Guaranteed intrusion removal from monitored distributed applications
نویسندگان
چکیده
This paper presents on-line perturbation tracking and intrusion removal techniques which are designed to accommodate delays which occur due to monitoring activities. These accommodations eliminate the effect of monitoring intrusion on the execution behavior and the scheduling of the monitored computation. By maintaining an adjusted time view, the intrusion removal system preserves the execution order of processes and the message selection decisions that would have been made in an unmonitored execution.
منابع مشابه
A Protocol for Removing Communication Intrusion in Monitored Distributed Systems
The development of a distributed application that exhibits both desired functionality as well as performance is a complex task. Therefore, the construction of monitoring tools to assist in the development of complex distributed applications is of great practical signiicance. For example, monitoring tools can be used to observe the behavior and ne tune the performance. One of the fundamental pro...
متن کاملCoverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks
Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number of sensors to achieve a desi...
متن کاملExperimental Evaluation of On - line Techniques forRemoving Monitoring
We describe the implementation and experimental evaluation of two distributed systems integrated with on-line monitoring intrusion removal techniques. The scheduling of processes at a site is accomplished using the round-robin mechanism. The communication is carried out using a logical token-ring protocol in one system, and a point-to-point protocol in the other. By registering the monitoring a...
متن کاملOn-line Avoidance of Communication Intrusion in Token Ring Networks
Distributed programs are often instrumented for collecting information to assist in analyzing the behavior of an application. However, the act of monitoring a process can alter the very behavior being monitored. The changes in the behavior occur because the order in which application messages are delivered at a site and the pool of messages available at the site at critical execution points are...
متن کاملOn-Line Avoidance of the Intrusive Affects of Monitoring on Runtime Scheduling Decisions
Distributed programs are often instrumented for collecting information to assist in analyzing the behavior of an application. However, the act of monitoring a process introduces intrusive overhead that delays the times at which actions occur in a monitored execution in comparison to the times at which they occur in an unmonitored execution. These delays can alter the actions of individual proce...
متن کامل