Abstract
The complexity of today’s distributed computing environments is such that the presence of bugs and security holes is statistically unavoidable. A very promising approach to this issue is to implement a self-protected system, similarly to a natural immune system which has the ability to detect the intrusion of foreign elements and react while it is still in progress.
This paper describes an approach relying on component-based software engineering to ease the protection of distributed systems. The knowledge of the application architecture is used to detect foreign activities and to trigger counter measures. We focus on a mean to recognize known and unknown attacks independently from legacy software and avoiding false positives. Hence, the scope of the detected attacks is, for the moment, limited to the detection of illegal communications. We describe how this approach can be applied to provide self-protection for clustered J2ee applications with a very low overhead.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
An architectural blueprint for autonomic computing. IBM and Autonomic Computing (April 2003), http://www-306.ibm.com/autonomic/pdfs/ACwpFinal.pdf
Amza, C., Cecchet, E., Chanda, A., Cox, A.L., Elnikety, S., Gil, R., Marguerite, J., Rajamani, K., Zwaenepoel, W.: Specification and Implementation of Dynamic Web Site Benchmarks. In: 5th Annual IEEE Workshop on Workload Characterization (2002)
Bruneton, E., Coupaye, T., Stefani, J.B.: Recursive and dynamic software composition with sharing. In: Proceedings of the 7th ECOOP International Workshop on Component-Oriented Programming (WCOP 2002) (June 2002)
Cappello, F., Desprez, F., Dayde, M., Jeannot, E., Jegou, Y., Lanteri, S., Melab, N., Namyst, R., Primet, P., Richard, O., Caron, E., Leduc, J., Mornet, G.: Grid’5000: A large scale, reconfigurable, controlable and monitorable grid platform. In: Grid 2005 6th IEEE/ACM International Workshop on Grid Computing (2005)
Costa, M., Crowsoft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: end-to-end containment of Internet worms. In: SOSP 2005: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, pp. 133–147. ACM Press, New York (2005)
Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(9), 805–822 (1999)
Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Systems Journal 40(1) (2003)
Goel, A., Po, K., Farhadi, K., Li, Z., de Lara, E.: The Taser intrusion recovery system. In: SOSP 2005: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, pp. 163–176. ACM Press, New York (2005)
Huang, Y., Sood, A.: Self-cleansing systems for intrusion containment. In: Workshop on Self-Healing, Adaptive and self-MANaged Systems (SHAMAN) (2002)
Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. In: Suri, N., Walter, C.J., Hugue, M.M. (eds.) Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, Los Alamitos (1995)
Sun Microsystems. Java 2 platform enterprise edition (J2EE), http://java.sun.com/j2ee/
Netfilter. Firewalling, NAT, and packet mangling under linux, http://www.nefilter.org
Sundaram, A.: An introduction to intrusion detection. ACM Crossroads Student Magazine 2(4), 3–7 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Claudel, B., De Palma, N., Lachaize, R., Hagimont, D. (2006). Self-protection for Distributed Component-Based Applications. In: Datta, A.K., Gradinariu, M. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2006. Lecture Notes in Computer Science, vol 4280. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-49823-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-49823-0_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49018-0
Online ISBN: 978-3-540-49823-0
eBook Packages: Computer ScienceComputer Science (R0)