Self-protection for distributed component-based applications

15Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The complexity of today's distributed computing environments is such that the presence of bugs and security holes is statistically unavoidable. A very promising approach to this issue is to implement a self-protected system, similarly to a natural immune system which has the ability to detect the intrusion of foreign elements and react while it is still in progress. This paper describes an approach relying on component-based software engineering to ease the protection of distributed systems. The knowledge of the application architecture is used to detect foreign activities and to trigger counter measures. We focus on a mean to recognize known and unknown attacks independently from legacy software and avoiding false positives. Hence, the scope of the detected attacks is, for the moment, limited to the detection of illegal communications. We describe how this approach can be applied to provide self-protection for clustered J2EE applications with a very low overhead. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Claudel, B., De Palma, N., Lachaize, R., & Hagimont, D. (2006). Self-protection for distributed component-based applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4280 LNCS, pp. 184–198). Springer Verlag. https://doi.org/10.1007/978-3-540-49823-0_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free