TY - GEN
T1 - Surviable monitoring in dynamic networks
AU - Ateniese, Giuseppe
AU - Riley, Chris
AU - Scheideler, Christian
PY - 2004
Y1 - 2004
N2 - We present a monitoring system for a dynamic network, in which a set of domain nodes shares the responsibility for producing and storing monitoring information about a set of visitors. This information is stored persistently when the set of domain nodes grows and shrinks. Such a system can be used to store traffic or other logs for auditing, or can be used as a subroutine for many applications to allow significant increases in functionality and reliability. The features of our system include authenticating visitors, monitoring their traffic through the domain, and storing this information in a persistent, efficient, and searchable manner. The storage process is O(log n)-competitive in the number of network messages with respect to an optimal offline algorithm; we show that this is as good as any online algorithm can achieve, and significantly better than many commonly used strategies for distributed load balancing.
AB - We present a monitoring system for a dynamic network, in which a set of domain nodes shares the responsibility for producing and storing monitoring information about a set of visitors. This information is stored persistently when the set of domain nodes grows and shrinks. Such a system can be used to store traffic or other logs for auditing, or can be used as a subroutine for many applications to allow significant increases in functionality and reliability. The features of our system include authenticating visitors, monitoring their traffic through the domain, and storing this information in a persistent, efficient, and searchable manner. The storage process is O(log n)-competitive in the number of network messages with respect to an optimal offline algorithm; we show that this is as good as any online algorithm can achieve, and significantly better than many commonly used strategies for distributed load balancing.
KW - Audit logs
KW - Emergency communication
KW - Monitoring
KW - Network intrusion detection
KW - Survivable storage
UR - http://www.scopus.com/inward/record.url?scp=4544255097&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=4544255097&partnerID=8YFLogxK
U2 - 10.1109/IWIA.2004.1288036
DO - 10.1109/IWIA.2004.1288036
M3 - Conference contribution
AN - SCOPUS:4544255097
SN - 0769521177
SN - 9780769521176
T3 - Proceedings - Second IEEE Information Assurance Workshop
SP - 33
EP - 47
BT - Proceedings - Second IEEE Information Assurance Workshop
T2 - Proceedings - Second IEEE Information Assurance Workshop
Y2 - 8 April 2004 through 9 April 2004
ER -