A training algorithm for optimal margin classifiers
COLT '92 Proceedings of the fifth annual workshop on Computational learning theory
Intrusion detection
Security Implications of Typical Grid Computing Usage Scenarios
Cluster Computing
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
The dawning of the autonomic computing era
IBM Systems Journal
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Autonomic Computing
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
Building intrusion pattern miner for Snort network intrusion detection system
Journal of Systems and Software
Software as a Service: Configuration and Customization Perspectives
SERVICES-2 '08 Proceedings of the 2008 IEEE Congress on Services Part II
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
Design of a Snort-Based Hybrid Intrusion Detection System
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living
Tolerating hardware device failures in software
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Communications of the ACM
Proceedings of the 7th international conference on Autonomic computing
A survey on self-healing systems: approaches and systems
Computing - Cloud Computing
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
Thwarting DDoS attacks in grid using information divergence
Future Generation Computer Systems
Hi-index | 0.00 |
Increasing complexity of large scale distributed systems is creating problem in managing faults and security attacks because of the manual style adopted for management. This paper proposes a novel approach called SHAPE to self-heal and self-protect the system from various kinds of faults and security attacks. It deals with hardware, software, and network faults and provides security against DDoS, R2L, U2L, and probing attacks. SHAPE is implemented and evaluated against various standard metrics. The results are provided to support the approach.