Anomalies Dynamic Analysis and Correction Software
The research is aimed to develop an effective Anomalies Dynamic Analysis and Correction Software (ADACS) for Grid Armenia. A software is developed that in addition to predetermined and fixed forms of protection of variety of servers generates game trees of possible anomalies and elaborates recommendations to avoid them by analyzing possible strategies throughout the game trees and searching the best correction strategies. Experiments on correction of anomalies in overfilling the memory of the cluster of IPIA are processed.
H. V. Astsatryan, Yu. H. Shoukourian and V. G. Sahakyan, “The ArmCluster1 Project: Creation o fhigh performance computation cluster and databases in Armenia Proceedings of Conference”, Computer Science and Information Technologies, pp. 376-379, 2001.
R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, and V. Welch, “Design and deployment of a National-Scale Authentication Infrastructure”, IEEEComputer, 33(12):60-66. 2000.
G.A. Bolcer and G. Kaiser, “SWAP: Leveraging the Web To Manage Workflow”, IEEE InternetComputing,:85-88. 1999.
I. Foster, C. Kesselman and S. Tuecke, “The Anatomy of the Grid Enabling Scalable Virtual Organizations”, Intl Journal, Supercomputer Applications 2001.
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, “A security architecture for computational grids”,In ACM Conference on Computers and Security, 83-91, 1998.
K. Ilgun, R.A. Kemmerer and P.A. Porras, “State transition analysis: A rule-based intrusion detection system”, IEEE Trans. Software Eng. vol. 21, no. 3, Mar. 1995.
F. Martinelli, P. Mori and A. Vaccarelli, “Improving grid services security with fine grain policies”, Instituto de Informatica e Telematica, Pisa, Italy, 2003.
E. Pogossian, A. Javadyan and E. Ivanyan, “Effective discovery of intrusion protection strategies”, Lecture Notes in Computer Science, AIS-ADM-05: The International Workshop on Autonomous Intelligent Systems -Agents and Data Mining St. Petersburg, Russia http://space.iias.spb.su/ais05/,LNAI 3505, pp.263-276, June 6-8, 2005.
E. Pogossian and A. Javadyan, “A game model for effective counteraction against computer attacks in intrusion detection systems”, NATO ASI 2003, Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management, Tsahkadzor, Armenia, pp.30, August 19-30, 2003.
E. Pogossian, V. Vahradyan and A. Grigoryan, “On competing agents consistent with expert knowledge”, Lecture Notes in Computer Science, AIS-ADM-07: The International Workshop on Autonomous Intelligent Systems - Agents and Data Mining, St. Petersburg, Russia, pp. 229-241,2007.
E. Pogossian, “Combinatorial game models for security systems. NATO ARW on Security and Embedded System”, Porto Rio, Patras, Greece, Aug. 8-18, 2005.
M. Botvinnik, Computers in Chess: Solving Inexact Search Problems. Springer Series in Symbolic Computation, with Appendixes, Springer-Verlag: NY, 1984.