Muutke küpsiste eelistusi

Self-Healing Systems and Wireless Networks Management [Kõva köide]

  • Formaat: Hardback, 182 pages, kõrgus x laius: 234x156 mm, kaal: 408 g
  • Ilmumisaeg: 21-Oct-2013
  • Kirjastus: CRC Press Inc
  • ISBN-10: 146655648X
  • ISBN-13: 9781466556485
  • Formaat: Hardback, 182 pages, kõrgus x laius: 234x156 mm, kaal: 408 g
  • Ilmumisaeg: 21-Oct-2013
  • Kirjastus: CRC Press Inc
  • ISBN-10: 146655648X
  • ISBN-13: 9781466556485
Do you believe in open-source development? Would you like to see your security system grow and learn by itself? Are you sick of paying for software license fees every year that produce little return on investment? And, would you prefer to invest in something you could sell later on to other IT security departments? If you answered yes to these questions, then this is the book for you.

Addressing the issues of fault identification and classification, Self-Healing Systems and Wireless Networks Management presents a method for identifying and classifying faults using causal reasoninga powerful bottom up technique for deep surface and cross context correlation establishment. It explains how to employ a similarity matrix to match the user activity log and its pattern in a transformed space and discusses the development and deployment of a policy engine.

The book describes how to use this self-growing policy engine in collaboration with a scheduler and plug-in bank to generate a healing policy. This healing policy presents the solution of the direct and causal fault. The author describes how to embed the solutions of the related faults in the healing policy so that if a client faces more faults related to the previous one, they can be addressed at the client side.

Exploring prototype systems, the text defines supporting systems architectures and includes a case study of an autonomic healing-based self-management engine. It also explains how to fulfill the tasks in linear time, so that the increase in the source file size does not affect the performance of your systemmaking the system highly scalable for distributed self-healing systems.

This book provides valuable guidance to help you build a self-growing, self -earning, self-healing system that, after development, learns for itself about the IT security vulnerabilities of your organization and fills the holes for future breach prevention.

Arvustused

Dr. Junaid Chaudhry has been developing smart security solutions for distributed networks since 2002. ... His idea of an extendible self-healing engine is so customizable that a small organization can even adjust it to their requirements to set up a small Security Operation Center for themselves ... . I find his book to be a good read for security managers and engineers alike and highly recommend it to everyone for a good read. -Captain Mahmod Ibrahim, Chief, Information Security Center, Ministry of Interior, State of Qatar

Foreword ix
Preface xi
1 Introduction
1(20)
Motivation
1(1)
Scenario
2(1)
Economic Considerations
3(1)
Problem Statement
4(3)
Requirements
7(10)
Self-Healing
7(2)
Causal Reasoning
9(6)
Challenges
15(2)
What This Book Is Not
17(1)
References
18(3)
2 Case Study: Autonomic Healing-Based Self-Management Engine
21(26)
Overview
21(1)
Ubiquitous Networks Industry
22(2)
Autonomic Healing-Based Self-Management Engine (AHSEN)
24(4)
Software Architecture
24(4)
AHSEN Components
28(12)
Normal Functionality Model (NFM)
28(2)
Self-Management Framework (SMF)
30(1)
Service Lifecycle
31(9)
Simulation Results
40(5)
References
45(2)
3 The Proposed Architecture
47(20)
Introduction
47(1)
Process Conversion to XML Documents
48(3)
Abnormalities Detection
51(4)
Tag Heterogeneity
51(1)
Structural Heterogeneity
52(1)
Assumptions
53(2)
Similarity Matrices
55(12)
Label Similarity
55(6)
Pattern Similarity
61(2)
Vertices Similarity
63(2)
Tree Edit Distance Similarity
65(2)
4 Policy Engine
67(24)
Introduction
67(3)
Software Architecture
70(17)
Dynamically Adjustable Policy Engine
70(1)
A Sample Scenario of the Dynamically Adjustable Rules
71(5)
Code Generation and Operation in the Policy Engine
76(2)
Software Architecture of the Policy Engine
78(3)
Performance of the Policy Engine
81(1)
Experimental Environment
82(1)
Performance Comparison
83(1)
Feature Comparison
84(3)
Novel Rule Methodology
87(2)
References
89(2)
5 Related Work
91(22)
Overview
91(1)
Autonomic Network Management Systems
91(4)
HYWINMARC
92(1)
AMUSE
92(1)
RoSES
93(1)
AMUN
94(1)
SMHMS
94(1)
Case-Based Reasoning Systems
95(2)
CHEMREG
95(1)
JColibri
95(1)
IBROW Project
96(1)
CBR*Tools
96(1)
NaCoDAW
96(1)
Policy Engine
97(1)
RETE
97(1)
Business Rule Markup Language (BRML)
97(1)
JSR-94 (Java Specification Request)
98(1)
Similarity Approaches
98(2)
ELIXIR
98(1)
XIRQL and XXL
98(1)
Fuzzy Weights
99(1)
Relaxed Weights
99(1)
ApproXQL
99(1)
Query Decomposition Approach
100(1)
Fault Detection
100(2)
Expert Systems in Fault Detection
100(1)
Neural Networks in Fault Detection
101(1)
Qualitative Simulation in On-Line Fault Detection
101(1)
On-Line Expert Systems in Fault Detection
101(1)
References
102(11)
6 Implementation
113(8)
Overview
113(1)
Implementation Details
114(2)
Similarity-Based Inverted Index and Pattern Index
114(2)
Create List of Fragments and Regions
116(5)
7 Prototype
121(12)
Parsing of XML Files
121(1)
DOM Object for Each File Created
121(1)
Construct Tree Target
122(1)
Construct Inverted Index
122(1)
Query Processing
122(1)
Construct Pattern Index
122(2)
Fragments Construction Form Pattern Index
124(4)
Demo Screenshots
128(3)
Reference
131(2)
8 Evaluation
133(8)
Performance Graphs
134(2)
Fault Detection and Traversal
134(2)
Resource Utilization
136(2)
Trends of Causal Reasoning Based Fault Detection
138(1)
References
139(2)
9 Contributions
141(10)
Conceptual Contributions
141(4)
Causal Reasoning Based Fault Identification
141(1)
Self-Management Functional Hierarchy
142(2)
Multifaceted Policy Engine Methodology
144(1)
Healing Policy Generation
145(1)
Architectures
145(2)
AHSEN
145(1)
Policy Engine
146(1)
Software Prototypes
147(1)
References
147(4)
10 Conclusion
151(4)
References
154(1)
Index 155
Chaudhry, Junaid Ahsenali