The architecture of an automatic distributed recovery system

Meng Yu, Wanyu Zang, Peng Liu, Jiacun Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Distributed computing systems are important in daily business processing. Since vulnerability cannot be totally removed from a distributed computing system, successful attacks always happen and may inject malicious tasks or incorrect data into the distributed system. Referring to the incorrect data will further corrupt more data objects in the system, which comprises the integrity level of the system. In this paper, based on our recovery theories and algorithms proposed in [10], we build an architecture of a distributed attack recovery system. Our work can help the user to build a real recovery system and serve as a test bed to evaluate both our attack recovery techniques and new developed attack recovery techniques in the future.

Original languageEnglish (US)
Title of host publication2005 IEEE Networking, Sensing and Control, ICNSC2005 - Proceedings
Pages999-1004
Number of pages6
Volume2005
DOIs
StatePublished - 2005
Event2005 IEEE Networking, Sensing and Control, ICNSC2005 - Tucson, AZ, United States
Duration: Mar 19 2005Mar 22 2005

Other

Other2005 IEEE Networking, Sensing and Control, ICNSC2005
CountryUnited States
CityTucson, AZ
Period3/19/053/22/05

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'The architecture of an automatic distributed recovery system'. Together they form a unique fingerprint.

Cite this