Abstract
In a large distributed enterprise multiple organizations may be involved in a collaborative effort to provide software components that they developed and maintain based on their own policies. When a local system downloads a component from a remote system into such an environment, the downloaded component should be checked to find if it contains internal failures or malicious codes before it is executed in the local system. Although the software was tested by the original developer in its local environment, we cannot simply assume that it will work correctly and safely in other organizations’ computing environments. Furthermore, there is a possibility that some malicious codes are added to the original component by a mistake or intentionally. To address this problem, we propose a cooperative component-testing architecture that consists of three testing schemes, a provider node testing, a multiple-aspect testing, and a cooperative testing. The proposed architecture is able to effectively and efficiently detect malicious codes in a component. The provider node testing can increase the possibility of choosing the cleanest (least infected) component among components that exist on multiple remote systems. The multiple-aspect testing can improve the ability to detect a fault or malicious contents. And the cooperative testing scheme provides fast detection speed by integrating detection schemes effectively. Finally, we simulate our proposed ideas and provide a performance evaluation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shum, S.B., De Roure, D., Eisenstadt, M., Shadbolt, N., Tate, A.: CoAKTinG: Collaborative Advanced Knowledge Technologies in the Grid. In: Proc. of the IEEE International Symposium on High Performance Distributed Computing (HPDC) (2002)
Risson, J., Moors, T.: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods. Internet Research Task Force (IRTF) draft-irtf-p2prg-survey-search-00.txt (2006)
Chen, M., Kiciman, E., Brewer, E., Fox, A.: Pinpoint: Problem Determination in Large, Dynamic Internet Services. In: Proc. of the IEEE International Conference on Dependable Systems and Networks (DSN) (2002)
Park, J.S., Suresh, A.T., An, G., Giordano, J.: A framework of multiple-aspect component-testing for trusted collaboration in mission-critical systems. In: Proc. of the IEEE Workshop on Trusted Collaboration (TrustCol) (2006)
Park, J.S., Chandramohan, P., Suresh, A.T., Giordano, J.: Component survivability for mission-critical distributed systems. Journal of Automatic and Trusted Computing (JoATC) (in press)
Park, J.S., Giordano, J.: Software component survivability in information warfare. In: Encyclopedia of Information Warfare and Cyber Terrorism, IDEA Group Publishing (in press)
Szo, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Publishing, London (2005)
Kienzie, D.M., Elder, M.C.: Recent Worms: A Survey and Trends. In: Proc. of the ACM Workshop on Rapid Malcode (WORM) (2003)
Milenkovic, M., Milenkovic, A., Jovanov, E.: Using Instruction Block Signatures to Counter Code Injection Attacks. Computer Architecture News 33(1), 108–117 (2005)
Almgren, M., Barse, E.L., Jonsson, E.: Consolidation and Evaluation of IDS Taxonomies. In: Proc. of the Nordic Workshop on Secure IT-systems (NordSec), pp. 57–70 (2003)
Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99-15, Depart. of Computer Engineering, Chalmers University (2000)
Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Int. Journal of Computers and Security 24(1), 31–43 (2005)
Abadi, M., Lamport, L.: Composing specifications. ACM Transactions on Programming Languages and Systems 15(1), 73–132 (1993)
Voas, J. M., Miller, K. W., Payne, J.: PISCES: A tool for predicting software testability. Technical Report, NASA (1992)
Voas, J.M., Payne, J.: Dependability certification of software components. Journal of Systems and Software 52(2-3), 165–172 (2000)
Chen, L., Avizienis, A.: N-version programming: a fault-tolerance approach to reliability of software operation. In: Digest of the 8th International Conference on Dependable Systems and Networks (FTCS), pp. 3–9 (1978)
Cai, X., Lyu, M.R., Vouk, M.A.: An experimental evaluation on reliability features of n-version programming. In: Proc. of the 16th IEEE International Symposium on Software Reliability Engineering, pp. 161–170 (2005)
UCB/LBNL/VINT: Network simulator (ns) Notes and Documentation. http://www.isi.edu/nsnam/ns
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
An, G., Park, J.S. (2007). Cooperative Component Testing Architecture in Collaborating Network Environment. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)