MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER

Julien Bourgeois, Raheel Hassan

Abstract

Due to the nature of grid computing networks, security pitfalls are plethora and adversaries are sneaking to launch attacks. Keeping this scope in mind, we will discuss our proposed solution for securing grid computing networks that we have called gSOC (Grid Security Operation Center). The main advantage of gSOC is that it can give a global view of security of the entire grid infrastructure. The main difficulty is to deal with the specificities of grid infrastructure, that are: multi-sites networks, multi-administrative domains, dynamic collaboration between nodes and sites, high number of nodes to manage, no clear view of the foreign networks and exchange of security information among different domains.

References

  1. Dawid Kurzyniec, Magdalena Slawinska, J. S. and Sunderam., V. (2007). Unibus: a contrarian approach to grid computing. J. Supercomput., 42(1):125-144.
  2. Ganame, A.K. Bourgeois, J. (2008). Defining a simple metric for real-time security level evaluation of multi-sites networks. Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium, 14-18:1 - 8.
  3. Northcutt, S. and Novak, J. (2002). Network Intrusion Detection. ISBN: 0-73571-265-4. New Riders, third edition edition. September.
  4. Staniford-Chen, S., Tung, B., and Schnackenberg, D. (1998). The common intrusion detection framework (cidf). In Information Survivability Workshop, Orlando.
Download


Paper Citation


in Harvard Style

Bourgeois J. and Hassan R. (2009). MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 403-408. DOI: 10.5220/0002188304030408


in Bibtex Style

@conference{secrypt09,
author={Julien Bourgeois and Raheel Hassan},
title={MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={403-408},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002188304030408},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER
SN - 978-989-674-005-4
AU - Bourgeois J.
AU - Hassan R.
PY - 2009
SP - 403
EP - 408
DO - 10.5220/0002188304030408