Immune-Inspired Self-Protection Model for Securing Grid

نویسندگان

  • Inderpreet Chopra
  • Ratinder Kaur
چکیده

The application of human immunology in solving security problems in Grid Computing seems to be a thought-provoking research area. Grid involves large number of dynamic heterogeneous resources. Manually managing the security for such dynamic system is always fault prone. This paper presents the simple immune based model for self-protection (SIMS) of grid environment from various attacks like DoS, DDoS, Probing, etc. Like human body helps to identify and respond to harmful pathogens that it doesn't recognize as “self”, in the same manner SIMS incorporates the immunological concepts and principles for safeguarding the grid from various security breaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BIOSARP: Biological Inspired Self-Organized Secure Autonomous Routing Protocol for Wireless Sensor Network

In multihop wireless sensor networks users or nodes are constantly entering and leaving the network. Classical techniques for network management and control are not conceived to efficiently face such challenges. New mechanisms are required, to work in a self-organized manner. The techniques found in nature promises WSN, to self-adapt the environmental changes and also self-protect itself from t...

متن کامل

Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm

The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, c...

متن کامل

A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols

Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology – the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and lo...

متن کامل

Immune Inspired Approach for Securing Wireless Ad hoc Networks

New computational techniques are being developed based on the immune system concepts, seeking to solve several engineering problems. Moreover, mobile ad hoc networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. A security approach based on immune inspired properties and features is...

متن کامل

Bio-inspired Model for Behavior Emergence: Modelling and Case Study

Large scale networks such as computational Grid promise a distributed computing infrastructure that can provide globally available network resources. Their size and complexity continue to increase and permit an almost ubiquitous availability of resources; users access to network resources irrespective to their location. These distributed systems need to be highly flexible, self-organizing and a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016