Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm

Published: 01 December 2016 Publication History

Abstract

An evaluation model is designed to describe the relationship of security and QoS.A classical NSGA-II algorithm is revised to optimize the multi-objective model.A novel crossover approach performs information exchange based on each role.The found solutions simultaneously meet the requirements of security and QoS. Both network security and quality of service (QoS) consume computational resource of IT system and thus may evidently affect the application services. In the case of limited computational resource, it is important to model the mutual influence between network security and QoS, which can be concurrently optimized in order to provide a better performance under the available computational resource. In this paper, an evaluation model is accordingly presented to describe the mutual influence of network security and QoS, and then a multi-objective genetic algorithm NSGA-II is revised to optimize the multi-objective model. Using the intrinsic information from the target problem, a new crossover approach is designed to further enhance the optimization performance. Simulation results validate that our algorithm can find a set of Pareto-optimal security policies under different network workloads, which can be provided to the potential users as the differentiated security preferences. These obtained Pareto-optimal security policies not only meet the security requirement of the user, but also provide the optimal QoS under the available computational resource.

References

[1]
F. Alomari, D. Menasce, An autonomic framework for integrating security and quality of service support in databases, in: 2012 IEEE sixth international conference on software security and reliability (SERE), 2012, pp. 51-60.
[2]
F. Alomari, D. Menasce, Efficient response time approximations for multiclass fork and join queues in open and closed queuing networks, IEEE Transactions on Parallel and Distributed Systems, 25 (2013) 1437-1446.
[3]
F. Alomari, D. Menasce, Self-protecting and self-optimizing database systems: Implementation and experimental evaluation, in: Proceedings of the 2013 ACM cloud and autonomic computing conference, Article No. 18, 2013.
[4]
N. Al-Sayid, D. Aldlaeen, Database security threats: A survey study, in: 2013 5th International conference on computer science and information technology (CSIT), 2013, pp. 60-64.
[5]
M. Amirijoo, J. Hansson, S. Son, Specification and management of QoS in real-time databases supporting imprecise computations, IEEE Transactions on Computers, 55 (2006) 304-319.
[6]
G. Andres, H. Jose, R. Ernesto, M. Alfredo, Indexing and retrieving in fingerprint databases under structural distortions, Expert Systems with Applications, 40 (2013) 2858-2871.
[7]
L. Bayon, J. Grau, M. Ruiz, P. Suarez, The exact solution of the environmental/economic dispatch problem, IEEE Transactions on Power Systems, 27 (2012) 723-731.
[8]
M. Bennani, D. Menasce, Resource allocation for autonomic data centers using analytic performance models, in: Second international conference on autonomic computing, 2005, pp. 229-240.
[9]
E. Bertino, R. Sandhu, Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, 2 (2005) 2-19.
[10]
J. Chen, C. Hu, H. Zeng, J. Zhang, Impact of security on QoS in communication network, in: International conference on networks security, wireless communications and trusted computing, 2, 2009, pp. 40-43.
[11]
S. Darwish, S. Guirguis, M. Ghozlan, Intrusion detection in role administrated database: Transaction-based approach, in: International conference on computer engineering and systems (ICCES), 2013, pp. 73-79.
[12]
K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, A fast and elitist multi-objective genetic algorithm: NSGA-II, IEEE Transactions on Evolutionary Computation, 6 (2002) 182-197.
[13]
I. Hababeh, I. Khalil, A. Khreishah, Designing high performance web-based computing services to promote telemedicine database management system, IEEE Transactions on Services Computing, 8 (2015) 47-64.
[14]
B. Huang, B. Buckley, T. Kechadi, Multi-objective feature selection by using NSGA-II for customer churn prediction in telecommunications, Expert Systems with Applications, 37 (2010) 3638-3646.
[15]
G. Jabbour, D. Menasee, Policy-based enforcement of database security configuration through autonomic capabilities, in: International conference on autonomic and autonomous systems, 2008, pp. 188-197.
[16]
G. Jabbour, D. Menasee, The insider threat security architecture: A framework for an integrated, inseparable, and uninterrupted self-protection mechanism, in: International conference on computational science and engineering, 3, 2009, pp. 244-251.
[17]
K. Kashif, M. Madjid, Q. Shi, A. Sohail, Component-based security system (COMSEC) with QoS for wireless sensor networks, Security and Communication Networks, 6 (2013) 461-472.
[18]
A. Kamra, E. Bertino, Survey of machine learning methods for database security, Springer, 2009.
[19]
K. Kang, J. Oh, S. Son, Chronos: Feedback control of a real database system performance, in: Proceedings 28th IEEE international conference on real-time systems symposium (RTSS), 2007, pp. 267-276.
[20]
K. Kang, S. Son, J. Stankovic, Managing deadline miss ratio and sensor data freshness in real-time databases, IEEE Transactions on Knowledge and Data Engineering, 16 (2004) 1200-1216.
[21]
L. Kleinrock, Queueing systems, Wiley, New York, USA, 1975.
[22]
C. Laura, H. Jorge, E. Viviana, Real time database systems, Idea Group Referene, Hershey, Pa., 2006.
[23]
H. Li, Q. Zhang, Multiobjective optimization problems with complicated Pareto sets, MOEA/D and NSGA-II, IEEE Transactions on Evolutionary Computation, 13 (2009) 284-302.
[24]
Q. Lin, J. Chen, Z. Zhan, W. Chen, C.A. Coello Coello, Y. Yin, A hybrid evolutionary immune algorithm for multiobjective optimization problems, IEEE Transactions on Evolutionary Computation (2016).
[25]
F. Martins, E. Carrano, E. Wanner, R. Takahashi, G. Mateus, A hybrid multiobjective evolutionary approach for improving the performance of wireless sensor networks, IEEE Sensors Journal, 11 (2011) 545-554.
[26]
Menasce, D. (2004). Performance by design computer capacity planning by example. Upper Saddle River, NJ, USA: Prentice Hall PTR.
[27]
D. Menasce, J. Kephart, Guest editors' introduction: Autonomic computing, IEEE Internet Computing (2007) 18-21.
[28]
K. Metaxiotis, K. Liagkouras, Multiobjective evolutionary algorithms for Portfolio management: A comprehensive literature review, Expert Systems with Applications, 39 (2012) 11685-11698.
[29]
H. Mostafa, P. Pal, P. Hurley, Message passing for distributed QoS-security tradeoffs, The Computer Journal, 57 (2014) 840-855.
[30]
A. Nieto, J. Lopez, A context-based parametric relationship model (CPRM) to measure the security and QoS tradeoff in configurable environments, in: 2014 IEEE international conference on communications (ICC), 2014, pp. 755-760.
[31]
J. Parmar, Data security, intrusion detection, database access control, policy creation and anomaly response systems-A review, in: 2014 International conference on advances in engineering and technology research (ICAETR), 2014, pp. 1-6.
[32]
N. Poolsappasit, R. Dewri, I. Ray, Dynamic security risk management using bayesian attack graphs, IEEE Transactions on Dependable and Secure Computing, 9 (2012) 61-74.
[33]
U. Rao, N. Singh, A. Amin, K. Sahu, Enhancing detection rate in database intrusion detection system, in: Science and information conference (SAI), 2014, pp. 556-563.
[34]
A. Ronay, Y. Li, V. Valeria, Z. Enrico, L. Enrique, M. Carlos, NSGA-II-trained neural network approach to the estimation of prediction intervals of scale deposition rate in oil & gas equipment, Expert Systems with Applications, 40 (2013) 1205-1212.
[35]
A. Rubio-Largo, M. Vega-Rodriguez, J. Gomez-Pulido, J. Sanchez-Peerez, A comparative study on multiobjective swarm intelligence for the routing and wavelength assignment problem, IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 42 (2012) 1644-1655.
[36]
E. Saad, K. Mahdi, M. Zbakh, Cloud computing architectures based IDS, in: 2012 International conference on complex systems, 2012, pp. 1-6.
[37]
S. Sengupta, S. Das, M. Nasir, A.V. Vasilakos, W. Pedryc, An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 42 (2012) 1093-1102.
[38]
M. Shaygan, A. Alimohammadi, A. Mansourian, Z. Govara, Spatial multi-objective optimization approach for land use allocation using NSGA-II, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 7 (2014) 906-916.
[39]
M. Srivastava, Algorithm to prevent back end database against SQL injection attacks, in: 2014 International conference on computing for sustainable global development (INDIACom), 2014, pp. 754-757.
[40]
N. Taneja, B. Raman, I. Gupta, Chaos based partial encryption of spiht compressed images, International Journal of Wavelets Multiresolution and Information Processing, 9 (2011) 317-331.
[41]
L. Tang, T. Li, Y. Jiang, Z. Chen, Dynamic query forms for database queries, IEEE Transactions on Knowledge and Data Engineering, 26 (2014) 2166-2178.
[42]
Y. Wang, H. Li, G. Yen, W. Song, MOMMOP: Multiobjective optimization for locating multiple optimal solutions of multimodal optimization problems, IEEE Transactions on Cybernetics, 45 (2014) 830-843.
[43]
K. Woochul, S. Son, J. Stankovic, Design, implementation, and evaluation of a QoS-aware real-time embedded database, IEEE Transactions on Computers, 61 (2012) 45-49.
[44]
Q. Zhu, Q. Lin, Z. Du, Z. Liang, W. Wang, Z. Zhu, J. Chen, P. Huang, Z. Ming, A novel adaptive hybrid crossover operator for multiobjective evolutionary algorithm, Information Sciences, 345 (2016) 177-198.

Cited By

View all
  • (2023)Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110051237:COnline publication date: 1-Dec-2023
  • (2023)Security-Aware Database Migration PlanningConstraints10.1007/s10601-023-09351-628:3(472-505)Online publication date: 1-Sep-2023
  • (2022)Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networksProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544480(1-6)Online publication date: 23-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal  Volume 64, Issue C
December 2016
645 pages

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 01 December 2016

Author Tags

  1. Genetic algorithm
  2. Multi-objective optimization
  3. Network security
  4. QoS

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110051237:COnline publication date: 1-Dec-2023
  • (2023)Security-Aware Database Migration PlanningConstraints10.1007/s10601-023-09351-628:3(472-505)Online publication date: 1-Sep-2023
  • (2022)Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networksProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544480(1-6)Online publication date: 23-Aug-2022
  • (2021)A new approach to design S-box generation algorithm based on genetic algorithmInternational Journal of Bio-Inspired Computation10.1504/ijbic.2021.11336017:1(52-62)Online publication date: 1-Jan-2021
  • (2019)RETRACTED ARTICLE: Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operatorMultimedia Tools and Applications10.1007/s11042-018-6534-z78:8(9577-9593)Online publication date: 1-Apr-2019
  • (2017)Optimal reactive power dispatch problem using a two-archive multi-objective grey wolf optimizerExpert Systems with Applications: An International Journal10.5555/3164150.316423187:C(79-89)Online publication date: 30-Nov-2017

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media