A Security Monitoring Framework For Virtualization Based HEP Infrastructures

04/16/2017
by   A. Gomez Ramirez, et al.
0

High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware. This malware was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.

READ FULL TEXT

page 2

page 3

page 5

page 7

research
01/12/2018

Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput Computing

Grid computing systems require innovative methods and tools to identify ...
research
04/20/2017

Intrusion Prevention and Detection in Grid Computing - The ALICE Case

Grids allow users flexible on-demand usage of computing resources throug...
research
11/29/2018

Using ATLAS@Home to exploit extra CPU from busy grid sites

Grid computing typically provides most of the data processing resources ...
research
10/15/2022

How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely ...
research
10/05/2020

An Easy-to-Use-and-Deploy Grid Computing Framework

A few grid-computing tools are available for public use. However, such s...
research
05/30/2019

Dashboard Task Monitor for Managing ATLAS User Analysis on the Grid

The organization of the distributed user analysis on the Worldwide LHC C...

Please sign up or login with your details

Forgot password? Click here to reset