to access as an electrical...
The smart grid merges cyber-physical systems (CPS) infrastructure with information and communication...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
Accountability is an important security property of distributed systems. It assures that every actio...
Recently a number of highly publicised incidents of Distributed Denial of Service (DDoS) attacks hav...
Grid computing is rapidly emerging as a dominant field of wide area distributed computing. Grid comp...
The security of Grid-systems assumes the consistency, accessibility and confidentiality of system an...
The demand for computing power and storage is increasing continuously and there are applications lik...
Abstract: The USC GridSec project develops distributed security infrastructure and self-defense capa...
The USC GridSec project develops distributed security infrastructure and self-defense capabilities t...
The goal of the grid computing paradigm is to make computer power as easy to access as an electrical...
The smart grid merges cyber-physical systems (CPS) infrastructure with information and communication...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse ...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...