高性能计算环境中网络活动的数据分析

L. Ji, S. Kolhe, A. Clark
{"title":"高性能计算环境中网络活动的数据分析","authors":"L. Ji, S. Kolhe, A. Clark","doi":"10.1109/UEMCON.2017.8249003","DOIUrl":null,"url":null,"abstract":"High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Data analysis of cyber-activity within high performance computing environments\",\"authors\":\"L. Ji, S. Kolhe, A. Clark\",\"doi\":\"10.1109/UEMCON.2017.8249003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.\",\"PeriodicalId\":403890,\"journal\":{\"name\":\"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON.2017.8249003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON.2017.8249003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

高性能计算(HPC)环境正在成为日常使用的标准。然而,这些系统的弹性是值得怀疑的,因为它们复杂的基础设施使得故障的位置和原因的故障排除非常困难。同样的原因使HPCs易于产生毒性活动。本文提出了一个数据分析框架,用于分析恶意活动导致的故障观测范围。考虑到内部可靠性基础设施,将数据网络外推作为一种预处理工具来执行,以准确计算归一化故障率。接下来,考虑到幅度、增长率和中点行为,对观测谱进行非线性回归。此外,还进行了考虑外围观测值的影响分析。使用模拟的超级计算建模和仿真框架的经验结果显示,在表征性能方面有所改善,其中大约91%的节点被正确表征。这项工作的结果可以应用于在超级计算架构中开发健壮的任务调度框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Data analysis of cyber-activity within high performance computing environments
High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automated facial expression recognition app development on smart phones using cloud computing Outage probability and system optimization of SSD-based dual-hop relaying system with multiple relays LTE fallback optimization using decision tree Bio-medical image enhancement using hybrid metaheuristic coupled soft computing tools Study of a parallel algorithm on pipelined computation of the finite difference schemes on FPGA
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1