Data Analysis of Cyber-Activity within High Performance Computing Environments

被引:0
作者
Ji, L. [1 ]
Kolhe, S. [1 ]
Clark, A. D. [1 ,2 ,3 ]
机构
[1] Johns Hopkins Univ, Whiting Sch Engn, Baltimore, MD 21218 USA
[2] Univ Maryland, Lab Phys Sci, College Pk, MD 20742 USA
[3] West Virginia Univ, Lane Dept Comp Sci & Elect Engn, Morgantown, WV 26505 USA
来源
2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2017年
关键词
Cyber-Resilience; Data Analysis; High Performance Computing; Failure Analysis; SOFTWARE; NETWORK; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.
引用
收藏
页码:109 / 114
页数:6
相关论文
共 32 条
[1]  
[Anonymous], 2007, J PHYS
[2]  
Chen T. M., 2013, J NETWORK COMPUTER A, V36
[3]  
Clark A. D., 2018, SURVEILLANCE ACTION
[4]  
Clark A. D., 2016, HDB RES NEXT GENERAT
[5]  
Cook RD., 1982, Residuals and influence in regression
[6]  
Daly JT, 2008, IEEE ACM INT SYMP, P795, DOI 10.1109/CCGRID.2008.103
[7]  
Datta Suprakash., 2005, IEEE - Electrical and Computer Engineering, P219
[8]  
DeBardeleben N., 2009, HIGH END COMPUTING R
[9]  
Fan W., 2013, Influence Of Technology On Social Network Analysis Mining, P185, DOI DOI 10.1007/978-3-7091-1346-2_8
[10]  
Ganapathi A., 2003, USENIX S INT TECHN S, V67