A Security Analysis Method for Supercomputing Users \#x2019; Behavior
Title | A Security Analysis Method for Supercomputing Users \#x2019; Behavior |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zhu, G., Zeng, Y., Guo, M. |
Conference Name | 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) |
ISBN Number | 978-1-5090-6644-5 |
Keywords | audit policy, business data processing, Collaboration, complete user behavior path restoration, Correlation, Correlation analysis, human factors, Linux, log analysis, mainframes, mass storage, Operating systems, operation records, policy-based governance, Protocols, pubcrawl, resource use tracking, security, security analysis method, security incident detection, security level improvement, security level optimization, security of data, Security Policies Analysis, supercomputer, Supercomputers, supercomputing business process, supercomputing user behavior, Virtual private networks |
Abstract | Supercomputers are widely applied in various domains, which have advantage of high processing capability and mass storage. With growing supercomputing users, the system security receives comprehensive attentions, and becomes more and more important. In this paper, according to the characteristics of supercomputing environment, we perform an in-depth analysis of existing security problems in the process of using resources. To solve these problems, we propose a security analysis method and a prototype system for supercomputing users' behavior. The basic idea is to restore the complete users' behavior paths and operation records based on the supercomputing business process and track the use of resources. Finally, the method is evaluated and the results show that the security analysis method of users' behavior can help administrators detect security incidents in time and respond quickly. The final purpose is to optimize and improve the security level of the whole system. |
URL | https://ieeexplore.ieee.org/document/7987211/ |
DOI | 10.1109/CSCloud.2017.19 |
Citation Key | zhu_security_2017 |
- Protocols
- Virtual private networks
- supercomputing user behavior
- supercomputing business process
- Supercomputers
- supercomputer
- Security Policies Analysis
- security of data
- security level optimization
- security level improvement
- security incident detection
- security analysis method
- security
- resource use tracking
- pubcrawl
- audit policy
- policy-based governance
- operation records
- operating systems
- mass storage
- mainframes
- log analysis
- Linux
- Human Factors
- Correlation analysis
- Correlation
- complete user behavior path restoration
- collaboration
- business data processing