15
SELF-PROTECTION IN A CLUSTERED DISTRIBUTED SYSTEM Under Esteemed Guidance Of J.Nagaraju sir BY N.Sahithi (12C11D5816)

Self protecteion in clustered distributed system new

Embed Size (px)

Citation preview

Page 1: Self protecteion in clustered distributed system new

SELF-PROTECTION IN A CLUSTEREDDISTRIBUTED SYSTEM

Under Esteemed Guidance Of

J.Nagaraju sir

BY

N.Sahithi

(12C11D5816)

Page 2: Self protecteion in clustered distributed system new

ABSTRACT

Self-protection refers to the ability for a system to detect

illegal behaviors and to fight-back intrusions with counter-

measures. Self protection in a clustered distributed system is

based on the structural knowledge of the cluster and of the

distributed applications. This knowledge allows to detect

known and unknown attacks if an illegal communication

channel is used.

Page 3: Self protecteion in clustered distributed system new

INTRODUCTION

The complexity of today’s distributed computing

environments is such that the presence of bugs and

security holes is statistically unavoidable.

A very promising approach to this issue is to

implement a self protected system which refers to the

capability of a system to protect itself against

intrusions.

Page 4: Self protecteion in clustered distributed system new

Self -protection in a clustered distributed system presents a

self- protected system context of cluster –based

applications.

We consider that hardware environment is composed of a

cluster of machines interconnected through a local area

network.

The software environment is composed of a set of

application components deployed on the cluster.

Page 5: Self protecteion in clustered distributed system new

LITERATURE SURVEY

A number of surveys focused on classifying security

patterns. Using metrics such as purpose and abstraction

level

Security patterns which are applicable to classifying self-

protection approaches based on:

Confidentiality, Integrity, and Availability.

Page 6: Self protecteion in clustered distributed system new

EXISTING SYSTEM

The main tools and techniques currently used are

Intrusion detection

Two main approaches have been explored to ensure

intrusion detection :

I)misuse intrusion detection and

II)Anomaly intrusion detection.

These approaches are used in firewalls and intrusion

detection system.

Page 7: Self protecteion in clustered distributed system new

Backtracking tools:

Backtracking tools record data about system activity so

that once intrusion attempt has been detected, it is

possible to detect sequence of events that led to

intrusion and potential extent of damage.

Page 8: Self protecteion in clustered distributed system new

DISADVANTAGES OF EXISTING SYSTEM

Misuse intrusion detection cannot detect unknown

attacks, Anomaly intrusion detection can detect

unknown attacks but price a lot.

Backtracking tools can help to automate parts but

human expertise is required for accurate

understanding of attack.

Page 9: Self protecteion in clustered distributed system new

PROPOSED SYSTEM

Any attempt to use an undeclared communication

channel is trapped and a recovery procedure is

executed automatically.

Legal communication channels are automatically

calculated from hardware and software architectures of

the system and are used to generate protection rules

that forbid the use of unspecified channels.

Page 10: Self protecteion in clustered distributed system new
Page 11: Self protecteion in clustered distributed system new

PROPOSED SYSTEM ADVANTAGES Automates the configuration of security components

when the system evolves.

Detects and blocks any deviation from communication

channels.

Isolate the machine belonging to cluster that breaks

communication channels.

Page 12: Self protecteion in clustered distributed system new

FUTURE ENHANCEMENTS

In future self-protection in a clustered distributed

system has to be focused on spotting intruders

targeting different protocols.

Page 13: Self protecteion in clustered distributed system new

CONCLUSION

The detection of an illegal behavior triggers a counter

-measure to isolate the compromised resources and

prevent further damages. Self -protection in a clustered

distributed system targets controlled environments and

silent attacks rather than open grid and denial-of-service

attacks.

Page 14: Self protecteion in clustered distributed system new

QUERIES????

Page 15: Self protecteion in clustered distributed system new

THANK YOU