Muutke küpsiste eelistusi

E-raamat: Self-Healing Systems and Wireless Networks Management

  • Formaat: 182 pages
  • Ilmumisaeg: 21-Oct-2013
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781040057582
  • Formaat - EPUB+DRM
  • Hind: 77,99 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 182 pages
  • Ilmumisaeg: 21-Oct-2013
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781040057582

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Do you believe in open-source development? Would you like to see your security system grow and learn by itself? Are you sick of paying for software license fees every year that produce little return on investment? And, would you prefer to invest in something you could sell later on to other IT security departments? If you answered yes to these questions, then this is the book for you.

Addressing the issues of fault identification and classification, Self-Healing Systems and Wireless Networks Management presents a method for identifying and classifying faults using causal reasoninga powerful bottom up technique for deep surface and cross context correlation establishment. It explains how to employ a similarity matrix to match the user activity log and its pattern in a transformed space and discusses the development and deployment of a policy engine.

The book describes how to use this self-growing policy engine in collaboration with a scheduler and plug-in bank to generate a healing policy. This healing policy presents the solution of the direct and causal fault. The author describes how to embed the solutions of the related faults in the healing policy so that if a client faces more faults related to the previous one, they can be addressed at the client side.

Exploring prototype systems, the text defines supporting systems architectures and includes a case study of an autonomic healing-based self-management engine. It also explains how to fulfill the tasks in linear time, so that the increase in the source file size does not affect the performance of your systemmaking the system highly scalable for distributed self-healing systems.

This book provides valuable guidance to help you build a self-growing, self -earning, self-healing system that, after development, learns for itself about the IT security vulnerabilities of your organization and fills the holes for future breach prevention.

Arvustused

Dr. Junaid Chaudhry has been developing smart security solutions for distributed networks since 2002. ... His idea of an extendible self-healing engine is so customizable that a small organization can even adjust it to their requirements to set up a small Security Operation Center for themselves ... . I find his book to be a good read for security managers and engineers alike and highly recommend it to everyone for a good read. -Captain Mahmod Ibrahim, Chief, Information Security Center, Ministry of Interior, State of Qatar

Foreword ix
Preface xi
1 Introduction
1(20)
Motivation
1(1)
Scenario
2(1)
Economic Considerations
3(1)
Problem Statement
4(3)
Requirements
7(10)
Self-Healing
7(2)
Causal Reasoning
9(6)
Challenges
15(2)
What This Book Is Not
17(1)
References
18(3)
2 Case Study: Autonomic Healing-Based Self-Management Engine
21(26)
Overview
21(1)
Ubiquitous Networks Industry
22(2)
Autonomic Healing-Based Self-Management Engine (AHSEN)
24(4)
Software Architecture
24(4)
AHSEN Components
28(12)
Normal Functionality Model (NFM)
28(2)
Self-Management Framework (SMF)
30(1)
Service Lifecycle
31(9)
Simulation Results
40(5)
References
45(2)
3 The Proposed Architecture
47(20)
Introduction
47(1)
Process Conversion to XML Documents
48(3)
Abnormalities Detection
51(4)
Tag Heterogeneity
51(1)
Structural Heterogeneity
52(1)
Assumptions
53(2)
Similarity Matrices
55(12)
Label Similarity
55(6)
Pattern Similarity
61(2)
Vertices Similarity
63(2)
Tree Edit Distance Similarity
65(2)
4 Policy Engine
67(24)
Introduction
67(3)
Software Architecture
70(17)
Dynamically Adjustable Policy Engine
70(1)
A Sample Scenario of the Dynamically Adjustable Rules
71(5)
Code Generation and Operation in the Policy Engine
76(2)
Software Architecture of the Policy Engine
78(3)
Performance of the Policy Engine
81(1)
Experimental Environment
82(1)
Performance Comparison
83(1)
Feature Comparison
84(3)
Novel Rule Methodology
87(2)
References
89(2)
5 Related Work
91(22)
Overview
91(1)
Autonomic Network Management Systems
91(4)
HYWINMARC
92(1)
AMUSE
92(1)
RoSES
93(1)
AMUN
94(1)
SMHMS
94(1)
Case-Based Reasoning Systems
95(2)
CHEMREG
95(1)
JColibri
95(1)
IBROW Project
96(1)
CBR*Tools
96(1)
NaCoDAW
96(1)
Policy Engine
97(1)
RETE
97(1)
Business Rule Markup Language (BRML)
97(1)
JSR-94 (Java Specification Request)
98(1)
Similarity Approaches
98(2)
ELIXIR
98(1)
XIRQL and XXL
98(1)
Fuzzy Weights
99(1)
Relaxed Weights
99(1)
ApproXQL
99(1)
Query Decomposition Approach
100(1)
Fault Detection
100(2)
Expert Systems in Fault Detection
100(1)
Neural Networks in Fault Detection
101(1)
Qualitative Simulation in On-Line Fault Detection
101(1)
On-Line Expert Systems in Fault Detection
101(1)
References
102(11)
6 Implementation
113(8)
Overview
113(1)
Implementation Details
114(2)
Similarity-Based Inverted Index and Pattern Index
114(2)
Create List of Fragments and Regions
116(5)
7 Prototype
121(12)
Parsing of XML Files
121(1)
DOM Object for Each File Created
121(1)
Construct Tree Target
122(1)
Construct Inverted Index
122(1)
Query Processing
122(1)
Construct Pattern Index
122(2)
Fragments Construction Form Pattern Index
124(4)
Demo Screenshots
128(3)
Reference
131(2)
8 Evaluation
133(8)
Performance Graphs
134(2)
Fault Detection and Traversal
134(2)
Resource Utilization
136(2)
Trends of Causal Reasoning Based Fault Detection
138(1)
References
139(2)
9 Contributions
141(10)
Conceptual Contributions
141(4)
Causal Reasoning Based Fault Identification
141(1)
Self-Management Functional Hierarchy
142(2)
Multifaceted Policy Engine Methodology
144(1)
Healing Policy Generation
145(1)
Architectures
145(2)
AHSEN
145(1)
Policy Engine
146(1)
Software Prototypes
147(1)
References
147(4)
10 Conclusion
151(4)
References
154(1)
Index 155
Chaudhry, Junaid Ahsenali