Research Article
Security of HPC Systems: From a Log-analyzing Perspective
@ARTICLE{10.4108/eai.19-8-2019.163134, author={Zhengping Luo and Zhe Qu and Tung Thanh Nguyen and Hui Zeng and Zhuo Lu}, title={Security of HPC Systems: From a Log-analyzing Perspective}, journal={EAI Endorsed Transactions on Security and Safety}, volume={6}, number={21}, publisher={EAI}, journal_a={SESA}, year={2019}, month={8}, keywords={Security, high performance computing, attacks and defenses, intrusion detection, log file analysis}, doi={10.4108/eai.19-8-2019.163134} }
- Zhengping Luo
Zhe Qu
Tung Thanh Nguyen
Hui Zeng
Zhuo Lu
Year: 2019
Security of HPC Systems: From a Log-analyzing Perspective
SESA
EAI
DOI: 10.4108/eai.19-8-2019.163134
Abstract
High Performance Computing (HPC) systems mainly focused on how to improve performances of the computing. It has competitive processing capacity both in terms of calculation speed and available memory. HPC infrastructures are valuable computing resources that need to be carefully guarded and avoid being maliciously used. Thus, vulnerabilities are quintessential issues in HPC systems due to most of jobs and resources run or stored usually are sensitive and high-profit information. In this survey, we comprehensively review securities of HPC systems from a log-analyzing perspective, including well-known attacks and widely used defenses, especially intruder detection methods. We found that log files are used for the security purposes much less than what we expected. How to use all the available log files comprehensively and employ state-ofthe-art intrusion techniques to improve the robustness of HPC systems still lies for future research.
Copyright © 2019 Zhengping Luo et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.