首页 > 最新文献

Fifth International Workshop on Systems and Network Telemetry and Analytics最新文献

英文 中文
Understanding Parallel I/O Performance and Tuning 理解并行I/O性能和调优
Pub Date : 2022-06-27 DOI: 10.1145/3526064.3534114
S. Byna
Performance of parallel I/O is critical for large-scale scientific applications to store and access data from parallel file systems on high-performance computing (HPC) systems. These applications use HPC systems often to generate and analyze large amounts of data. They use the parallel I/O software stack for accessing and retrieving data. This stack includes several layers of software libraries - high-level I/O libraries such as HDF5, middleware (MPI-IO), and low-level I/O libraries (POSIX, STD-IO). Each of these layers have complex inter-dependencies among them that impact the I/O performance significantly. As a result, scientific applications frequently spend a large fraction of their execution time in reading and writing data on parallel file systems. These inter-dependencies also complicate tuning parallel I/O performance. A typical parallel I/O performance tuning approach includes collecting performance logs or traces, identifying performance bottlenecks, attributing root causes, and devising optimization strategies. Toward this systematic process, we have done research in collecting Darshan traces for I/O, studying logs on production supercomputing systems, attributing root cause analysis by zooming into application I/O performance, visualizing parallel I/O performance, and applying performance tuning. We will introduce parallel I/O basics, I/O monitoring using various profiling tools, analysis of logs collected on production class supercomputers to identify performance bottlenecks, and application of performance tuning options.We will also describe numerous application use cases and performance improvements.
并行I/O的性能对于大规模科学应用程序在高性能计算(HPC)系统上存储和访问并行文件系统中的数据至关重要。这些应用程序通常使用高性能计算系统来生成和分析大量数据。它们使用并行I/O软件栈来访问和检索数据。这个堆栈包括几层软件库——高级I/O库,如HDF5、中间件(MPI-IO)和低级I/O库(POSIX、STD-IO)。这些层中的每一层都具有复杂的相互依赖关系,这将显著影响I/O性能。因此,科学应用程序经常花费很大一部分执行时间在并行文件系统上读写数据。这些相互依赖也使并行I/O性能的调优复杂化。典型的并行I/O性能调优方法包括收集性能日志或跟踪、识别性能瓶颈、确定根本原因和设计优化策略。针对这个系统化的过程,我们进行了以下方面的研究:收集I/O的Darshan跟踪、研究生产超级计算系统的日志、通过放大应用程序I/O性能、可视化并行I/O性能以及应用性能调优来归因根本原因分析。我们将介绍并行I/O基础知识、使用各种分析工具进行I/O监控、分析在生产级超级计算机上收集的日志以识别性能瓶颈,以及性能调优选项的应用。我们还将描述许多应用程序用例和性能改进。
{"title":"Understanding Parallel I/O Performance and Tuning","authors":"S. Byna","doi":"10.1145/3526064.3534114","DOIUrl":"https://doi.org/10.1145/3526064.3534114","url":null,"abstract":"Performance of parallel I/O is critical for large-scale scientific applications to store and access data from parallel file systems on high-performance computing (HPC) systems. These applications use HPC systems often to generate and analyze large amounts of data. They use the parallel I/O software stack for accessing and retrieving data. This stack includes several layers of software libraries - high-level I/O libraries such as HDF5, middleware (MPI-IO), and low-level I/O libraries (POSIX, STD-IO). Each of these layers have complex inter-dependencies among them that impact the I/O performance significantly. As a result, scientific applications frequently spend a large fraction of their execution time in reading and writing data on parallel file systems. These inter-dependencies also complicate tuning parallel I/O performance. A typical parallel I/O performance tuning approach includes collecting performance logs or traces, identifying performance bottlenecks, attributing root causes, and devising optimization strategies. Toward this systematic process, we have done research in collecting Darshan traces for I/O, studying logs on production supercomputing systems, attributing root cause analysis by zooming into application I/O performance, visualizing parallel I/O performance, and applying performance tuning. We will introduce parallel I/O basics, I/O monitoring using various profiling tools, analysis of logs collected on production class supercomputers to identify performance bottlenecks, and application of performance tuning options.We will also describe numerous application use cases and performance improvements.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125052748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Variable-Weight MADM Algorithm for Wireless Network 无线网络的变权MADM算法
Pub Date : 2022-06-27 DOI: 10.1145/3526064.3534115
Ning Li, Xin Yuan, José-Fernán Martínez, Zhaoxin Zhang
In wireless scenarios, the multi-attribute decision-making (MADM) algorithm has been widely used. It can address the multi-objective decision-making issues effectively. However, considering the data flow in wireless network is high-dynamic, continuous, and large-scale, the traditional MADM algorithms are not accurate anymore and the computational complexity is extremely high. To address this problem, in this paper, we propose the variable-weight MADM (vw-MADM) algorithm, which is simple but more effective than previous works. In vw-MADM, when one of the parameters changes, different from the traditional MADM algorithm, only the utility of this parameter needs to be recalculated, the utilities of other candidates are not affected. Based on this innovation, the accuracy is improved while the computational complexity is reduced. Moreover, we also prove the correctness of vw-MADM algorithm, i.e., it is reasonable and effective. Finally, we analyze the computational complexity of both vw-MADM algorithm and traditional MADM algorithm. All the conclusions demonstrate that the proposed vw-MADM algorithm has better performance than the traditional MADM algorithm on accuracy and complexity.
在无线场景中,多属性决策(MADM)算法得到了广泛的应用。它可以有效地解决多目标决策问题。然而,考虑到无线网络中数据流的高动态性、连续性和大规模,传统的MADM算法不再准确,且计算量极高。为了解决这一问题,本文提出了变权MADM (vw-MADM)算法,该算法简单而有效。在vw-MADM算法中,当其中一个参数发生变化时,与传统的MADM算法不同,只需重新计算该参数的效用,其他候选参数的效用不受影响。在此基础上,提高了精度,降低了计算复杂度。此外,我们还证明了vw-MADM算法的正确性,即它是合理和有效的。最后分析了vw-MADM算法和传统MADM算法的计算复杂度。结果表明,本文提出的vw-MADM算法在精度和复杂度上都优于传统的MADM算法。
{"title":"The Variable-Weight MADM Algorithm for Wireless Network","authors":"Ning Li, Xin Yuan, José-Fernán Martínez, Zhaoxin Zhang","doi":"10.1145/3526064.3534115","DOIUrl":"https://doi.org/10.1145/3526064.3534115","url":null,"abstract":"In wireless scenarios, the multi-attribute decision-making (MADM) algorithm has been widely used. It can address the multi-objective decision-making issues effectively. However, considering the data flow in wireless network is high-dynamic, continuous, and large-scale, the traditional MADM algorithms are not accurate anymore and the computational complexity is extremely high. To address this problem, in this paper, we propose the variable-weight MADM (vw-MADM) algorithm, which is simple but more effective than previous works. In vw-MADM, when one of the parameters changes, different from the traditional MADM algorithm, only the utility of this parameter needs to be recalculated, the utilities of other candidates are not affected. Based on this innovation, the accuracy is improved while the computational complexity is reduced. Moreover, we also prove the correctness of vw-MADM algorithm, i.e., it is reasonable and effective. Finally, we analyze the computational complexity of both vw-MADM algorithm and traditional MADM algorithm. All the conclusions demonstrate that the proposed vw-MADM algorithm has better performance than the traditional MADM algorithm on accuracy and complexity.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Technical Session 1
Jerry Chou
{"title":"Session details: Technical Session 1","authors":"Jerry Chou","doi":"10.1145/3545158","DOIUrl":"https://doi.org/10.1145/3545158","url":null,"abstract":"","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126937348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Keynote 会议详情:
Jinoh Kim
{"title":"Session details: Keynote","authors":"Jinoh Kim","doi":"10.1145/3545157","DOIUrl":"https://doi.org/10.1145/3545157","url":null,"abstract":"","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redfish-Nagios: A Scalable Out-of-Band Data Center Monitoring Framework Based on Redfish Telemetry Model Redfish- nagios:基于Redfish遥测模型的可扩展带外数据中心监控框架
Pub Date : 2022-06-27 DOI: 10.1145/3526064.3534108
Ghazanfar Ali, Jon R. Hass, A. Sill, E. Hojati, Tommy Dang, Yong Chen
Current monitoring tools for high-performance computing (HPC) systems are often inefficient in terms of scalability and interfacing with modern data center management APIs. This inefficiency leads to a lack of effective management of infrastructure of modern data centers. Nagios is one of the widely used industry-standard tools for data center infrastructure monitoring, which mainly include monitoring of nodes and associated hardware and software components. However, current Nagios monitoring has special requirements that introduce several limitations. First, a significant human effort is needed for the configuration of monitored nodes in the Nagios server. Second, the Nagios Remote Plugin Executor and the Nagios Service Check Acceptor are required on the Nagios server and each monitored node for active and passive monitoring, respectively. Third, Nagios monitoring also requires monitoring-specific agents on each monitored node. These shortcomings are inherently due to Nagios' in-band implementation nature. To overcome these limitations, we introduced Redfish-Nagios, a scalable out-of-band monitoring tool for modern HPC systems. It integrates the Nagios server with the out-of-band Distributed Management Task Force's Redfish telemetry model, which is implemented in the baseboard management controller of the nodes. This integration eliminates the requirements of any agent, plugin, hardware component, or configuration on the monitored nodes. It is potentially a paradigm shift in Nagios-based monitoring for two reasons. First, it simplifies communication between the Nagios server and monitored nodes. Second, it saves the computational cost by removing the requirements of running complex Nagios-native protocols and agents on the monitored nodes. The Redfish-Nagios integration methodology enables monitoring of next-generation HPC systems using the scalable and modern Redfish telemetry model and interface.
当前用于高性能计算(HPC)系统的监控工具在可伸缩性和与现代数据中心管理api的接口方面通常效率低下。这种低效率导致现代数据中心缺乏对基础设施的有效管理。Nagios是用于数据中心基础设施监视的广泛使用的行业标准工具之一,主要包括监视节点和相关的硬件和软件组件。但是,当前的Nagios监视有一些特殊的需求,从而引入了一些限制。首先,需要大量人力来配置Nagios服务器中受监视的节点。其次,Nagios服务器和每个被监视节点上都需要Nagios远程插件执行器和Nagios服务检查接受器,分别用于主动和被动监视。第三,Nagios监视还需要在每个被监视的节点上都有特定于监视的代理。这些缺点本质上是由于Nagios的带内实现特性造成的。为了克服这些限制,我们引入了Redfish-Nagios,这是一种用于现代HPC系统的可扩展带外监控工具。它将Nagios服务器与带外分布式管理任务组的Redfish遥测模型集成在一起,该模型在节点的基板管理控制器中实现。这种集成消除了对被监视节点上的任何代理、插件、硬件组件或配置的需求。出于两个原因,它可能是基于nagios的监视中的一种范式转变。首先,它简化了Nagios服务器和被监视节点之间的通信。其次,它消除了在被监视节点上运行复杂的nagios原生协议和代理的需求,从而节省了计算成本。Redfish- nagios集成方法可以使用可扩展的现代Redfish遥测模型和接口监控下一代高性能计算系统。
{"title":"Redfish-Nagios: A Scalable Out-of-Band Data Center Monitoring Framework Based on Redfish Telemetry Model","authors":"Ghazanfar Ali, Jon R. Hass, A. Sill, E. Hojati, Tommy Dang, Yong Chen","doi":"10.1145/3526064.3534108","DOIUrl":"https://doi.org/10.1145/3526064.3534108","url":null,"abstract":"Current monitoring tools for high-performance computing (HPC) systems are often inefficient in terms of scalability and interfacing with modern data center management APIs. This inefficiency leads to a lack of effective management of infrastructure of modern data centers. Nagios is one of the widely used industry-standard tools for data center infrastructure monitoring, which mainly include monitoring of nodes and associated hardware and software components. However, current Nagios monitoring has special requirements that introduce several limitations. First, a significant human effort is needed for the configuration of monitored nodes in the Nagios server. Second, the Nagios Remote Plugin Executor and the Nagios Service Check Acceptor are required on the Nagios server and each monitored node for active and passive monitoring, respectively. Third, Nagios monitoring also requires monitoring-specific agents on each monitored node. These shortcomings are inherently due to Nagios' in-band implementation nature. To overcome these limitations, we introduced Redfish-Nagios, a scalable out-of-band monitoring tool for modern HPC systems. It integrates the Nagios server with the out-of-band Distributed Management Task Force's Redfish telemetry model, which is implemented in the baseboard management controller of the nodes. This integration eliminates the requirements of any agent, plugin, hardware component, or configuration on the monitored nodes. It is potentially a paradigm shift in Nagios-based monitoring for two reasons. First, it simplifies communication between the Nagios server and monitored nodes. Second, it saves the computational cost by removing the requirements of running complex Nagios-native protocols and agents on the monitored nodes. The Redfish-Nagios integration methodology enables monitoring of next-generation HPC systems using the scalable and modern Redfish telemetry model and interface.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting Slow Network Transfers in Scientific Computing 预测科学计算中的慢速网络传输
Pub Date : 2022-06-27 DOI: 10.1145/3526064.3534112
Robin Shao, Jinoh Kim, A. Sim, K. Wu
Data access throughput is one of the key performance metrics in scientific computing, particularly for distributed data-intensive applications. While there has been a body of studies focusing on elephant connections that consume a significant fraction of network bandwidth, this study focuses on predicting slow connections that create bottlenecks in distributed workflows. In this study, we analyze network traffic logs collected between January 2019 and May 2021 at National Energy Research Scientific Computing Center (NERSC). Based on the observed patterns from this data collection, we define a set of features to be used for identifying low-performing data transfers. Through extensive feature engineering and feature selection, we identify a number of new features to significantly enhance the prediction performance. With these new features, even the relatively simple decision tree model could predict slow connections with a F1 score as high as 0.945.
数据访问吞吐量是科学计算中的关键性能指标之一,特别是对于分布式数据密集型应用程序。虽然已经有大量的研究集中在消耗大量网络带宽的大象连接上,但本研究的重点是预测在分布式工作流中产生瓶颈的慢连接。在本研究中,我们分析了国家能源研究科学计算中心(NERSC)在2019年1月至2021年5月期间收集的网络流量日志。根据从该数据收集中观察到的模式,我们定义了一组用于识别低性能数据传输的特性。通过广泛的特征工程和特征选择,我们确定了许多新的特征,以显着提高预测性能。有了这些新特征,即使是相对简单的决策树模型也可以预测慢连接,F1得分高达0.945。
{"title":"Predicting Slow Network Transfers in Scientific Computing","authors":"Robin Shao, Jinoh Kim, A. Sim, K. Wu","doi":"10.1145/3526064.3534112","DOIUrl":"https://doi.org/10.1145/3526064.3534112","url":null,"abstract":"Data access throughput is one of the key performance metrics in scientific computing, particularly for distributed data-intensive applications. While there has been a body of studies focusing on elephant connections that consume a significant fraction of network bandwidth, this study focuses on predicting slow connections that create bottlenecks in distributed workflows. In this study, we analyze network traffic logs collected between January 2019 and May 2021 at National Energy Research Scientific Computing Center (NERSC). Based on the observed patterns from this data collection, we define a set of features to be used for identifying low-performing data transfers. Through extensive feature engineering and feature selection, we identify a number of new features to significantly enhance the prediction performance. With these new features, even the relatively simple decision tree model could predict slow connections with a F1 score as high as 0.945.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115341815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Technical Session 2 会议详情:技术会议2
M. Cafaro
{"title":"Session details: Technical Session 2","authors":"M. Cafaro","doi":"10.1145/3545159","DOIUrl":"https://doi.org/10.1145/3545159","url":null,"abstract":"","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Janus 雅努斯
Pub Date : 2022-06-27 DOI: 10.1145/3526064.3534113
E. Kissel
We introduce Janus as a framework designed around exposing container configuration and tuning for high-performance data mover applications. A goal is to minimize complexity and offer a path to rapid service deployment on data transfer node hardware. In this preliminary work, we briefly describe the Janus architecture and use a 100Gbps network testbed deployment to perform a series of disk-to-disk transfers. The results show that Janus provides an optimized container environment for networked applications, and that configuration choices may have a significant impact on the overall observed transfer rate and CPU utilization.
{"title":"Janus","authors":"E. Kissel","doi":"10.1145/3526064.3534113","DOIUrl":"https://doi.org/10.1145/3526064.3534113","url":null,"abstract":"We introduce Janus as a framework designed around exposing container configuration and tuning for high-performance data mover applications. A goal is to minimize complexity and offer a path to rapid service deployment on data transfer node hardware. In this preliminary work, we briefly describe the Janus architecture and use a 100Gbps network testbed deployment to perform a series of disk-to-disk transfers. The results show that Janus provides an optimized container environment for networked applications, and that configuration choices may have a significant impact on the overall observed transfer rate and CPU utilization.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115762757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles 预测网络钓鱼受害:保护和脆弱策略的角色和决策风格
Pub Date : 2022-06-27 DOI: 10.1145/3526064.3534107
Eric Chan-Tin, Loretta J. Stalans, Spencer Johnston, D. Reyes, S. Kennison
Phishing is a common vector for cybercrime and hacking. This research examines participants' personality styles (e.g. decision-making styles, self-control) and the likelihood of falling victim to phishing attacks. Over 300 participants completed an online survey assessing protective and vulnerable strategies, personality styles, trust in people, prior victimization from catphishing or identity theft, and demographics information. Unbeknownst to the participants, 2 to 4 weeks after completing the survey they received a phishing e-mail asking them to click on a link. Individuals with a stronger systematic decision-making style were more likely to have a greater number of protective strategies, and those with greater protective strategies were less likely to be a victim of catphishing and identity theft. Individuals with low avoidant decision-making styles and prior vulnerable strategies were more likely to be phished. These findings suggest that learning protective strategies and not using vulnerable strategies are insufficient to lower substantially the risk of being phished. Training might be improved through considering the match between decision-making styles and the content of the training.
网络钓鱼是网络犯罪和黑客攻击的常见载体。这项研究考察了参与者的个性风格(例如决策风格、自我控制)和成为网络钓鱼攻击受害者的可能性。300多名参与者完成了一项在线调查,评估了保护和易受伤害的策略、个性风格、对他人的信任、之前受到钓鱼或身份盗窃的伤害以及人口统计信息。参与者不知道的是,在完成调查的2到4周后,他们收到了一封网络钓鱼邮件,要求他们点击一个链接。具有更强的系统性决策风格的个体更有可能拥有更多的保护策略,而那些拥有更多保护策略的人更不可能成为钓鱼和身份盗窃的受害者。具有低回避决策风格和先前脆弱策略的个体更容易被钓鱼。这些发现表明,学习保护策略和不使用易受攻击的策略不足以大大降低被钓鱼的风险。通过考虑决策方式与训练内容的匹配,可以提高训练水平。
{"title":"Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles","authors":"Eric Chan-Tin, Loretta J. Stalans, Spencer Johnston, D. Reyes, S. Kennison","doi":"10.1145/3526064.3534107","DOIUrl":"https://doi.org/10.1145/3526064.3534107","url":null,"abstract":"Phishing is a common vector for cybercrime and hacking. This research examines participants' personality styles (e.g. decision-making styles, self-control) and the likelihood of falling victim to phishing attacks. Over 300 participants completed an online survey assessing protective and vulnerable strategies, personality styles, trust in people, prior victimization from catphishing or identity theft, and demographics information. Unbeknownst to the participants, 2 to 4 weeks after completing the survey they received a phishing e-mail asking them to click on a link. Individuals with a stronger systematic decision-making style were more likely to have a greater number of protective strategies, and those with greater protective strategies were less likely to be a victim of catphishing and identity theft. Individuals with low avoidant decision-making styles and prior vulnerable strategies were more likely to be phished. These findings suggest that learning protective strategies and not using vulnerable strategies are insufficient to lower substantially the risk of being phished. Training might be improved through considering the match between decision-making styles and the content of the training.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Access Trends of In-network Cache for Scientific Data 科学数据网内缓存的访问趋势
Pub Date : 2022-05-11 DOI: 10.1145/3526064.3534110
Ruize Han, A. Sim, K. Wu, I. Monga, C. Guok, F. Würthwein, Diego Davila, J. Balcas, Harvey Newman
Scientific collaborations are increasingly relying on large volumes of data for their work and many of them employ tiered systems to replicate the data to their worldwide user communities. Each user in the community often selects a different subset of data for their analysis tasks; however, members of a research group often are working on related research topics that require similar data objects. Thus, there is a significant amount of data sharing possible. In this work, we study the access traces of a federated storage cache known as the Southern California Petabyte Scale Cache. By studying the access patterns and potential for network traffic reduction by this caching system, we aim to explore the predictability of the cache uses and the potential for a more general in-network data caching. Our study shows that this distributed storage cache is able to reduce the network traffic volume by a factor of 2.35 during a part of the study period. We further show that machine learning models could predict cache utilization with an accuracy of 0.88. This demonstrates that such cache usage is predictable, which could be useful for managing complex networking resources such as in-network caching.
科学合作的工作越来越依赖于大量数据,其中许多合作采用分层系统将数据复制到其全球用户社区。社区中的每个用户经常为他们的分析任务选择不同的数据子集;然而,研究小组的成员经常从事需要类似数据对象的相关研究课题。因此,有可能实现大量的数据共享。在这项工作中,我们研究了一个被称为南加州pb级缓存的联邦存储缓存的访问轨迹。通过研究这种缓存系统的访问模式和减少网络流量的潜力,我们的目标是探索缓存使用的可预测性和更通用的网络内数据缓存的潜力。我们的研究表明,在部分研究期间,这种分布式存储缓存能够将网络流量减少2.35倍。我们进一步表明,机器学习模型可以以0.88的精度预测缓存利用率。这表明这种缓存使用是可预测的,这对于管理复杂的网络资源(如网络内缓存)可能很有用。
{"title":"Access Trends of In-network Cache for Scientific Data","authors":"Ruize Han, A. Sim, K. Wu, I. Monga, C. Guok, F. Würthwein, Diego Davila, J. Balcas, Harvey Newman","doi":"10.1145/3526064.3534110","DOIUrl":"https://doi.org/10.1145/3526064.3534110","url":null,"abstract":"Scientific collaborations are increasingly relying on large volumes of data for their work and many of them employ tiered systems to replicate the data to their worldwide user communities. Each user in the community often selects a different subset of data for their analysis tasks; however, members of a research group often are working on related research topics that require similar data objects. Thus, there is a significant amount of data sharing possible. In this work, we study the access traces of a federated storage cache known as the Southern California Petabyte Scale Cache. By studying the access patterns and potential for network traffic reduction by this caching system, we aim to explore the predictability of the cache uses and the potential for a more general in-network data caching. Our study shows that this distributed storage cache is able to reduce the network traffic volume by a factor of 2.35 during a part of the study period. We further show that machine learning models could predict cache utilization with an accuracy of 0.88. This demonstrates that such cache usage is predictable, which could be useful for managing complex networking resources such as in-network caching.","PeriodicalId":183096,"journal":{"name":"Fifth International Workshop on Systems and Network Telemetry and Analytics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Fifth International Workshop on Systems and Network Telemetry and Analytics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1