IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. I (Jul.-Aug. 2016), PP 25-36 www.iosrjournals.org DOI: 10.9790/0661-1804012536 www.iosrjournals.org 25 | Page Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems Manjunath Kotari 1 , Dr. Niranjan N. Chiplunkar 2 , Dr. Nagesh H.R 3 1 Research Scholar , NMAM Institute of Technology, Nitte, India 2 Principal , NMAM Institute of Technology, Nitte, India 3 Professor & Head, MITE, Moodbidri, India Abstract: The distributed systems have a noteworthy role in today’s information technology, whether it is governmental or nongovernmental organizations. The major concern of today’s software industry is that dealing with security, scalability and dynamicity of distributed systems. Adaptive Distributed Systems (ADSs) are nodes in networked computers, which change itself according to changes in the environments. A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network. This monitoring system may be compromised by the intruder while gathering the information from the distributed systems. This paper, framework of security mechanisms for monitoring ADSs is discussed by following tasks. Firstly, investigation of existing monitoring tools to find the impacts of monitoring activities in ADSs. When the monitoring tool collects security critical information, there is a high risk of information disclosure to unauthorized users. Secondly, a secure communication channel to monitor confidential information has been implemented by using RSA algorithm. Thirdly, a secure, customized network monitoring tool has been implemented by providing the necessary security for each parameter in the system. Security metrics are used to measure the security levels of each monitored parameter. Keywords: Adaptive Distributed Systems, Network Monitoring Tool, Security Mechanisms, System Under Study. I. Introduction In the present internet state of affairs, distributed systems have a noteworthy impact on private and governmental organizations. From time to time depending on the circumstances, the generation of information increases or decreases. Consequently, the value of information criticality also changes dynamically. Distribution of various information and services of different websites is frequent nowadays[1]. It is very essential to monitor the distributed systems of increasingly complicated IT environments [2]. The monitoring activities involve performance monitoring and resource usages of heterogeneous distributed information systems. The typical distributed system consists of components which are deployed into different subsystems or called services and security policies. The services on different server systems run as independent processes. Most of the time an enterprise systems need to contact external services for business functionalities like suppliers and banking [3]. Monitoring is considered expensive for the various business activities of IT infrastructures. While accessing the information, users expect a high level of system quality and more secure environment. These issues need intrinsic adaptation of the distributed systems. This adaptation may be achieved with the help of Adaptive Distributed Systems(ADSs)[4]. An ADSs is a system that vigorously adjusts its performance based on changes in the surroundings. The Adaptation method allows distributed system to revise its own configurations and functions in response to changes in its atmosphere. Monitoring proves the best adaptive capability of the system to take proper action with respect to the changes in the environment. The security issues are main concerns irrespective of whether the system is adaptive or non-adaptive. The adaptive monitoring system changes its performance depending upon the criticality of information collected for the adaptation purpose[5]. The security system allows only encryption mechanism for the security critical information during monitoring of target systems. The distributed systems may be hacked by unauthorized users in several ways, either during transmission or at storage[6]. There is a chance of a significant security problem if the monitoring process is hacked by intruders during the time of information gathering. The monitored systems may be overtaken by intruders during this adaptive monitoring process; which means that the possibility of security breaches are more while the system is under monitoring. One of the solutions to address these security problems of distributed systems is framework of security mechanisms for monitoring adaptive distributed systems. The distributed systems provide deliberate functionalities and services continuously with the suitable level of quality only by the constant monitoring. The following changes need to be monitored with the help of monitoring tool which include IP Address of nodes, Host ID, Network ID, Processes, Running Applications, Memory, Disk, Link Failures etc. There is a chance that monitoring system may be overtaken by unauthorized user. In such cases, if the monitoring process is restricted for the purpose of protection; it may lead to severe limitations on the capacity of the adaptive system. Achieving adaptation with minimal impact on security mechanism is a challenging task[7]. In this regard, various issues need to be investigated thoroughly, like what