Abstract
The welfare of our daily life depends, even more, on the correct functioning of complex distributed applications. Moreover, new paradigms such as Service oriented computing and Cloud computing encourage the design of application realized coupling services running on different nodes of the same data center or distributed in a geographic fashion. Dependencies discovery and analysis (DDA) is core for the identification of critical and strategical assets an application depends on, and it is valid support to risk and impact analysis [10].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AggreGate. Network Manager, http://aggregate.tibbo.com/
Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D.A., Zhang, M.: Towards highly reliable enterprise network services via inference of multi-level dependencies. Microsoft Research (2007)
Chen, X., Zhang, M., Morley Mao, Z., Bahl, P.: Automating network application dependency discovery: experiences, limitations, and new solutions. Microsoft Research, University of Michigan (2008)
HP. Network management center, https://h10078.www1.hp.com/cda/
IBM. Tivoli, http://www-01.ibm.com/software/tivoli/
OpenNMS, http://www.opennms.org/
ServiceNow, http://www.service-now.com/
Kandula, S., Chandra, R., Katabi, D.: Whats going on? Learning communication rules in edge networks. Microsoft Research (2008)
Standford Linear Accelerator Center, Network Monitoring Tools, http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html
Tyson Macaulay Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies. CRC Press Inc. (December 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Casalicchio, E. (2013). Dependencies Discovery and Analysis in Distributed Systems. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds) Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, vol 6983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41476-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-41476-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41475-6
Online ISBN: 978-3-642-41476-3
eBook Packages: Computer ScienceComputer Science (R0)