Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Protecting grids from cross-domain attacks using security alert sharing mechanisms
Syed R., Syrame M., Bourgeois J. Future Generation Computer Systems29 (2):536-547,2013.Type:Article
Date Reviewed: Jun 12 2013

The authors of this paper address the problem of security management in multi-administrative grid computing networks. In these grid networks, nodes belonging to different administrative domains have different security policies but can collaborate with each other. As a result, attacks can easily be propagated from one domain to another, making it hard to pinpoint the source of the problem. To address this issue, the authors present a grid security operation center (GSOC), which detects attacks and shares selected security alerts with other trusted administrative domains in the same grid. Trust is based on an automated security evaluation of the administrative domains. The number of low-, medium-, and high-level alerts occurring in an administrative domain is evaluated to assign one of three security levels to it.

The authors compare GSOC with the existing distributed security operation center (DSOC), which was developed for traditional computer networks, by measuring their security alert rates in response to brute-force, denial-of-service (DoS), and distributed DoS (DDoS) attacks. This comparison shows that GSOC is better suited for grid networks since it can detect attacks, share alerts with other members of the network, and correlate alerts from other local sites. They also report that GSOC has a higher stability than either DSOC or the open-source security information management (OSSIM) system (for both of these approaches, the detection rate begins to degrade after a while). Furthermore, GSOC was able to provide a security situation overview in the event of severe distributed attacks, which other tools could not accomplish. The authors propose their GSOC as a prototype for grid computing network security solutions and, with some modifications, for deployment in cloud computing infrastructures.

Reviewer:  Edgar R. Weippl Review #: CR141273 (1309-0804)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Grid computing (C.2.4 ... )
 
 
Network Monitoring (C.2.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy