Skip to main content

A Hybrid Machine Learning/Statistical Model of Grid Security

  • Conference paper
  • 216 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3251))

Abstract

Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. While they have shown their usefulness, the significance of the information hidden in the historical data corpus denoting the user-Grid interactions has been largely neglected. In fact, such information provide great insight into Grid security and if properly harnessed, will help better protect the Grid against potential attacks.

To utilize these hidden information in a service-oriented Grid environment, we propose a hybrid machine learning and statistical model. The machine learning component predicts the security of a service by considering the probability distribution of the past services, while the statistical component evaluates a service’s security statistically based on its own past behaviors and users’ opinions. We construct an overall architecture based on this hybrid model and demonstrate through examples its effectiveness and potential to offer stronger security to the Grid.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications 15(3), 200–222 (2001)

    Article  Google Scholar 

  2. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proceedings of 5th ACM conference on Computer and communications security, pp. 83–92. ACM Press, New York (1998)

    Chapter  Google Scholar 

  3. Butler, R., Engert, D., Foster, I., Kesselman, C., Tuecke, S., Volmer, J., Welch, V.: A National-Scale Authentication Infrastructure. IEEE Computer 33(12), 60–66 (2000)

    Google Scholar 

  4. Novotny, J., Tuecke, S., Welch, V.: An Online Credential Repository for the Grid: MyProxy. In: Proceedings of 10th International Symposium on High Performance Distributed Computing, pp. 104–115. IEEE Press, New York (2001)

    Chapter  Google Scholar 

  5. Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, pp. 50–60 (2002)

    Google Scholar 

  6. Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 Proxy Certificates for Dynamic Delegation. In: 3rd Annual PKI R&D Workshop (2004)

    Google Scholar 

  7. Basney, J., Nejdl, W., Olmedilla, D., Welch, V., Winslett, M.: Negotiating Trust on the Grid. In: 2nd Workshop on Semantics in P2P and Grid Computing at the Thirteenth International World Wide Web Conference, New York (2004)

    Google Scholar 

  8. Mitchell, T.M.: Machine learning. McGraw-Hill, New York (1997)

    MATH  Google Scholar 

  9. Han, J.W., Kamber, M.: Data mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiang, G., Yu, G., Qu, X., Dong, X., Wang, L. (2004). A Hybrid Machine Learning/Statistical Model of Grid Security. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004. GCC 2004. Lecture Notes in Computer Science, vol 3251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30208-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30208-7_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23564-4

  • Online ISBN: 978-3-540-30208-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics