About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sesa 19(21): e5

Research Article

Security of HPC Systems: From a Log-analyzing Perspective

Download1442 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.19-8-2019.163134,
        author={Zhengping Luo and Zhe Qu and Tung Thanh Nguyen and Hui Zeng and Zhuo Lu},
        title={Security of HPC Systems: From a Log-analyzing Perspective},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={6},
        number={21},
        publisher={EAI},
        journal_a={SESA},
        year={2019},
        month={8},
        keywords={Security, high performance computing, attacks and defenses, intrusion detection, log file analysis},
        doi={10.4108/eai.19-8-2019.163134}
    }
    
  • Zhengping Luo
    Zhe Qu
    Tung Thanh Nguyen
    Hui Zeng
    Zhuo Lu
    Year: 2019
    Security of HPC Systems: From a Log-analyzing Perspective
    SESA
    EAI
    DOI: 10.4108/eai.19-8-2019.163134
Zhengping Luo1,*, Zhe Qu1, Tung Thanh Nguyen2, Hui Zeng2, Zhuo Lu1
  • 1: Department of Electrical Engineering/Florida Center for Cybersecurity, University of South Florida, Tampa FL 33620, USA
  • 2: Intelligent Automation Inc., Rockville MD 20855, USA
*Contact email: Zhengpingluo@mail.usf.edu

Abstract

High Performance Computing (HPC) systems mainly focused on how to improve performances of the computing. It has competitive processing capacity both in terms of calculation speed and available memory. HPC infrastructures are valuable computing resources that need to be carefully guarded and avoid being maliciously used. Thus, vulnerabilities are quintessential issues in HPC systems due to most of jobs and resources run or stored usually are sensitive and high-profit information. In this survey, we comprehensively review securities of HPC systems from a log-analyzing perspective, including well-known attacks and widely used defenses, especially intruder detection methods. We found that log files are used for the security purposes much less than what we expected. How to use all the available log files comprehensively and employ state-ofthe-art intrusion techniques to improve the robustness of HPC systems still lies for future research.

Keywords
Security, high performance computing, attacks and defenses, intrusion detection, log file analysis
Received
2019-07-07
Accepted
2019-07-29
Published
2019-08-01
Publisher
EAI
http://dx.doi.org/10.4108/eai.19-8-2019.163134

Copyright © 2019 Zhengping Luo et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL