首页 > 最新文献

Proceedings of the 12th International Conference on Management of Digital EcoSystems最新文献

英文 中文
Event Management and Monitoring Framework for HPC Environments using ServiceNow and Prometheus 使用ServiceNow和Prometheus的HPC环境事件管理和监控框架
Nitin Sukhija, Elizabeth Bautista, Owen James, Daniel Gens, Siqi Deng, Yu Lam, Tony Quan, Basil Lalli
The challenge of monitoring and event response management of a high performance computing facility grows significantly as the facilities employs and orchestrates more complex and heterogeneous systems and infrastructure. As the computational components encompassing the HPC facility system increases, the computational staff experiences rise in alert fatigue due to the false alarms and noise related to the similar events generated by monitoring tools. The National Energy Research Scientific Computing Center (NERSC) at the Lawrence Berkeley National Laboratory (LBNL) has begun to address the issues of duplication of alerts and alert remediation. However, more automation and integration is needed for collecting, aggregating, correlating, analyzing, managing and visualizing the scale of events that will be generated by the emergent hybrid computing infrastructures. In this paper, we present an event management and monitoring framework that addresses the operational needs of the future pre-exascale systems at the Lawrence Berkeley National Laboratory's National Energy Research Scientific Computing Center (NERSC). The framework integrates the Operations Monitoring and Notification Infrastructure (OMNI) at NERSC with the Prometheus, Grafana and ServiceNow platforms to help identify, diagnose, and resolve incidents in real-time, as well as conduct more thorough post-incident reviews enabled by the intuitive dashboards that provides a single pane of glass console for an efficient operations management and real-time proactive monitoring.
随着高性能计算设施采用和编排更复杂的异构系统和基础设施,监视和事件响应管理的挑战显著增加。随着包含高性能计算设施系统的计算组件的增加,由于与监控工具产生的类似事件相关的假警报和噪声,计算人员的警报疲劳增加。位于劳伦斯伯克利国家实验室(LBNL)的国家能源研究科学计算中心(NERSC)已经开始解决警报重复和警报修复的问题。然而,需要更多的自动化和集成来收集、聚合、关联、分析、管理和可视化事件规模,这些事件将由新兴的混合计算基础设施产生。在本文中,我们提出了一个事件管理和监控框架,以解决劳伦斯伯克利国家实验室国家能源研究科学计算中心(NERSC)未来pre-exascale系统的操作需求。该框架将NERSC的运营监控和通知基础设施(OMNI)与Prometheus、Grafana和ServiceNow平台集成在一起,帮助实时识别、诊断和解决事件,并通过直观的仪表板进行更彻底的事件后审查,仪表板提供了一个单一的玻璃控制台,用于高效的运营管理和实时主动监控。
{"title":"Event Management and Monitoring Framework for HPC Environments using ServiceNow and Prometheus","authors":"Nitin Sukhija, Elizabeth Bautista, Owen James, Daniel Gens, Siqi Deng, Yu Lam, Tony Quan, Basil Lalli","doi":"10.1145/3415958.3433046","DOIUrl":"https://doi.org/10.1145/3415958.3433046","url":null,"abstract":"The challenge of monitoring and event response management of a high performance computing facility grows significantly as the facilities employs and orchestrates more complex and heterogeneous systems and infrastructure. As the computational components encompassing the HPC facility system increases, the computational staff experiences rise in alert fatigue due to the false alarms and noise related to the similar events generated by monitoring tools. The National Energy Research Scientific Computing Center (NERSC) at the Lawrence Berkeley National Laboratory (LBNL) has begun to address the issues of duplication of alerts and alert remediation. However, more automation and integration is needed for collecting, aggregating, correlating, analyzing, managing and visualizing the scale of events that will be generated by the emergent hybrid computing infrastructures. In this paper, we present an event management and monitoring framework that addresses the operational needs of the future pre-exascale systems at the Lawrence Berkeley National Laboratory's National Energy Research Scientific Computing Center (NERSC). The framework integrates the Operations Monitoring and Notification Infrastructure (OMNI) at NERSC with the Prometheus, Grafana and ServiceNow platforms to help identify, diagnose, and resolve incidents in real-time, as well as conduct more thorough post-incident reviews enabled by the intuitive dashboards that provides a single pane of glass console for an efficient operations management and real-time proactive monitoring.","PeriodicalId":198419,"journal":{"name":"Proceedings of the 12th International Conference on Management of Digital EcoSystems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Thing Mutation as a Countermeasure to Safeguard IoT 物变异:保护物联网的对策
B. Banihashemi, Z. Maamar, Noura Faci, E. Ugljanin
In the Internet of Things (IoT), mutation aims to enhance functionality and survivability of a thing in the context of dynamic environments by allowing the thing to satisfy a need or seize a potential opportunity. In this paper, we propose a framework based on thing mutation as a countermeasure to certain security threats that could impact things' operations (e.g., sensing and communicating). We then provide a case study which focuses on battery draining attack and propose a mutation-based strategy as a countermeasure to this attack.
在物联网(IoT)中,突变旨在通过允许事物满足需求或抓住潜在机会来增强事物在动态环境中的功能和生存能力。在本文中,我们提出了一个基于事物突变的框架,作为可能影响事物运行的某些安全威胁(例如,传感和通信)的对策。然后,我们提供了一个针对电池耗尽攻击的案例研究,并提出了一种基于突变的策略作为这种攻击的对策。
{"title":"Thing Mutation as a Countermeasure to Safeguard IoT","authors":"B. Banihashemi, Z. Maamar, Noura Faci, E. Ugljanin","doi":"10.1145/3415958.3433033","DOIUrl":"https://doi.org/10.1145/3415958.3433033","url":null,"abstract":"In the Internet of Things (IoT), mutation aims to enhance functionality and survivability of a thing in the context of dynamic environments by allowing the thing to satisfy a need or seize a potential opportunity. In this paper, we propose a framework based on thing mutation as a countermeasure to certain security threats that could impact things' operations (e.g., sensing and communicating). We then provide a case study which focuses on battery draining attack and propose a mutation-based strategy as a countermeasure to this attack.","PeriodicalId":198419,"journal":{"name":"Proceedings of the 12th International Conference on Management of Digital EcoSystems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Pipeline for Reusing Pretrained Models 重用预训练模型的机器学习管道
M. Alshehhi, Di Wang
Machine learning methods have proven to be effective in analyzing vast amounts of data in various formats to obtain patterns, detect trends, gain insight, and predict outcomes based on historical data. However, training models from scratch across various real-world applications is costly in terms of both time and data consumption. Model adaptation (Domain Adaptation) is a promising methodology to tackle this problem. It can reuse the knowledge embedded in an existing model to train another model. However, model adaptation is a challenging task due to dataset bias or domain shift. In addition, data access from both the original (source) domain and the destination (target) domain is often an issue in the real world, due to data privacy and cost issues (gathering additional data may cost money). Several domain adaptation algorithms and methodologies have introduced in recent years; they reuse trained models from one source domain for a different but related target domain. Many existing domain adaptation approaches aim at modifying the trained model structure or adjusting the latent space of the target domain using data from the source domain. Domain adaptation techniques can be evaluated over several criteria, namely, accuracy, knowledge transfer, training time, and budget. In this paper, we start from the notion that in many real-world scenarios, the owner of the trained model restricts access to the model structure and the source dataset. To solve this problem, we propose a methodology to efficiently select data from the target domain (minimizing consumption of target domain data) to adapt the existing model without accessing the source domain, while still achieving acceptable accuracy. Our approach is designed for supervised and semi-supervised learning and extendable to unsupervised learning.
事实证明,机器学习方法在分析各种格式的大量数据以获取模式、检测趋势、获得洞察力和基于历史数据预测结果方面是有效的。然而,从时间和数据消耗的角度来看,在各种实际应用程序中从头开始训练模型是非常昂贵的。模型自适应(域自适应)是解决这一问题的一种很有前途的方法。它可以重用嵌入在现有模型中的知识来训练另一个模型。然而,由于数据集偏差或域移位,模型自适应是一项具有挑战性的任务。此外,由于数据隐私和成本问题(收集额外的数据可能需要花钱),从原始(源)域和目的地(目标)域访问数据在现实世界中经常是一个问题。近年来介绍了几种领域自适应算法和方法;他们为不同但相关的目标领域重用来自一个源领域的训练模型。现有的许多领域自适应方法都是利用源领域的数据来修改训练好的模型结构或调整目标领域的潜在空间。领域自适应技术可以根据几个标准进行评估,即准确性、知识转移、培训时间和预算。在本文中,我们从这样的概念出发,即在许多现实场景中,训练模型的所有者限制对模型结构和源数据集的访问。为了解决这一问题,我们提出了一种方法,在不访问源域的情况下,有效地从目标域中选择数据(最小化目标域数据的消耗)以适应现有模型,同时仍然达到可接受的精度。我们的方法是为监督学习和半监督学习设计的,并可扩展到无监督学习。
{"title":"Machine Learning Pipeline for Reusing Pretrained Models","authors":"M. Alshehhi, Di Wang","doi":"10.1145/3415958.3433054","DOIUrl":"https://doi.org/10.1145/3415958.3433054","url":null,"abstract":"Machine learning methods have proven to be effective in analyzing vast amounts of data in various formats to obtain patterns, detect trends, gain insight, and predict outcomes based on historical data. However, training models from scratch across various real-world applications is costly in terms of both time and data consumption. Model adaptation (Domain Adaptation) is a promising methodology to tackle this problem. It can reuse the knowledge embedded in an existing model to train another model. However, model adaptation is a challenging task due to dataset bias or domain shift. In addition, data access from both the original (source) domain and the destination (target) domain is often an issue in the real world, due to data privacy and cost issues (gathering additional data may cost money). Several domain adaptation algorithms and methodologies have introduced in recent years; they reuse trained models from one source domain for a different but related target domain. Many existing domain adaptation approaches aim at modifying the trained model structure or adjusting the latent space of the target domain using data from the source domain. Domain adaptation techniques can be evaluated over several criteria, namely, accuracy, knowledge transfer, training time, and budget. In this paper, we start from the notion that in many real-world scenarios, the owner of the trained model restricts access to the model structure and the source dataset. To solve this problem, we propose a methodology to efficiently select data from the target domain (minimizing consumption of target domain data) to adapt the existing model without accessing the source domain, while still achieving acceptable accuracy. Our approach is designed for supervised and semi-supervised learning and extendable to unsupervised learning.","PeriodicalId":198419,"journal":{"name":"Proceedings of the 12th International Conference on Management of Digital EcoSystems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bot-Detective: An explainable Twitter bot detection service with crowdsourcing functionalities bot - detective:一个可解释的Twitter bot检测服务,具有众包功能
Maria Kouvela, Ilias Dimitriadis, A. Vakali
Popular microblogging platforms (such as Twitter) offer a fertile ground for open communication among humans, however, they also attract many bots and automated accounts "disguised" as human users. Typically, such accounts favor malicious activities such as phishing, public opinion manipulation and hate speech spreading, to name a few. Although several AI driven bot detection methods have been implemented, the justification of bot classification and characterization remains quite opaque and AI decisions lack in ethical responsibility. Most of these approaches operate with AI black-boxed algorithms and their efficiency is often questionable. In this work we propose Bot-Detective, a web service that takes into account both the efficient detection of bot users and the interpretability of the results as well. Our main contributions are summarized as follows: i) we propose a novel explainable bot-detection approach, which, to the best of authors' knowledge, is the first one to offer interpretable, responsible, and AI driven bot identification in Twitter, ii) we deploy a publicly available bot detection Web service which integrates an explainable ML framework along with users feedback functionality under an effective crowdsourcing mechanism; iii) we build the proposed service under a newly created annotated dataset by exploiting Twitter's rules and existing tools. This dataset is publicly shared for further use. In situ experimentation has showcased that Bot-Detective produces comprehensive and accurate results, with a promising service take up at scale.
流行的微博平台(如Twitter)为人类之间的公开交流提供了肥沃的土壤,然而,它们也吸引了许多“伪装”成人类用户的机器人和自动账户。通常情况下,这些账户支持恶意活动,如网络钓鱼、舆论操纵和仇恨言论传播等。尽管已经实施了几种人工智能驱动的机器人检测方法,但机器人分类和表征的理由仍然相当不透明,人工智能决策缺乏道德责任。这些方法大多使用人工智能黑盒算法,其效率经常受到质疑。在这项工作中,我们提出了bot - detective,这是一种既考虑到bot用户的有效检测又考虑到结果的可解释性的web服务。我们的主要贡献总结如下:i)我们提出了一种新颖的可解释的机器人检测方法,据作者所知,这是第一个在Twitter上提供可解释的、负责任的和人工智能驱动的机器人识别的方法,ii)我们部署了一个公开可用的机器人检测Web服务,该服务在有效的众包机制下集成了一个可解释的ML框架以及用户反馈功能;iii)我们利用Twitter的规则和现有工具,在新创建的带注释的数据集下构建提议的服务。此数据集公开共享以供进一步使用。现场实验表明,Bot-Detective可以产生全面而准确的结果,并具有大规模应用的前景。
{"title":"Bot-Detective: An explainable Twitter bot detection service with crowdsourcing functionalities","authors":"Maria Kouvela, Ilias Dimitriadis, A. Vakali","doi":"10.1145/3415958.3433075","DOIUrl":"https://doi.org/10.1145/3415958.3433075","url":null,"abstract":"Popular microblogging platforms (such as Twitter) offer a fertile ground for open communication among humans, however, they also attract many bots and automated accounts \"disguised\" as human users. Typically, such accounts favor malicious activities such as phishing, public opinion manipulation and hate speech spreading, to name a few. Although several AI driven bot detection methods have been implemented, the justification of bot classification and characterization remains quite opaque and AI decisions lack in ethical responsibility. Most of these approaches operate with AI black-boxed algorithms and their efficiency is often questionable. In this work we propose Bot-Detective, a web service that takes into account both the efficient detection of bot users and the interpretability of the results as well. Our main contributions are summarized as follows: i) we propose a novel explainable bot-detection approach, which, to the best of authors' knowledge, is the first one to offer interpretable, responsible, and AI driven bot identification in Twitter, ii) we deploy a publicly available bot detection Web service which integrates an explainable ML framework along with users feedback functionality under an effective crowdsourcing mechanism; iii) we build the proposed service under a newly created annotated dataset by exploiting Twitter's rules and existing tools. This dataset is publicly shared for further use. In situ experimentation has showcased that Bot-Detective produces comprehensive and accurate results, with a promising service take up at scale.","PeriodicalId":198419,"journal":{"name":"Proceedings of the 12th International Conference on Management of Digital EcoSystems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115640030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
Proceedings of the 12th International Conference on Management of Digital EcoSystems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1