Guaranteed intrusion removal from monitored distributed applications

نویسندگان

  • Wanqing Wu
  • Madalene Spezialetti
  • Rajiv Gupta
چکیده

This paper presents on-line perturbation tracking and intrusion removal techniques which are designed to accommodate delays which occur due to monitoring activities. These accommodations eliminate the effect of monitoring intrusion on the execution behavior and the scheduling of the monitored computation. By maintaining an adjusted time view, the intrusion removal system preserves the execution order of processes and the message selection decisions that would have been made in an unmonitored execution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Protocol for Removing Communication Intrusion in Monitored Distributed Systems

The development of a distributed application that exhibits both desired functionality as well as performance is a complex task. Therefore, the construction of monitoring tools to assist in the development of complex distributed applications is of great practical signiicance. For example, monitoring tools can be used to observe the behavior and ne tune the performance. One of the fundamental pro...

متن کامل

Coverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks

Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number of sensors to achieve a desi...

متن کامل

Experimental Evaluation of On - line Techniques forRemoving Monitoring

We describe the implementation and experimental evaluation of two distributed systems integrated with on-line monitoring intrusion removal techniques. The scheduling of processes at a site is accomplished using the round-robin mechanism. The communication is carried out using a logical token-ring protocol in one system, and a point-to-point protocol in the other. By registering the monitoring a...

متن کامل

On-line Avoidance of Communication Intrusion in Token Ring Networks

Distributed programs are often instrumented for collecting information to assist in analyzing the behavior of an application. However, the act of monitoring a process can alter the very behavior being monitored. The changes in the behavior occur because the order in which application messages are delivered at a site and the pool of messages available at the site at critical execution points are...

متن کامل

On-Line Avoidance of the Intrusive Affects of Monitoring on Runtime Scheduling Decisions

Distributed programs are often instrumented for collecting information to assist in analyzing the behavior of an application. However, the act of monitoring a process introduces intrusive overhead that delays the times at which actions occur in a monitored execution in comparison to the times at which they occur in an unmonitored execution. These delays can alter the actions of individual proce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996