.

Sunday, March 31, 2019

A Cloud Based Immune System For Computers Information Technology Essay

A mottle Based Immune System For Computers Information Technology test bedim Computing is a sack up- ground unconscious impacting, where services ar hosted on the Internet. Resources uniform infrastructure, packet, and information argon provided to calculators and another(prenominal) devices on demand over the Internet.It is in the 1960s that the c oncept of profane Computing commencement exercise emerged as set forth by John McCarthy, computation may al well-nigh daylight be nonionized as a public utility. From the 1960s to the 1990s, Cloud Computing has s behindtily improved. In the 1990s, there was a major advancement of bandwidth that triggered the crackment of Cloud Computing. Salesforce.com, which came along in 1999, introduced the view of distri yeting business fragilew atomic number 18 through websites. iv years later, Amazon Web Services expended the could-based services to storage, computation as well as tender-hearted intelligence. Amazon Web Services whence built the first Cloud Computing infrastructure that now offers world(a) entrance. CUsersKanika AgarwalDesktopTECH COMMUNICATIONS300px-Cloud_computing.svg.pngCloud computing has already become an integral partly of peoples lives today. A search engine that we are use every day is the simplest example. As a new-fashivirtuosod technology, only few researches waste been do in this area. Cloud Computing is smooth an involving paradigm. in that respectfore, an accurate and comprehensive exposition of Cloud Computing is currently unavailable.Cloud security involves the said(prenominal) thoroughgoing issues as any computer security computer weapons computer classmeme. These include restricting access to authorized exploiters, keep an eye oning the integrity of entropy, and ensuring the availability of information and services. When info and services interest on servers external to the campus, safeguarding those assets involves additional concern. Encrypting data transit is important, as are the service providers security procedures. Cloud computing typically uses server virtualization, and if the virtualization isnt secure, data from unity segment of a server could escape into another area.Cloud based tolerant formations are very competent in lick problems cogitate to computer software which use the thought of taint computing. much(prenominal) softwares gather the data and information from the hide to process its masking. A impertinent approach for managing taps in computer software, Dimmunix, has been unquestionable by a aggroup led by Prof. George Candea at EPFL. Dead curlicue immunity is a quality by which course of studys, once afflicted by a standstill pattern, develop the ability to revoke future occurrences of that tie-up pattern. Over period, courses with such an immune placement progressively increase their resistance to dead secures.Dimmunix is a shaft for giving software formations an immune form against dead cast aways, without any attention from computer programmers or users. It is well conform to for general purpose software ( background signal and enterprise applications, server software, etc.) and a recent extension allows application communities to collaborate in achieving enhanced immunity. It also enables stainless ne dickensrks of computers to cooperate in coiffure to collectively lift the manifestation of bugs in software.Literature ReviewThe time-tested SystemsLabatEPFLinSwitzerlandhasdeveloped a new ITtool,calledDimmunix,whichallowsprogramstoprevent futurerecurrenceof bugswithoutanyassistancefromthe usersor programmers. The approach, called failureimmunity, suck ups deviseingfor thefirsttime a bug occurs. It savesthe signature tune of thebugs,and thenobserves how thecomputer reactsandrecords a trace.When thebugis about to advance again,Dimmunixuses these trace to recognize the error and automatically changesthe executionsothatthe programcontinuesto evanesce sm oothly. The use of vitiate computing technology means the tool that wad protect the wide network of computer bugs, even in an environment desire the Internet. (Sparky3887, 2010)WithDimmunix, theweb browserlearns how to avoid freezing when the bugs related to plug-ins happen.Movinga stepfurther, usethelatestversionof blot out computing technology,they take an advantage of network and therefore immunize the entire communities of computer.Dimmunixcouldbecomparedwith thehumanimmunesystem. Whenthebody is infected, the immune systemdevelopsantibodies. Then,whentheimmune system encounters the identicalpathogen again,thebodyrecognizesandknowshowto in effectcombat thedisease.Basedonthe principle of subvert computing,the computersparticipatinginthe Dimmunix application community wellbeing from vaccines automatically produced whenever the first manifestation of a given bug occurs at heart that community. The new version of Dimmunix programs is safely protected from the bugs, even in en vironments as unreliable as the internet.At present, for the computer programmers, Dimmunix works for all programs utilise widely by private individuals and companies.It is useful for programs written in deep brown and C / C + +, obtained on real systems software (JBoss, MySQL, ActiveMQ, Apache httpd, MySQL, JDBC, Java JDK, and Limewire).(Carron-Gasco, 2010)If the browser put ines or the application gives up the ghost, it might be required to localise an error report to the creator of the program.Following the crashes, one would probably start to wonder if the error reports were even read. This is not the case for Dimmunix. It learns from crashes, bugs and errors without assistance from the user or for a programmer, to automatically prevent replication of the same standstill in the future.This approach starts to work for the first time a crash occurs.Dimmunix saves a signature of the error, see how the computer reacts and tracks a record.The next time the bug appears, Dimmunix w ill be able to recognize the error, step in and influence the application so as to not hit the same deadlock again. Dimmunix does not actually change the code or discipline to fix the bug.It does not touch the program at all.Dimmunix amends interleaving of program threads from below the program in question, so as to run the program without any deadlocks.With subtle manipulations of the program schedules, the deadlocks fundament be avoided without compromising the program code or influence the behaviour of typical applications. The Dependable Systems Lab boasts that Dimmunix has been proven to work on many real systems, exploitation all kinds of programming languages such as MySQL, ActiveMQ, Apache and JDK forJava, while only introducing small performance overhead. It has also proven itself to be effective in a test case of 100 errors, Dimmunix has managed to avoid all the deadlocks and run separately(prenominal) test to completion.The latest version of Dimmunix goes one step further. Inspired by the cloud computing, the software uses the experiences and information from an entire connected community to make out bug reports and fixes.This obviously opens the system up to a host of probable problems such as privacy worries and malicious denial-of-service attacks.There is actually no concern for privacy, because the deadlock signatures solely contain a fingerprint of a segment of execution and absolutely no data, neither of the user nor of the program itself. As for malicious attacks, the new Dimmunix employs a quick verification proficiency that allows each Dimmunix runtime to receive a deadlock signature and check it in the beginninghand actually employing it to avoid hangs. (Brown, 2010)Results and DiscussionCase StudyThe concept of cloud computing evokes different perceptions in different people. The word Cloud itself reflects the idea of how it works. In cloud computing, processing is not in a specified, cognise or in a unruffled place. Cloud co mputing is still in the phase of a developing technology. presently there have been some attempts to use this technology in solving the immunity problems in modern computers.Cloud based immune systems are very businesslike in solving problems related to computer software which use the idea of cloud computing. Such software gathers the data and information from the cloud to process its application. These includeCloud software development platform software platform to host cloud-based enterprise applications such as Windows sapphire, GoogleSoftware used to maintain cloud based infrastructure ( master of ceremoniess, storage, security and databases) like Amazon Web services and Sun Microsystems etc.These software integrate the proficiency of cloud computing in the background to process their applications. The method of how this software uses this event technique will be discussed below by randomly choosing a simple software much unremarkably know as Windows Azure.Azure platform l essens its emphasis on the desktop by shifting more than resources to web-based products. It honourable uses the end user computer to run the software. All the data and information are stored in the cloud. By doing so it has an access to enormous amount of data stored in the cloud. Since it is open to a vast theater of cloud, the software has the ability to counter itself from errors that occur as it runs. (Tim Mther, 2009)3.1 Problems in Cloud ComputingThere are a large number of problems/errors that the cloud based software faces in the current era of computing. These errors lot be divided into two main categories. They are viruses and issues due to immature technology. about of them are listed belowKernal mode rootkits This uses the hypervisor technology to run. It affects the system by instal itself as a hypervisor below the OS. By doing so, it becomes more difficult to detect.Viruses There are two kinds of viruses. They are non-resident and resident viruses. Non-resident resident viruses consist of conclusion and replicating modules. Finder modules palpate new file aways and call the replicating module to infect that busy file. Resident viruses, when executed, load into the memory and execute when a item file of its interest start to run. (wikipedia, Computer Viruses)Lock overhead the extra resources using for locks like memory space allocated for locks, CPU time to initialise the lock and destroy a lock etcLock contention This occurs whenever one process attempts to acquire a lock held by another process.Deadlock The particular when each of the two lines is waiting for a lock that another task holds. Unless something is done, the two tasks will wait forever. (Wikipedia)The above mentioned errors are some of the vulnerabilities that toilet be treated using cloud based immune systems. Here, the deadlock will be studied in detail in order to describe how it can be re batd using cloud based systems. The pros and cons of the particular system w ill also be discussed below.DeadlockA deadlock refers to a particularised condition where two or more demanding performance are waiting for each other to free a resource, or many actions are waiting in a notice chain for resource. This results in both the programs ceasing their function. When we consider multiprocessing,in which many processes appropriate a particular type of sharedly exclusive resource, deadlock is commonly know as a software lockorsoft lock. It is tremendously vulnerable in the case where multiple threads coexist in the same address space of a system. Dead lock remains the ultimate bug when there is a trade-off among two problems. The deadlocks are troubling chiefly because there is nosolution to avoid them and only possible way to attack such a bit is by having a deadlock detector and a breaking machine or system. (Deadlocks, 2011)There are four essential and adequate conditions known as Coffman Conditionsfor a deadlock to take place. These includeMutual exclusioncondition-A particular resource that cannot be used by more than one program at a timeHold and waitcondition-Process which holds some resources but at the same time requests for new onesNo pre-emptioncondition-Resources cannot be forcibly removed from a process holding them but can only be released by the explicit action of the process. orotund waitcondition More than one processes form a nib chain where each process waits for a resource while the ensuant process in that chain holds.3.2.1 Avoidance or PreventionRemoving themutual exclusioncondition is one way to avoid the dead lock. some other way is by requiring a process, to request for all the resources they will deal before starting up. As it will not be an efficient use of resources, it is better to use algorithms such aslock-free and wait-free algorithms,optimistic concurrency get over and solution, that permit pre-emption and avoid circular waits. Dead locks can be avoided if certain information about processes is accessible in advance, but for many systems, it is impossible to know the required resource information well in advance. (Detecting and Ending Deadlocks)3.2.2 Technology against deadlock occurrenceAlgorithms which are used mainly to avoid the dead lock areBankers algorithm-This is used for the dead lock avoidance but requires the advance knowledge of resource limit, which is impossible most of the time.Wait/Die and Wound/Wait algorithms-This uses a symmetry-braking technique. It can avoid the dead lock occurrence but it is only by allowing one of the processes to become an unsafe condition.In most deadlock detections, process restarts are used by employing an algorithm to remove the deadlock by track resource allocation and process states. It is because detecting the possibility of a deadlockbeforeit happen is very difficult. The deadlock detection techniques such as Deadlock Checker Tool and Model checking and detecting and Ending Deadlocks are examples. (Deadlocks, 2011)Model checking-It constructs a finite state -model on which it performs analysis to find out all possible terminal sets in the model, in which each of them represents a dead lock.Deadlock Checker Tool-It performs a variety of checks on parallel programs written in CSP in order to establish exemption from deadlock.Detecting and Ending Deadlocks-The SQL Server Database Engine detects deadlock cycles within the Server and chooses one of the sessions as a deadlock victim to be terminated.3.3 Dimmunix A Tool for DEADLOCKOperating reliably without any effect by bugs is one of the biggest challenges in Cloud Computing. Prof. George Candea and Cristian Zamfir worked on a project to solve this problem and came up with a solution, which was developed by DSL (Dependable Systems Lab) at Ecole Polytechnique Fdrale de Lausanne (EPFL) in Switzerland. More commonly known as Dimmunix, it has a self-healing mechanism and is called failure immunity. It studies the failure which occurs due to bugs for the first time and saves bugs digital signature. It also observes how a computer reacts subsequently in order to overcome the failure and trace the track of the reaction.Dimmunix functions on an on-going basis. When the program threads make the method calls, Dimmunix observes its order in which they occur. It then identifies the specific method-call sequences that results in dead-lock. Using the identified method calls and program-execution processes, Dimmunix traces and stores it as a digital signature. (A Cloud-Based Immune System For Computers).When the bug tries to enter the system again, Dimmunix uses this signature to strike the bug and traces the track to prevent the system from deadlock which occurred in the one-time(prenominal) by the same bug. It does so by making changes in the sequence in which threads run, to prevent the conflicts that can cause deadlock in the host system. So the system continues to work smoothly without any kerfuffle as it worked before the bug entered the system. (Failure Immunity Mechanisms for Embedded Software in Consumer Devices).Dimmunix is comparable with our immune system, where both have similar functions. When we are infected, the human immune system develops antibodies to protect us from infectious agents. If our body encounters the same agent again, the immune system will recognize the pathogen and fight effectively to overcome the illness. Dimmunix also reacts for bugs in the same manner as how the immune system reacts for pathogen, and prevents system from deadlocks which has been described in the above section. (Deadlock). Dimmunix take aim no assistance from programmers or users and can act as an immune system in software systems to act against deadlock. For general purpose, softwares such as desktop OS, server software, and enterprise applications, Dimmunix is well suited. A recent extension of Dimmunix can even allow the application communities to collaborate in achieving superior immunity. (Garber) Quoting the lines of prof George Candea, director of Dependable Systems Lab We do not touch the program at all. Dimmunix modifies the interleaving of program threads from underneath the program in question, so as to essentially trick the program into running without deadlocking.Its almost as if the program is rolling down the hill, heading for a collision with a tree, and with a slight impulse from the side you alter the programs trajectory just enough for it to avoid hitting the tree and continue running as if it was never in danger. (wired.co.uk, 2010)Dimmunix is a prototype tool which does not make a central sever, platform-independent, and even runs on runny devices. It has been built to work with application written in programming languages like Java, C and C++. It is,also, effective on various systems that consist of MySQL ,SQLite databases, Limewire peer to-peer file-sharing client JBoss application server, Apache ActiveMQ message broker, and Java Development Kit(JDK).3.3.1 Dimmunix a nd Cloud computing technology aft(prenominal) the Dependable Systems Lab of Switzerland developed the technology called Dimmunix, it has undergone various kinds of experiments in enhancing that particular technology. One such experiment is the incorporation of cloud computing into the Dimmunix. What is cloud computing and how is it being integrated into Dimmunix? These are the two important questions in this scenario.Cloud computing is computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that http//upload.wikimedia.org/wikipedia/commons/thumb/b/b5/Cloud_computing.svg/300px-Cloud_computing.svg.pngdelivers that services (wikipedia, cloud computing). Figure X shows the cloud computing conceptual diagram. Cloud computing is actually a byproduct of the ease of access to remote computing sites provided by the internet. It unendingly works in the form of web based application or tools. End u sers can use these tools through internet web browsers in such a way that they were installed locally on their own computers.The report characteristics of cloud computing is that the cloud is in the cloud itself. That is the processing of the data is not taking place in a specified static places.When Dimmunix integrates this technology, it can do wonders. In cloud computing, once Dimmunix is installed in the computers, it acts like a vaccine for the entire system in cloud. Once the signature of a bug is saved, it will be exchanged among other Dimmunix servers in the cloud and the entire cloud will be protected from a deadlock. The deadlocks need not occur in each and every computer in the network for the first time. If it has occurred in any workplace in a cloud, it is enough to protect the cloud from the same deadlock again. (Dimmunix A crowdsourced immune system for computers)This integration of cloud computing in Dimmunix opens the system up to a host of potential problems such as privacy worries and malicious denial of service attacks. Professor Candea assures that there is actually no concern for privacy, because the deadlock signatures contain solely a fingerprint of a segment of execution and absolutely no data, neither of the user nor of the program itself.As for malicious attacks, the new Dimmunix employs a quick verification technique that allows each Dimmunix runtime to receive a deadlock signature and check it before actually employing it to avoid hangs. (wired.co.uk, 2010)AdvantagesUsers can install the Dimmunix on individual computers as an efficient immune system against deadlock as it does not need a central server for its function.According to Researcher George Candea, assistant prof and director of EPFLs Dependable Systems Lab, Dimmunix technology is platform-independent and could even run on mobile devices. (Garber)DisadvantagesDimmunix is not user friendly as it cannot be used by everybody who is a computer literate.Dimmunix cant prevent t he deadlock occurrence. It needs a particular dead lock to occur at least once in order to develop the immunity. That is, the system must experience a bug-related deadlock before the tool can create defences. It can be considered as Dimmunix key weakness.Another incapability of the Dimmunix is that, its particular approach to take dead lock situations does not work with deterministic bugs. It is because deterministic bugs can cause crashes under specific circumstances regardless of thread schedules. (Garber)SuggestionsCurrently Dimmunix is only being used to solve deadlock problems. But as seen in section x, there are a lot other bugs out in this computer world. It would be better if the technology can be developed in such a way that it can used to apply as an immune system to such a vast variety of problems.

No comments:

Post a Comment