Skip to main content
  • Book
  • © 2003

Integrated Network Management VIII

Managing It All

Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT, volume 118)

Conference series link(s): IM: International Symposium on Integrated Network Management

Conference proceedings info: IM 2003.

Buying options

eBook USD 189.00
Price excludes VAT (USA)
  • ISBN: 978-0-387-35674-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 259.00
Price excludes VAT (USA)
Hardcover Book USD 249.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (66 chapters)

  1. Front Matter

    Pages i-xxiii
  2. Anomaly / Intrusion Detection

    1. Front Matter

      Pages 1-1
    2. An SNMP Agent for Stateful Intrusion Inspection

      • Luciano Paschoal Gaspary, Edgar Meneghetti, Liane Rockenbach Tarouco
      Pages 3-16
    3. Firewall Policy Advisor for Anomaly Discovery and Rule Editing

      • Ehab S. Al-Shaer, Hazem H. Hamed
      Pages 17-30
    4. A Scaled, Immunological Approach to Anomaly Countermeasures

      • Kyrre M. Begnum, Mark Burgess
      Pages 31-42
  3. Internet Accounting

    1. Front Matter

      Pages 43-43
    2. User Oriented IP Accounting in Multi-User Systems

      • Ge Zhang, Bernd Reuther, Paul Mueller
      Pages 59-72
    3. Tariff-Based Pricing and Admission Control for DiffServ Networks

      • Tianshu Li, Youssef Iraqi, Raouf Boutaba
      Pages 73-86
    4. Monitoring and Security

      1. Monitoring Distributed Systems
        • Karen Witting, James Challenger, Brian O’Connell
        Pages 89-92
      2. Proactive Intrusion Detection and SNMP-Based Security Management: New Experiments and Validation
        • J. B. D. Cabrera, L. Lewis, X. Qin, C. Gutiérrez, W. Lee, R. K. Mehra
        Pages 93-96
      3. Netlogger
        • Dan Gunter, Brian Tierney
        Pages 97-100
      4. A Case Study of Three Open Source Security Management Tools
        • Hilmi Gunes Kayacik, A. Nur Zincir-Heywood
        Pages 101-104
      5. MTreeDx: A Multicast Network Diagnosis Tool
        • Jaiwant Mulik, Phillip Conrad, Brian Drake, Saroj Biswas, Musoke Sendula
        Pages 105-108
      6. Multiple Authorization
        • Gerald Vogt
        Pages 109-112
      7. A Controller Agent Model to Counteract DoS Attacks in Multiple Domains
        • Udaya Kiran Tupakula, Vijay Varadharajan
        Pages 113-116
      8. Toward Understanding Soft Faults in High Performance Cluster Networks
        • Jeffrey J. Evans, Seongbok Baik, Cynthia S. Hood, William Gropp
        Pages 117-120
    5. Tools and Information Models

      1. RDF-Based Knowledge Models for Network Management
        • Jun Shen, Yun Yang
        Pages 123-126
      2. Semantic Management: Application of Ontologies for the Integration of Management Information Models
        • Jorge E. López de Vergara, Víctor A. Villagrá, Julio Berrocal, Juan I. Asensiot, Roney Pignaton
        Pages 131-134

About this book

Welcome to 1M 2003, the eighth in a series of the premier international technical conference in this field. As IT management has become mission critical to the economies of the developed world, our technical program has grown in relevance, strength and quality. Over the next few years, leading IT organizations will gradually move from identifying infrastructure problems to providing business services via automated, intelligent management systems. To be successful, these future management systems must provide global scalability, for instance, to support Grid computing and large numbers of pervasive devices. In Grid environments, organizations can pool desktops and servers, dynamically creating a virtual environment with huge processing power, and new management challenges. As the number, type, and criticality of devices connected to the Internet grows, new innovative solutions are required to address this unprecedented scale and management complexity. The growing penetration of technologies, such as WLANs, introduces new management challenges, particularly for performance and security. Management systems must also support the management of business processes and their supporting technology infrastructure as integrated entities. They will need to significantly reduce the amount of adventitious, bootless data thrown at consoles, delivering instead a cogent view of the system state, while leaving the handling of lower level events to self-managed, multifarious systems and devices. There is a new emphasis on "autonomic" computing, building systems that can perform routine tasks without administrator intervention and take prescient actions to rapidly recover from potential software or hardware failures.

Keywords

  • Denial of Service
  • Firewall
  • Overlay
  • Peer
  • QoS
  • Quality of Service
  • Quality of Service (QoS)
  • SNMP
  • Session
  • configuration
  • evaluation
  • grid computing
  • load balancing
  • monitor
  • tools

Editors and Affiliations

  • IBM Research, USA

    Germán Goldszmidt

  • University of Osnabrück, Germany

    Jürgen Schönwälder

Bibliographic Information

Buying options

eBook USD 189.00
Price excludes VAT (USA)
  • ISBN: 978-0-387-35674-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 259.00
Price excludes VAT (USA)
Hardcover Book USD 249.99
Price excludes VAT (USA)