self protecteion in clustered distributed system new
TRANSCRIPT
SELF-PROTECTION IN A CLUSTEREDDISTRIBUTED SYSTEM
Under Esteemed Guidance Of
J.Nagaraju sir
BY
N.Sahithi
(12C11D5816)
ABSTRACT
Self-protection refers to the ability for a system to detect
illegal behaviors and to fight-back intrusions with counter-
measures. Self protection in a clustered distributed system is
based on the structural knowledge of the cluster and of the
distributed applications. This knowledge allows to detect
known and unknown attacks if an illegal communication
channel is used.
INTRODUCTION
The complexity of today’s distributed computing
environments is such that the presence of bugs and
security holes is statistically unavoidable.
A very promising approach to this issue is to
implement a self protected system which refers to the
capability of a system to protect itself against
intrusions.
Self -protection in a clustered distributed system presents a
self- protected system context of cluster –based
applications.
We consider that hardware environment is composed of a
cluster of machines interconnected through a local area
network.
The software environment is composed of a set of
application components deployed on the cluster.
LITERATURE SURVEY
A number of surveys focused on classifying security
patterns. Using metrics such as purpose and abstraction
level
Security patterns which are applicable to classifying self-
protection approaches based on:
Confidentiality, Integrity, and Availability.
EXISTING SYSTEM
The main tools and techniques currently used are
Intrusion detection
Two main approaches have been explored to ensure
intrusion detection :
I)misuse intrusion detection and
II)Anomaly intrusion detection.
These approaches are used in firewalls and intrusion
detection system.
Backtracking tools:
Backtracking tools record data about system activity so
that once intrusion attempt has been detected, it is
possible to detect sequence of events that led to
intrusion and potential extent of damage.
DISADVANTAGES OF EXISTING SYSTEM
Misuse intrusion detection cannot detect unknown
attacks, Anomaly intrusion detection can detect
unknown attacks but price a lot.
Backtracking tools can help to automate parts but
human expertise is required for accurate
understanding of attack.
PROPOSED SYSTEM
Any attempt to use an undeclared communication
channel is trapped and a recovery procedure is
executed automatically.
Legal communication channels are automatically
calculated from hardware and software architectures of
the system and are used to generate protection rules
that forbid the use of unspecified channels.
PROPOSED SYSTEM ADVANTAGES Automates the configuration of security components
when the system evolves.
Detects and blocks any deviation from communication
channels.
Isolate the machine belonging to cluster that breaks
communication channels.
FUTURE ENHANCEMENTS
In future self-protection in a clustered distributed
system has to be focused on spotting intruders
targeting different protocols.
CONCLUSION
The detection of an illegal behavior triggers a counter
-measure to isolate the compromised resources and
prevent further damages. Self -protection in a clustered
distributed system targets controlled environments and
silent attacks rather than open grid and denial-of-service
attacks.
QUERIES????
THANK YOU