Practical Autonomic Computing

Autonomic computing generally refers to future information processing and networking technologies that are capable of self-awareness for the purposes of self-optimization, self-healing and self-protection. This paper is an overview of the goals, motivations and current status of this technical area, with specific focus on the technical and deployment challenges. Our conclusion is that, while the imperative to develop autonomic computing capabilities is indisputable, the technical and business obstacles are extremely significant. Those obstacles are not being coherently or adequately addressed by the R&D and business communities

[1]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  M. W. Shields An Introduction to Automata Theory , 1988 .

[3]  Aapo Hyvärinen,et al.  Survey on Independent Component Analysis , 1999 .

[4]  Vincent H. Berk,et al.  Process query systems , 2007, Computer.

[5]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[6]  Vincent H. Berk,et al.  Process query systems for network security monitoring , 2005, SPIE Defense + Commercial Sensing.

[7]  Lui Sha,et al.  Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.

[8]  Guanling Chen,et al.  Solar: Towards a Flexible and Scalable Data-Fusion Infrastructure for Ubiquitous Computing , 2001 .

[9]  Vincent H. Berk,et al.  An overview of process query systems , 2004, SPIE Defense + Commercial Sensing.

[10]  Haifeng Chen,et al.  Discovering Likely Invariants of Distributed Transaction Systems for Autonomic System Management , 2006 .

[11]  F. H. Adler Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .

[12]  O. Patrick Kreidl,et al.  Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.

[13]  Jr. G. Forney,et al.  The viterbi algorithm , 1973 .

[14]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[15]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[16]  Risto Vaarandi,et al.  A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).

[17]  C.S. Chao,et al.  An Automated Fault Diagnosis System Using Hierarchical Reasoning and Alarm Correlation , 1999, Proceedings 1999 IEEE Workshop on Internet Applications (Cat. No.PR00197).

[18]  Kevin P. Anchor,et al.  CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.

[19]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[20]  Guofei Jiang Weak process models for robust process detection , 2004, SPIE Defense + Commercial Sensing.

[21]  David A. Patterson,et al.  Path-Based Failure and Evolution Management , 2004, NSDI.

[22]  Alfonso Valdes,et al.  Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.

[23]  Vincent H. Berk,et al.  Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems , 2005, Second International Conference on Autonomic Computing (ICAC'05).

[24]  D UllmanJeffrey,et al.  Introduction to automata theory, languages, and computation, 2nd edition , 2001 .

[25]  Albert Benveniste,et al.  Diagnosis of asynchronous discrete event systems, a net unfolding approach , 2002, Sixth International Workshop on Discrete Event Systems, 2002. Proceedings..

[26]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[27]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.