Visible to the public A Security Analysis Method for Supercomputing Users \#x2019; Behavior

TitleA Security Analysis Method for Supercomputing Users \#x2019; Behavior
Publication TypeConference Paper
Year of Publication2017
AuthorsZhu, G., Zeng, Y., Guo, M.
Conference Name2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)
ISBN Number978-1-5090-6644-5
Keywordsaudit policy, business data processing, Collaboration, complete user behavior path restoration, Correlation, Correlation analysis, human factors, Linux, log analysis, mainframes, mass storage, Operating systems, operation records, policy-based governance, Protocols, pubcrawl, resource use tracking, security, security analysis method, security incident detection, security level improvement, security level optimization, security of data, Security Policies Analysis, supercomputer, Supercomputers, supercomputing business process, supercomputing user behavior, Virtual private networks
Abstract

Supercomputers are widely applied in various domains, which have advantage of high processing capability and mass storage. With growing supercomputing users, the system security receives comprehensive attentions, and becomes more and more important. In this paper, according to the characteristics of supercomputing environment, we perform an in-depth analysis of existing security problems in the process of using resources. To solve these problems, we propose a security analysis method and a prototype system for supercomputing users' behavior. The basic idea is to restore the complete users' behavior paths and operation records based on the supercomputing business process and track the use of resources. Finally, the method is evaluated and the results show that the security analysis method of users' behavior can help administrators detect security incidents in time and respond quickly. The final purpose is to optimize and improve the security level of the whole system.

URLhttps://ieeexplore.ieee.org/document/7987211/
DOI10.1109/CSCloud.2017.19
Citation Keyzhu_security_2017