Data Analysis of Cyber-Activity within High Performance Computing Environments

被引:0
作者
Ji, L. [1 ]
Kolhe, S. [1 ]
Clark, A. D. [1 ,2 ,3 ]
机构
[1] Johns Hopkins Univ, Whiting Sch Engn, Baltimore, MD 21218 USA
[2] Univ Maryland, Lab Phys Sci, College Pk, MD 20742 USA
[3] West Virginia Univ, Lane Dept Comp Sci & Elect Engn, Morgantown, WV 26505 USA
来源
2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2017年
关键词
Cyber-Resilience; Data Analysis; High Performance Computing; Failure Analysis; SOFTWARE; NETWORK; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.
引用
收藏
页码:109 / 114
页数:6
相关论文
共 32 条
[21]  
Liu ZP, 2016, ACM IEEE INT CONF CY
[22]   Fixed period of temporary immunity after run of anti-malicious software on computer nodes [J].
Mishra, Bimal Kumar ;
Jha, Navnit .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 190 (02) :1207-1212
[23]   SEIQRS model for the transmission of malicious objects in computer network [J].
Mishra, Bimal Kumar ;
Jha, Navnit .
APPLIED MATHEMATICAL MODELLING, 2010, 34 (03) :710-715
[24]  
Pritchett-Sheats L. A., 2013, EVALUATION CMLE ROW
[25]  
Quintero D., 2014, IBM POWER SYSTEMS 77
[26]  
Reuther Albert., 2016, 2016 IEEE High Performance Extreme Computing Conference (HPEC), P1, DOI DOI 10.1109/HPEC.2016.7761604
[27]  
Rodrigues A. F., 2011, Performance Evaluation Review, V38, P37, DOI 10.1145/1964218.1964225
[28]   Analyze-NOW - An environment for collection & analysis of failures in a network of workstations [J].
Thakur, A ;
Iyer, RK .
IEEE TRANSACTIONS ON RELIABILITY, 1996, 45 (04) :561-570
[29]  
von Neumann J., 1956, Automata Studies, V34, P43
[30]   Understanding the spread of malicious mobile-phone programs and their damage potential [J].
Wang, Pu ;
Gonzalez, Marta C. ;
Menezes, Ronaldo ;
Barabasi, Albert-Laszlo .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (05) :383-392