Skip to main navigation Skip to search Skip to main content

Cooperative work systems for the security of digital computing infrastructure

  • Tianning Zang*
  • , Xiaochun Yun
  • , Tianyi Zang*
  • , Yongzhen Zhang
  • , Chaoguang Men
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

On open digital computing infrastructure, various large-scale and complicated malicious behaviors are increasingly threatening the security of digital computing infrastructure. In this paper, a Cooperative Work Model (CRM) is presented by extending the conceptions of the Universal Turing Machine to deal with the threats. Then the Cooperative Work System Framework (CWSF) is derived from the model. Based on the framework, two practical Cooperative Work Systems (CWSs) are developed to track and analyze the Botnet and DDoS on digital computing infrastructure respectively. The systems collectively use and coordinate various monitoring systems distributed in the back-bone network of the infrastructure. The experimental results of analyzing typical security events show that the framework and systems are efficient and effective to collaboratively use diverse related network systems for monitoring and analyzing the large-scale network events. Currently, the systems are running steadily in the monitoring environment of a large-scale back-bone network.

Original languageEnglish
Title of host publicationProceedings - 16th International Conference on Parallel and Distributed Systems, ICPADS 2010
Pages676-681
Number of pages6
DOIs
StatePublished - 2010
Event16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010 - Shanghai, China
Duration: 8 Dec 201010 Dec 2010

Publication series

NameProceedings of the International Conference on Parallel and Distributed Systems - ICPADS
ISSN (Print)1521-9097

Conference

Conference16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010
Country/TerritoryChina
CityShanghai
Period8/12/1010/12/10

Keywords

  • Bonets
  • Cooperative work system
  • Ddos
  • Univerasl turing machine

Fingerprint

Dive into the research topics of 'Cooperative work systems for the security of digital computing infrastructure'. Together they form a unique fingerprint.

Cite this