Microsoft Word - Tigran_Hakobhin.doc Mathematical Problems of Computer Science 31, 169--177, 2008. 169 Anomalies Dynamic Analysis and Correction Software Edward Pogossian1,2 and Arthur Grigoryan1 1Institute for Informatics and Automation Problems of NAN RA, 2State Engineering University of Armenia, E-mail: epogossi@aua.am Abstract The research is aimed to develop an effective Anomalies Dynamic Analysis and Correction Software (ADACS) for Grid Armenia. A software is developed that in addition to predetermined and fixed forms of protection of variety of servers generates game trees of possible anomalies and elaborates recommendations to avoid them by analyzing possible strategies throughout the game trees and searching the best correction strategies. Experiments on correction of anomalies in overfilling the memory of the cluster of IPIA are processed. References 1. H. V. Astsatryan, Yu. H. Shoukourian and V. G. Sahakyan, “The ArmCluster1 Project: Creation of high performance computation cluster and databases in Armenia Proceedings of Conference”, Computer Science and Information Technologies, pp. 376-379, 2001. 2. R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, and V. Welch, “Design and deployment of a National-Scale Authentication Infrastructure”, IEEEComputer, 33(12):60-66. 2000. 3. G.A. Bolcer and G. Kaiser, “SWAP: Leveraging the Web To Manage Workflow”, IEEE Internet Computing,:85-88. 1999. 4. I. Foster, C. Kesselman and S. Tuecke, “The Anatomy of the Grid Enabling Scalable Virtual Organizations”, Intl Journal, Supercomputer Applications 2001. 5. I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, “A security architecture for computational grids”, In ACM Conference on Computers and Security, 83-91, 1998. 6. K. Ilgun, R.A. Kemmerer and P.A. Porras, “State transition analysis: A rule-based intrusion detection system”, IEEE Trans. Software Eng. vol. 21, no. 3, Mar. 1995. 7. F. Martinelli, P. Mori and A. Vaccarelli, “Improving grid services security with fine grain policies”, Instituto de Informatica e Telematica, Pisa, Italy, 2003. 8. E. Pogossian, A. Javadyan and E. Ivanyan, “Effective discovery of intrusion protection strategies”, Lecture Notes in Computer Science, AIS-ADM-05: The International Workshop on Autonomous Intelligent Systems -Agents and Data Mining St. Petersburg, Russia http://space.iias.spb.su/ais05/, LNAI 3505, pp.263-276, June 6-8, 2005. 9. E. Pogossian and A. Javadyan, “A game model for effective counteraction against computer attacks in intrusion detection systems”, NATO ASI 2003, Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management, Tsahkadzor, Armenia, pp.30, August 19-30, 2003. 10. E. Pogossian, V. Vahradyan and A. Grigoryan, “On competing agents consistent with expert knowledge”, Lecture Notes in Computer Science, AIS-ADM-07: The International Workshop on Autonomous Intelligent Systems - Agents and Data Mining, St. Petersburg, Russia, pp. 229-241, 2007.  A-1451 Grid Armenia ISTC Project for the Institute for Informatics and Automation Problems of NAN RA 170 Anomalies Dynamic Analysis and Correction Software 11. E. Pogossian, “Combinatorial game models for security systems. NATO ARW on Security and Embedded System”, Porto Rio, Patras, Greece, Aug. 8-18, 2005. 12. M. Botvinnik, Computers in Chess: Solving Inexact Search Problems. Springer Series in Symbolic Computation, with Appendixes, Springer-Verlag: NY, 1984. Þ»ÕáõÙÝ»ñÇ ¹ÇݳÙÇÏ í»ñÉáõÍáõÃÛ³Ý ¨ í»ñ³óÙ³Ý Ñ³Ù³Ï³ñ· ¾. äáÕáëÛ³Ý ¨ ². ¶ñÇ·áñÛ³Ý ²Ù÷á÷áõÙ Grid ÙÇç³í³ÛñáõÙ ß»ÕáõÙÝ»ñÇó å³ßïå³ÝáõÃÛ³Ý åñáµÉ»ÙÇ Ñ³Ù³ñ ¹Çï³ñÏíáõÙ »Ý ѳñó»ñ, ϳåí³Í áñáßáõÙÝ»ñÇ ÁݹáõÝÙ³Ý Í³é»ñÇ ¹ÇݳÙÇÏ í»ñÉáõÍáõÃÛ³Ý Ñ»ï,: êï»ÕÍí³Í ¿ Íñ³·Çñ, ³Û¹åÇëÇ Í³é»ñÇ ¹ÇݳÙÇÏ ·»Ý»ñ³ódzÛÇ Ñ³Ù³ñ, ¨ Ýϳñ³·ñí³Í »Ý ëï³óí³Í ¿ùëå»ñ»Ù»Ýï³É ÷áñÓ³ñÏÙ³Ý ³ñ¹ÛáõÝùÝ»ñÁ` ÑÇßáÕáõÃÛ³Ý ·»ñѳ·»óÙ³Ý åñáµÉ»ÙÇ ûñÇݳÏÇ Ñ³Ù³ñ: