An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
A signal analysis of network traffic anomalies
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Experience in measuring backbone traffic variability: models, metrics, measurements and meaning
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Software vulnerability analysis
Software vulnerability analysis
A taxonomy of computer attacks with applications to wireless networks
A taxonomy of computer attacks with applications to wireless networks
Taming IP packet flooding attacks
ACM SIGCOMM Computer Communication Review
An Artificial Intelligence Perspective on Autonomic Computing Policies
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Diagnosing network-wide traffic anomalies
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Self-Deployment and Self-Configuration of Pervasive Network Services
ICPS '04 Proceedings of the The IEEE/ACS International Conference on Pervasive Services
Aberrant Behavior Detection in Time Series for Network Monitoring
LISA '00 Proceedings of the 14th USENIX conference on System administration
Failure Diagnosis Using Decision Trees
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Utility Functions in Autonomic Systems
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Autonomic Pervasive Computing Based on Planning
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Bringing Planning to Autonomic Applications with ABLE
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Learning Automation Policies for Pervasive Computing Environments
ICAC '05 Proceedings of the Second International Conference on Automatic Computing
Resource Allocation for Autonomic Data Centers using Analytic Performance Models
ICAC '05 Proceedings of the Second International Conference on Automatic Computing
Management of Conflicting Obligations in Self-Protecting Policy-Based Systems
ICAC '05 Proceedings of the Second International Conference on Automatic Computing
Utility-Function-Driven Resource Allocation in Autonomic Systems
ICAC '05 Proceedings of the Second International Conference on Automatic Computing
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
ICAC '05 Proceedings of the Second International Conference on Automatic Computing
A New Dependency and Correlation Analysis for Features
IEEE Transactions on Knowledge and Data Engineering
A DoS-limiting network architecture
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
The Autonomic Computing Paradigm
Cluster Computing
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Centertrack: an IP overlay network for tracking DoS floods
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
An Innovative Self-Configuration Approach for Networked Systems and Applications
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
Autonomic runtime manager for adaptive distributed applications
HPDC '05 Proceedings of the High Performance Distributed Computing, 2005. HPDC-14. Proceedings. 14th IEEE International Symposium
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Journal of Network and Computer Applications
Hi-index | 0.00 |
In the near future, the U.S. DoD will activate a newly created Global Information Grid (GIG) providing an agile, robust, interoperable and collaborative communication network. This GIG is viewed as the single most important contributor to combat power and protection [1]. The GIG can be characterized as a globally interconnected, end-to-end set of disparate information and processing capabilities available on-demand to warfighters, policymakers and support personnel. Management of the GIG resources and operation will be, of necessity, intrinsic to the architecture and transparent to the user. The development an architecture that is secure against malicious exploitation, data or service denial and data corruption is a principal focus. Introduction of mobile, adhoc network elements having intermittent network connectivity and limited life exacerbates this problem. In this paper we explore the GIG and present an innovative application of Autonomic Agent technology currently in development that has the potential to automate many of the obligatory network management tasks. Additionally, we introduce a GIG Simulation Testbed that, utilizing Discrete Event System Specification (DEVS), is proving useful in simulating GIG operation at the node level for the analysis of agent-based detection and neutralization of network cyber attacks by malicious parties and programs.