Επιθέσεις και εργαλεία εντοπισμού ευπαθειών σε κατανεμημένα συστήματα
Security attacks and vulnerability detection tools for distributed systems
View/ Open
Keywords
Distributed systems security ; Κατανεμημένα συστήματα ασφάλειας ; Κατανεμημένα συστήματα ευπάθειες ; Κατανεμημένα συστήματα εργαλεία ευπάθειες ; Distributed systems vulnerability toolsAbstract
Computing systems have evolved during the last decades. They are not simply just a single computer with limited resources destined to serve only one specific user. Nowadays instead, we have reached the point where complex clusters of multiple computers of the same characteristics, or even not, can be combined and form a distributed system that resembles a single entity but with endless capabilities. They have the power to share and distribute their resources to whichever of their machine is needed, they can split the workload and work faster and more effective and then retrieve all the resources back so they can be reallocated to other machines, serving this way thousands of users and managing millions of data. This development has led to system architectural and design changes and as a result to the implementation of such systems. As a result the attack surface area has been increased and their exposure to new and sophisticated attacks. This study attempts to present the distributed systems and their challenges from a security point of view.