Jan Kantert, Sarah Edenhofer, Sven Tomforde, J. Hähner, C. Müller-Schloer
{"title":"Robust Self-Monitoring in Trusted Desktop Grids for Self-Configuration at Runtime","authors":"Jan Kantert, Sarah Edenhofer, Sven Tomforde, J. Hähner, C. Müller-Schloer","doi":"10.1109/SASOW.2014.28","DOIUrl":null,"url":null,"abstract":"A Trusted Desktop Grid System (TDG) is a platform for autonomous agents to share their computing resources based on trust relationships. Thereby, agents that only use the system without a fair participation are considered as malicious. Typically, the effects of active malicious agents and high-load situations of the TDG are similar -- calling for appropriate approaches to distinguish them and, thus, allowing for counter measures to attacks. In this paper, we investigate the effect of high load to our measurements and present a concept for filtering our metrics. The evaluation demonstrated that we can normalise our metrics under high load to detect attacks with a high certainty using system-wide metrics.","PeriodicalId":6458,"journal":{"name":"2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops","volume":"34 1","pages":"178-185"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SASOW.2014.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
A Trusted Desktop Grid System (TDG) is a platform for autonomous agents to share their computing resources based on trust relationships. Thereby, agents that only use the system without a fair participation are considered as malicious. Typically, the effects of active malicious agents and high-load situations of the TDG are similar -- calling for appropriate approaches to distinguish them and, thus, allowing for counter measures to attacks. In this paper, we investigate the effect of high load to our measurements and present a concept for filtering our metrics. The evaluation demonstrated that we can normalise our metrics under high load to detect attacks with a high certainty using system-wide metrics.