Catálogo de publicaciones - libros

Compartir en
redes sociales


Inter-Domain Management: First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings

Arosha K. Bandara ; Mark Burgess (eds.)

En conferencia: 1º IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) . Oslo, Norway . June 21, 2007 - June 22, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer Communication Networks; System Performance and Evaluation; Information Systems Applications (incl. Internet); Information Storage and Retrieval; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-72985-3

ISBN electrónico

978-3-540-72986-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Providing Seamless Mobility in Wireless Networks Using Autonomic Mechanisms

John Strassner; Barry Menich; Walter Johnson

Existing wireless networks have little in common, as they are designed around vendor-specific devices that use specific radio access technologies to provide particular functionality. Next generation networks seek to integrate wide-area and local-area wireless systems in order to provide seamless services to the end user. This would provide freedom of movement between indoor/outdoor and metropolitan/enterprise coverage while maintaining continuity of applications experience. Seamless Mobility is an experiential architecture, predicated on providing mechanisms that enable a user to accomplish his or her tasks without regard to technology. This paper examines how autonomic mechanisms can satisfy some of the challenges in realizing seamless mobility solutions.

- Autonomous Infrastructure and Security | Pp. 121-132

A ‘Pumping’ Model for the Spreading of Computer Viruses

Geoffrey Canright; Kenth Engø-Monsen

We present qualitative arguments concerning the probable infection pattern in a directed graph under the (weak or strong) influence of the outside world. This question is relevant for real computer viruses, which spread by following the (logical) directed links formed by address lists. Our arguments build on previous work in two (seemingly unrelated) areas: epidemic spreading on undirected graphs, and eigenvectors of directed graphs as applied to Web page ranking. More specifically, we borrow a recently proven result (used to design a ’sink remedy’ for Web link analysis) and use it to argue for a : that the effects of the outside world will not appear in the pattern of infection until the strength of the influence of the outside world exceeds a finite threshold value. We briefly discuss possible tests of this prediction, and its implications.

- Autonomous Infrastructure and Security | Pp. 133-144

Improving Anomaly Detection Event Analysis Using the EventRank Algorithm

Kyrre Begnum; Mark Burgess

We discuss an approach to reducing the number of events accepted by anomaly detection systems, based on alternative schemes for interest-ranking. The basic assumption is that regular and periodic usage of a system will yield patterns of events that can be learned by data-mining. Events that deviate from this pattern can then be filtered out and receive special attention. Our approach compares the anomaly detection framework from Cfengine and the EventRank algorithm for the analysis of the event logs. We show that the EventRank algorithm can be used to successfully prune periodic events from real-life data.

- Autonomous Infrastructure and Security | Pp. 145-155

Modeling and Performance Evaluation of the Network and Service Management Plane

Abdelkader Lahmadi; Laurent Andrey; Olivier Festor

Today, little is known about the costs associated with the manageability of a system. This lack of knowledge has a deep impact both on the quality and the performance of managed networks and services and even the management system itself. Thus, it becomes crucial to assess this cost and better understand the performance of management systems both with common metrics and performance evaluation methodologies. Based on empirical observations and analytical results, we identify interesting performance behavior of JMX (Java Management eXtension) based-management frameworks.

- Management Models | Pp. 156-159

Abstractions to Support Interactions Between Self-Managed Cells

Alberto Schaeffer-Filho; Emil Lupu

Management of pervasive systems cannot rely on human intervention nor centralised decision-making functions due to their complex and intrinsically mobile nature. In previous work, we proposed the concept of a self-managed cell (SMC) as an architectural pattern for building ubiquitous applications. A SMC consists of hardware and software components that form an autonomous administrative domain. SMCs may be realised at different scales, from body-area networks, to an entire room or larger settings. However, to scale to larger systems it is necessary for SMCs to collaborate with each other, to federate or compose in larger SMC structures. We describe here the main abstractions we have defined and explore future directions towards this goal.

- Management Models | Pp. 160-163

Self-management Framework for Unmanned Autonomous Vehicles

Eskindir Asmare; Morris Sloman

In this paper we identify the challenges in enabling self-management for Unmanned Autonomous Vehicles and briefly outline our policy-based approach for realising a self-management framework. We also present preliminary results.

- Management Models | Pp. 164-167

Towards a Toolkit for the Analysis and Design of Systems with Self-Management Capabilities

Ralf Koenig; Heinz-Gerd Hegering

Systems with more and more sophisticated self-management capabilities are introduced in many application domains, such as robotics, the military, aerospace, ground vehicles, IT network and systems management. So far, descriptions of such systems are neither decomposed into common modules nor aligned to a common reference model. For this reason, it is hard to compare them regarding common cross-domain properties of systems with self-management capabilities (SwSMC). It is also hard to transfer design knowledge from one application domain to another. A review of related work reveals few publications with guidance to analytical decomposition into functional modules and the identification of patterns specific to the structure and behavior as well as design and use of self-management capabilities.

To approach this problem, by using cross-domain evaluation criteria and identification of common patterns we can achieve uniformly structured system descriptions. The approach will be implemented by a common system model of SwSMC, an evaluation sheet for such systems, an evaluation results repository, a pattern catalogue and a set of recommendations how to apply the patterns during the design of such systems and keeping an eye on effectiveness and efficiency. So far, a system model and the evaluation sheet have been created, and some evaluations of research prototypes have been carried out. Despite the low number of evaluations so far, first patterns stand out.

- Management Models | Pp. 168-171

Estimating Local Cardinalities in a Multidimensional Multiset

Patrick Truong; Fabrice Guillemin

In connection with port scan and worm propagation in the Internet, we address in this paper the problem of estimating the ber of destinations communicating with a given source. We propose a computational and memory-efficient technique of finding the top-talker sources. The proposed algorithm is tested against actual data (NetFlow records from the interconnection IP backbone network of France Telecom).

- Policy Interactions | Pp. 172-175

Harnessing Models for Policy Conflict Analysis

Steven Davy; Brendan Jennings

Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which the policies are being defined. However, by developing analysis processes that can link the constructs of a policy language to the entities of an information model, we can harness knowledge relating to relationships and associations, constraint information, behavioural specifications codified by finite state machines, and extensive semantic information expressed via ontologies to provide powerful policy analysis processes.

- Policy Interactions | Pp. 176-179

Distributed End-to-End QoS Contract Negotiation

Hélia Pouyllau; Stefan Haar

The Internet is based on an X-Domain topology: interconnected domains are managed by independent actors (Fig.1). Deploying critical services (e.g. VPN, video-conference etc.) over such a topology requires to be able to guarantee For this, and to guarantee privacy, , also called , are committed pairwise between domains. While local QoS control issues on each participating domain can be considered solved [4], open problems persist in the field of end-to-end QoS provisioning and monitoring for The key factors to be taken into account are the heterogeneity, independence and privacy requirements of the individual domains.

- Policy Interactions | Pp. 180-183