|SCSC 2007||START Conference Manager|
Management of the GIG resources and operation will be, of necessity, intrinsic to the architecture and transparent to the user. The development an architecture that is secure against malicious exploitation, data or service denial and data corruption is a principal focus. Introduction of mobile, ad-hoc network elements having intermittent network connectivity and limited life exacerbates this problem. In this paper we explore the GIG and present an innovative application of Autonomic Agent technology currently in development that has the potential to automate many of the obligatory network management tasks. Additionally, we introduce a GIG Simulation Testbed that, utilizing Discrete Event System Specification (DEVS), is proving useful in simulating GIG operation at the node level for the analysis of agent-based detection and neutralization of network cyber attacks by malicious parties and programs.
|START Conference Manager (V2.54.4)|