Main Reference PaperSelf-Protection in a Clustered Distributed System, IEEE Transactions on Parallel and Distributed Systems, Feb 2012
  • Nowadays the bugs and security holes were not able to be avoided from the distributed computing environment. Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with countermeasures. The approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows detecting known and unknown attacks if an illegal communication channel

+ Description
  • Nowadays the bugs and security holes were not able to be avoided from the distributed computing environment. Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with countermeasures. The approach is based on the structural knowledge of the cluster and of the distributed applications. This knowledge allows detecting known and unknown attacks if an illegal communication channel

  • To implement a self-protected system that is able to distinguish legal (self) from illegal (nonself) operations,

  • To minimize the perturbation on the managed system while providing a high reactivity,

  • To automate the configuration and reconfiguration of security components when the system evolves,

  • To keep the protection manager independent from the protected legacy system.

+ Aim & Objectives
  • To implement a self-protected system that is able to distinguish legal (self) from illegal (nonself) operations,

  • To minimize the perturbation on the managed system while providing a high reactivity,

  • To automate the configuration and reconfiguration of security components when the system evolves,

  • To keep the protection manager independent from the protected legacy system.

  • Two main approaches have been explored to ensure intrusion detection: misuse intrusion detection and anomaly intrusion detection. These approaches have been used in the case of Firewalls and Intrusion Detection Systems (IDS). While Firewalls are often used as filtering gateways to detect and to block illegal communication in real time, IDS mainly work offline and perform deep analysis to trigger alarms afterward. Misuse intrusion detection aims at detecting traces of well-identified attacks. The principle is to rely on a database which gathers well-known attack scenario specifications (also called attack signatures).

+ Contribution
  • Two main approaches have been explored to ensure intrusion detection: misuse intrusion detection and anomaly intrusion detection. These approaches have been used in the case of Firewalls and Intrusion Detection Systems (IDS). While Firewalls are often used as filtering gateways to detect and to block illegal communication in real time, IDS mainly work offline and perform deep analysis to trigger alarms afterward. Misuse intrusion detection aims at detecting traces of well-identified attacks. The principle is to rely on a database which gathers well-known attack scenario specifications (also called attack signatures).

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.