sesa 19(21): e5

Research Article

Security of HPC Systems: From a Log-analyzing Perspective

Download932 downloads
  • @ARTICLE{10.4108/eai.19-8-2019.163134,
        author={Zhengping Luo and Zhe Qu and Tung Thanh Nguyen and Hui Zeng and Zhuo Lu},
        title={Security of HPC Systems: From a Log-analyzing Perspective},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={6},
        number={21},
        publisher={EAI},
        journal_a={SESA},
        year={2019},
        month={8},
        keywords={Security, high performance computing, attacks and defenses, intrusion detection, log file analysis},
        doi={10.4108/eai.19-8-2019.163134}
    }
    
  • Zhengping Luo
    Zhe Qu
    Tung Thanh Nguyen
    Hui Zeng
    Zhuo Lu
    Year: 2019
    Security of HPC Systems: From a Log-analyzing Perspective
    SESA
    EAI
    DOI: 10.4108/eai.19-8-2019.163134
Zhengping Luo1,*, Zhe Qu1, Tung Thanh Nguyen2, Hui Zeng2, Zhuo Lu1
  • 1: Department of Electrical Engineering/Florida Center for Cybersecurity, University of South Florida, Tampa FL 33620, USA
  • 2: Intelligent Automation Inc., Rockville MD 20855, USA
*Contact email: Zhengpingluo@mail.usf.edu

Abstract

High Performance Computing (HPC) systems mainly focused on how to improve performances of the computing. It has competitive processing capacity both in terms of calculation speed and available memory. HPC infrastructures are valuable computing resources that need to be carefully guarded and avoid being maliciously used. Thus, vulnerabilities are quintessential issues in HPC systems due to most of jobs and resources run or stored usually are sensitive and high-profit information. In this survey, we comprehensively review securities of HPC systems from a log-analyzing perspective, including well-known attacks and widely used defenses, especially intruder detection methods. We found that log files are used for the security purposes much less than what we expected. How to use all the available log files comprehensively and employ state-ofthe-art intrusion techniques to improve the robustness of HPC systems still lies for future research.