Skip to main content

Dependencies Discovery and Analysis in Distributed Systems

(Short Paper)

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6983))

Abstract

The welfare of our daily life depends, even more, on the correct functioning of complex distributed applications. Moreover, new paradigms such as Service oriented computing and Cloud computing encourage the design of application realized coupling services running on different nodes of the same data center or distributed in a geographic fashion. Dependencies discovery and analysis (DDA) is core for the identification of critical and strategical assets an application depends on, and it is valid support to risk and impact analysis [10].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AggreGate. Network Manager, http://aggregate.tibbo.com/

  2. Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D.A., Zhang, M.: Towards highly reliable enterprise network services via inference of multi-level dependencies. Microsoft Research (2007)

    Google Scholar 

  3. Chen, X., Zhang, M., Morley Mao, Z., Bahl, P.: Automating network application dependency discovery: experiences, limitations, and new solutions. Microsoft Research, University of Michigan (2008)

    Google Scholar 

  4. HP. Network management center, https://h10078.www1.hp.com/cda/

  5. IBM. Tivoli, http://www-01.ibm.com/software/tivoli/

  6. OpenNMS, http://www.opennms.org/

  7. ServiceNow, http://www.service-now.com/

  8. Kandula, S., Chandra, R., Katabi, D.: Whats going on? Learning communication rules in edge networks. Microsoft Research (2008)

    Google Scholar 

  9. Standford Linear Accelerator Center, Network Monitoring Tools, http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

  10. Tyson Macaulay Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies. CRC Press Inc. (December 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Casalicchio, E. (2013). Dependencies Discovery and Analysis in Distributed Systems. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds) Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, vol 6983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41476-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41476-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41475-6

  • Online ISBN: 978-3-642-41476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics