Sciweavers

15 search results - page 1 / 3
» Proactive Containment of Malice in Survivable Distributed Sy...
Sort
View
CSREASAM
2003
13 years 6 months ago
Proactive Containment of Malice in Survivable Distributed Systems
Abstract The uncontrolled propagation of faults due to malicious intrusion can severely decrease system performance and survivability. Our goal is to employ available information a...
Michael G. Merideth, Priya Narasimhan
TJS
2002
118views more  TJS 2002»
13 years 4 months ago
On the Design, Development, Deployment, and Network Survivability Analysis of the Dynamic Routing System Protocol
: With the ever-increasing demands on server applications, reliability is of paramount importance. Often these services are implemented using a distributed server cluster architect...
Abdur Chowdhury, Ophir Frieder, Peng-Jun Wan
IPPS
2000
IEEE
13 years 9 months ago
Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol
With the ever-increasing demands on server applications, many new server services are distributed in nature. We evaluated one hundred deployed systems and found that over a one-yea...
Abdur Chowdhury, Ophir Frieder, Paul Luse, Peng-Ju...
CN
2007
224views more  CN 2007»
13 years 4 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...
ICPP
2006
IEEE
13 years 10 months ago
A PROactive Request Distribution (PRORD) Using Web Log Mining in a Cluster-Based Web Server
Widely adopted distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding reques...
Heung Ki Lee, Gopinath Vageesan, Ki Hwan Yum, Eun ...