ebook img

Cybersecurity and High-Performance Computing Environments PDF

395 Pages·2022·14.569 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cybersecurity and High-Performance Computing Environments

Cybersecurity and High-Performance Computing Environments Cybersecurity and High-Performance Computing Environments Integrated Innovations, Practices, and Applications Edited by Kuan-Ching Li Nitin Sukhija Elizabeth Bautista Jean-Luc Gaudiot FirstEditionpublished2022 byCRCPress 6000BrokenSoundParkwayNW,Suite300,BocaRaton,FL33487-2742 andbyCRCPress 4ParkSquare,MiltonPark,Abingdon,Oxon,OX144RN CRC Press is an imprint of Taylor & Francis Group, LLC ©2022selectionandeditorialmatter,Kuan-ChingLi,NitinSukhija,ElizabethBautista, andJean-LucGaudiot;individualchapters,thecontributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequencesoftheiruse.Theauthorsandpublishershaveattemptedtotracethecopyright holdersofallmaterialreproducedinthispublicationandapologizetocopyrightholdersif permissiontopublishinthisformhasnotbeenobtained.Ifanycopyrightmaterialhasnot beenacknowledgedpleasewriteandletusknowsowemayrectifyinanyfuturereprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission fromthepublishers. For permission to photocopy or use material electronically from this work, access www.copyright.comorcontacttheCopyrightClearanceCenter,Inc.(CCC),222Rosewood Drive,Danvers,MA01923,978-750-8400.ForworksthatarenotavailableonCCCplease [email protected]. Trademarknotice:Productorcorporatenamesmaybetrademarksorregisteredtrademarks andareusedonlyforidentificationandexplanationwithoutintenttoinfringe. Library of Congress Cataloging-in-Publication Data Names:Li,Kuan-Ching,editor.|Sukhija,Nitin,editor.| Bautista,Elizabeth(Computerscientist),editor.|Gaudiot,Jean-Luc,editor. Title:Cybersecurityandhigh-performancecomputingenvironments: integratedinnovations,practices,andapplications/editedby Kuan-ChingLi,NitinSukhija,ElizabethBautista,Jean-LucGaudiot. Description:Firstedition.|BocaRaton,FL:CRCPress,2022.| Includesbibliographicalreferencesandindex. Identifiers:LCCN2021049599|ISBN9780367711504(hbk)| ISBN9780367740368(pbk)|ISBN9781003155799(ebk) Subjects:LCSH:Highperformancecomputing.|Computersecurity–Data processing.|Highperformancecomputing–Securitymeasures. Classification:LCCQA76.88.C932022|DDC004.1/1–dc23/eng/20211213 LCrecordavailableathttps://lccn.loc.gov/2021049599 ISBN:978-0-367-71150-4(hbk) ISBN:978-0-367-74036-8(pbk) ISBN:978-1-003-15579-9(ebk) DOI:10.1201/9781003155799 TypesetinMinion bycodeMantra Contents PREFACE vii EDITORS xiii CONTRIBUTORS xvii hapter C 1■ CybersecurityandHigh-PerformanceComputing Ecosystems: Opportunities and Challenges 1 NitinSukhija,ElizabethBautista,andKunjChampaneri hapter C 2■ ApproachestoWorkingwithLarge-ScaleGraphs for Cybersecurity Applications 31 NoahL.Schrick,MingLi,JohnHale,andPeterJ.Hawrylak hapter C 3■ OMNI at the Edge 63 ElizabethBautista,NitinSukhija,MelissaRomanus, ThomasDavis,andCaryWhitney hapter C 4■ OptimizedVoronoi-BasedAlgorithmsforParallel Shortest Vector Computation 85 ArturMariano,FilipeCabeleira,Lu´ısPauloSantos, andGabrielFalc˜ao hapter C 5■ Attribute-Based Secure Keyword Search for Cloud Computing 123 HuiYin,YuZhang,FangminLi,andKeqinLi hapter C 6■ Understanding Cybersecurity Risk in FMI Using HPC 151 GurdipKaur,ZibaHabibiLashkari,andArashHabibiLashkari v vi ■ Contents hapter C 7■ Live Migration in HPC 191 AnilKumarGupta,AmarjeetSharma,AditiPandey,KaustubhPatil, andSanskarSharma hapter C 8■ Security-Aware Real-Time Transmission for Automotive CAN-FD Networks 229 RuiqiLu,GuoqiXie,JunqiangJiang,RenfaLi,andKeqinLi hapter C 9■ OntoEnricher: A Deep Learning Approach for Ontology Enrichment from Unstructured Text 261 LalitMohanSanagavarapu,VivekIyer,andY.RaghuReddy hapter C 10■ Intelligent Connected Vehicles 285 WufeiWu,RyoKurachi,GangZeng,YuhaoWang, HiroakiTakada,andKeqinLi hapter C 11■ Toward Robust Deep Learning Systems against Deepfake for Digital Forensics 309 HongmeiChiandMingmingPeng hapter C 12■ MonitoringHPCSystemsagainstCompromised SSH 333 LevLafayette,NarendraChinnam,andTimothyRice Index 355 Preface In this fast-paced global economy, academia and industry must innovate to evolve and succeed. Today’s researchers and industry experts are seeking transformative technologies to meet the challenges of tomorrow. The cutting-edge technological advances in cybersecurity solutions aid in enabling the security of complex heterogeneous high- performance computing environments. On the other hand, high- performance computing power facilitates powerful and intelligent innovative models for reducing time to response to identify and resolve a multitude of potential, newly emerging cyberattacks. This book provides a collection of the current and emergent research innovations, practices, and applications focusing on the interdependence of cybersecurity and high-performance computing domains for discovering and resolving new emerging cyber-threats. In the following, we will describe the chapters contained in the book. Chapter 1, “Cybersecurity and High-Performance Computing Ecosystems: Opportunities and Challenges,” by Sukhija et al., focuses on efective cybersecurity solutions to protect current and emergent high-performance computing (HPC) ecosystems comprising users, data, infrastructure, and applications supporting scientifc research. Although, as we move toward the exascale future and beyond, the emerging superfacility frameworks are combining the experimental and observational facilities with high-performance computing centers, the new convergent computing platforms, along with a paradigm shift in programming applications leveraging these platforms, increasingly open the HPC ecosystems to a myriad of security risks. Intending to reduce the downtime of HPC ecosystems in the presence of unpre- dictable loads and malicious attacks, this chapter covers cybersecurity challenges and solutions, which, when combined efectively, will aid in proactively rearchitecting the current and emergent HPC ecosystems comprising users, data, infrastructure, and applications to delay or vii viii ■ Preface counteract the scale of malicious attacks and to reduce their impacts and consequences. Chapter 2, “Approaches to Working with Large-Scale Graphs for CyberSecurity Applications,” by Hawrylak et al., covers the graph techniques useful for compliance violation and cybersecurity attack prediction in the lens of high-performance computing. Graphs are a standard tool in cybersecurity evaluation and analytics. First, the au- thors discuss the attack graphs and dependency graphs, which are two common approaches in cybersecurity where the analysis of the attack and dependency graphs describes the system’s security posture, includ- ing the system’s attack surface. Next, the authors explain the potential attack scenarios that can be extracted from attack graphs. This chapter concludes with a survey of techniques useful for handling large-scale graphs, methodologies, and strategies for increasing the performance and ends with insights into future needs and directions in this area. Chapter 3, “OMNI at the Edge,” by Bautista et al., discusses the high-availability Operations Monitoring and Notifcation Infrastruc- ture (OMNI) hosted at the Department of Energy’s (DOE) National Energy Research Scientifc Computing Center (NERSC) and its use of the state-of-the-art edge computing technologies for collecting, analyzing, and securing extremely high-volume, continuous 24 × 7 data in near-real-time. The authors then detail how data security is achieved not only from each staf who owns the data, but also through various devices and networks. Then, the chapter highlights the internal and external access policies and the plan to make these data available to the public for crowdsourcing analysis. Furthermore, the authors provide use cases that demonstrate how the availability of OMNI data has benefted the overall NERSC data center from facilities & machine perspective as well as from a cybersecurity standpoint. Finally, an outline of ongoing and future work is given, including upgrades being made to the data warehouse for the upcoming Perlmutter supercomputer – a system that will be 3–4× the size of ours. Chapter 4, “Optimized Voronoi-Based Algorithms for Parallel Shortest Vector Computation,” by Gabriel Falc˜ao et al., addresses Voronoi cell-based algorithms, solving the shortest vector problem, a fundamental challenge in lattice-based cryptanalysis. First, the chapter introduces several optimizations based on pruning to reduce the original algorithm’s execution time. Then, the authors illustrate the algorithm’s suitability for parallel execution on both CPUs and GPUs, where speeds up to 69× are observed. The authors then Preface ■ ix demonstrate using a pre-process sorting step, which requires storing the norm ordered target vectors and signifcantly more memory, where speedup increases to 77×. Finally, the chapter concludes by optimizing the algorithm that exhibits linear scalability on a CPU with up to 28 threads and keeps scaling, at a lower rate, with simultaneous multithreading up to 56 threads. Chapter 5, “Attribute-Based Secure Keyword Search for Cloud Computing,” by Hui Yin et al., presents the attribute-based keyword search (ABKS) that provides the feasibility to simultaneously achieve data searching and fne-grained access control over encrypted data, which is applied to the cloud computing environment characterized by data storage and sharing. In this chapter, the authors frst introduce the fundamental techniques for achieving the ABKS scheme, such as the necessary components used in the attributed-based encryption. Then, by several existing ABKS schemes, the authors describe how to design a practical and efcient ABKS construction in the cloud computing environment. Further, the authors show some interesting experimental results to explain the key factors afecting the search complexity in ABKS schemes and present some ideas to design an efcient and high-performance ABKS scheme. Chapter 6, “Understanding Cybersecurity Risk in FMI Using HPC,” by Gurdip Kaur et al., examines the importance of the fnancial market infrastructure and elaborates its essential components used to handle fnancial transactions and their security. The chapter explores high-performance computing (HPC) and its integration to FMIs to transform the fnancial industry by speeding up fnancial activities in the business and reducing fraudulent transactions. Moreover, the authors provide a descriptive and visual mapping of fnancial risks with identifed cybersecurity issues. The chapter concludes by detailing the cybersecurity risks faced by FMIs with comprehensive details on risk assessment, analysis, monitoring, reporting, and mitigation. Chapter 7, “Live Migration in HPC,” by Anil Kumar Gupta et al., presents the basics of live migration and its needs, applications, security aspects, and role in HPC (high-performance computing) and then proceeds with discussing two of the live migration approaches – live virtual machine (VM) migration and live container migration. Next, the authors discuss the challenges in this approach and then review the security aspects. The authors detail the second approach, live container migration, followed by understanding the performance measures and issues and comparative analysis of the two methods.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.