NCSA CyberSecurity Team Awarded NSF Grants

January 21, 2016

Jan. 21 — In a span of 24 hours, The CyberSecurity team at the NCSA received news on four grants—two for continuing work, and two for starting new projects.

At the beginning of September, Alex Withers, senior security engineer for the CyberSecurity team, was awarded a $499,136 grant from the National Science Foundation (NSF) to build a tool to detect malicious activity. Designed to fit inside an existing security environment, the tool consumes security logs and examines separate events that may have led up to malicious activity.

For example, if a desktop reaches out remotely to another computer, it might not be malicious activity. However, if someone received a suspicious email, downloaded a program from the email, and then experienced their desktop reaching out to another computer, it could be suspicious.

Withers acknowledges that it can be hard to link events that are seemingly unrelated, and more difficult to link them correctly without being influenced by confirmation bias. The tool, called “AttackTagger,” is meant to make it easier to link events without getting false results.

The tool stems from research by professor of electrical and computer engineering Ravi Iyer’s DEPEND group, providing a practical application for the data and research.

“It’s a great idea to transform research into a tool readily deployed,” Withers says.

The research was the result of a five-year span of data taken from the NCSA’s incident reports written by security analysts. In those, analysts went back after the fact, looked at the logs of events that occurred and determined what events happened in sequence. The DEPEND group used NCSA’s data in their research and development of the AttackTagger tool.

Eric Badger, a graduate student working with DEPEND, works on architecture for data flow, or a pipeline, to help confirm that AttackTagger works well. The attack detection happens in real time, as the events move from the host and network through the pipeline, where they end up in attack detection software. While the previous research dealt with an ideal set of events, Badger’s current research deals with practical, real-world events.

“We might not get exactly the same false-positive and true-positive levels that we had in our previous research,” Badger says. “But we’re hoping for at least something that is fairly manageable, and that we can improve on in a real world setting.”

One thing that Badger made sure of was that the source code for the pipeline architecture was open source, or available for anyone to look at or change.

“You can take this system and mold it to be your own easily, instead of taking this prepackaged, ‘take-it-or-leave-it’ kind of thing,” Badger says.

Withers, along with Integrated CyberInfrastructure director Randal Butler and CyberSecurity director Adam Slagell, received a $499,206 grant to create Science DMZ Actionable Intelligence Appliance (SDAIA), which enhances the security infrastructure of open science networks.

The Science DMZ model benefits universities in how it allows them to transfer large amounts of data without firewalls or other devices in the way.

SDAIA will help keep those open networks secure.

Since some universities may be able to share computing capabilities but have limited IT departments, so SDAIA keeps the front part of the network secure. One part is through a honeypot, a mechanism that lures attackers in and then uses the information gathered against them. The other part is how it benefits universities by sharing data about attacks, which can alert other sites of threats.

By sharing data, SDAIA allows researchers to possibly see patterns in the attacks. Through this, it provides the opportunity to strengthen the security of sites and lets researchers be able to focus on more important things.

“What Science DMZ protects are mainly networks to facilitate science. If they’re not secured, it ends up disrupting resources, spending more time preventing attacks, which prevents the science from flowing,” Withers says.

Slagell notes that the SDAIA and the Science DMZ are both small pieces of a bigger puzzle.

“The Science DMZ is helping to remove bottlenecks in science, and we’re helping to secure (the Science DMZ) so that those resources are available and people start making use of them and connecting these together,” Slagell said. “It’s part of a larger goal for NSF, building up this infrastructure and building out across the nation, investing in it. It’s part of a longer story.”

The other grants allowed senior research scientist Jim Basney to continue work on CILogon and the Center for Trustworthy Scientific Cyberinfrastructure (CTSC).

Awarded a $499,973 grant, CILogon 2.0 is a project that works to allow researchers to access online resources like supercomputers, wikis and data stores by using their campus credentials. It allows scientists to spend less time on setting up security and identity verification systems and more time on their scientific collaboration. The CILogon project began in September of 2009, and CILogon 2.0 is the “next generation of CILogon,” says Basney.

In addition to taking the project to an international level, Basney is also utilizing COManage to manage groups of researchers and let researchers “define the membership of their collaboration.” Basney is working with the COManage experts at Spherical Cow Group on this aspect of the project.

For example, if a researcher used CILogon, it can tell who the person is, but won’t know if they’re a member of a group, which is needed to allow data sharing with the other people in that group.

“Projects that are using the current CILogon are required to provide their own group management capability, but when we bring COManage into CILogon 2.0, then we give them a bundled solution so that they get the identity and group management together.”

The other project that Basney is part of—CTSC—was started in October of 2012. The NSF awarded the project a follow-on grant of $4,999,709 to continue for another three years. Of that total grant, $1,374,035 is budgeted for the NCSA.

The CTSC project, led by Indiana University in partnership with NCSA, Pittsburgh Supercomputing Center, and University of Wisconsin, aims to help other NSF projects improve their security.

The CTSC works with projects to develop security plans and solve technical security problems. CTSC staff work with people on the project they’re assisting to produce a report, technical results or a security program plan the project can implement.

In addition to working with projects individually, the CSTC also holds a cybersecurity summit each August where representatives of the NSF facilities discuss their security challenges and host presentations.

Source: Susan Szuch, NCSA

Subscribe to HPCwire's Weekly Update!

Be the most informed person in the room! Stay ahead of the tech trends with industy updates delivered to you every week!

UCSD, AIST Forge Tighter Alliance with AI-Focused MOU

January 18, 2018

The rich history of collaboration between UC San Diego and AIST in Japan is getting richer. The organizations entered into a five-year memorandum of understanding on January 10. The MOU represents the continuation of a 1 Read more…

By Tiffany Trader

New Blueprint for Converging HPC, Big Data

January 18, 2018

After five annual workshops on Big Data and Extreme-Scale Computing (BDEC), a group of international HPC heavyweights including Jack Dongarra (University of Tennessee), Satoshi Matsuoka (Tokyo Institute of Technology), Read more…

By John Russell

Researchers Measure Impact of ‘Meltdown’ and ‘Spectre’ Patches on HPC Workloads

January 17, 2018

Computer scientists from the Center for Computational Research, State University of New York (SUNY), University at Buffalo have examined the effect of Meltdown and Spectre security updates on the performance of popular H Read more…

By Tiffany Trader

HPE Extreme Performance Solutions

HPE and NREL Take Steps to Create a Sustainable, Energy-Efficient Data Center with an H2 Fuel Cell

As enterprises attempt to manage rising volumes of data, unplanned data center outages are becoming more common and more expensive. As the cost of downtime rises, enterprises lose out on productivity and valuable competitive advantage without access to their critical data. Read more…

Fostering Lustre Advancement Through Development and Contributions

January 17, 2018

Six months after organizational changes at Intel's High Performance Data (HPDD) division, most in the Lustre community have shed any initial apprehension around the potential changes that could affect or disrupt Lustre Read more…

By Carlos Aoki Thomaz

UCSD, AIST Forge Tighter Alliance with AI-Focused MOU

January 18, 2018

The rich history of collaboration between UC San Diego and AIST in Japan is getting richer. The organizations entered into a five-year memorandum of understandi Read more…

By Tiffany Trader

New Blueprint for Converging HPC, Big Data

January 18, 2018

After five annual workshops on Big Data and Extreme-Scale Computing (BDEC), a group of international HPC heavyweights including Jack Dongarra (University of Te Read more…

By John Russell

Researchers Measure Impact of ‘Meltdown’ and ‘Spectre’ Patches on HPC Workloads

January 17, 2018

Computer scientists from the Center for Computational Research, State University of New York (SUNY), University at Buffalo have examined the effect of Meltdown Read more…

By Tiffany Trader

Fostering Lustre Advancement Through Development and Contributions

January 17, 2018

Six months after organizational changes at Intel's High Performance Data (HPDD) division, most in the Lustre community have shed any initial apprehension aroun Read more…

By Carlos Aoki Thomaz

When the Chips Are Down

January 11, 2018

In the last article, "The High Stakes Semiconductor Game that Drives HPC Diversity," I alluded to the challenges facing the semiconductor industry and how that may impact the evolution of HPC systems over the next few years. I thought I’d lift the covers a little and look at some of the commercial challenges that impact the component technology we use in HPC. Read more…

By Dairsie Latimer

How Meltdown and Spectre Patches Will Affect HPC Workloads

January 10, 2018

There have been claims that the fixes for the Meltdown and Spectre security vulnerabilities, named the KPTI (aka KAISER) patches, are going to affect applicatio Read more…

By Rosemary Francis

Momentum Builds for US Exascale

January 9, 2018

2018 looks to be a great year for the U.S. exascale program. The last several months of 2017 revealed a number of important developments that help put the U.S. Read more…

By Alex R. Larzelere

ANL’s Rick Stevens on CANDLE, ARM, Quantum, and More

January 8, 2018

Late last year HPCwire caught up with Rick Stevens, associate laboratory director for computing, environment and life Sciences at Argonne National Laboratory, f Read more…

By John Russell

Inventor Claims to Have Solved Floating Point Error Problem

January 17, 2018

"The decades-old floating point error problem has been solved," proclaims a press release from inventor Alan Jorgensen. The computer scientist has filed for and Read more…

By Tiffany Trader

US Coalesces Plans for First Exascale Supercomputer: Aurora in 2021

September 27, 2017

At the Advanced Scientific Computing Advisory Committee (ASCAC) meeting, in Arlington, Va., yesterday (Sept. 26), it was revealed that the "Aurora" supercompute Read more…

By Tiffany Trader

Japan Unveils Quantum Neural Network

November 22, 2017

The U.S. and China are leading the race toward productive quantum computing, but it's early enough that ultimate leadership is still something of an open questi Read more…

By Tiffany Trader

AMD Showcases Growing Portfolio of EPYC and Radeon-based Systems at SC17

November 13, 2017

AMD’s charge back into HPC and the datacenter is on full display at SC17. Having launched the EPYC processor line in June along with its MI25 GPU the focus he Read more…

By John Russell

Nvidia Responds to Google TPU Benchmarking

April 10, 2017

Nvidia highlights strengths of its newest GPU silicon in response to Google's report on the performance and energy advantages of its custom tensor processor. Read more…

By Tiffany Trader

IBM Begins Power9 Rollout with Backing from DOE, Google

December 6, 2017

After over a year of buildup, IBM is unveiling its first Power9 system based on the same architecture as the Department of Energy CORAL supercomputers, Summit a Read more…

By Tiffany Trader

Fast Forward: Five HPC Predictions for 2018

December 21, 2017

What’s on your list of high (and low) lights for 2017? Volta 100’s arrival on the heels of the P100? Appearance, albeit late in the year, of IBM’s Power9? Read more…

By John Russell

GlobalFoundries Puts Wind in AMD’s Sails with 12nm FinFET

September 24, 2017

From its annual tech conference last week (Sept. 20), where GlobalFoundries welcomed more than 600 semiconductor professionals (reaching the Santa Clara venue Read more…

By Tiffany Trader

Leading Solution Providers

Chip Flaws ‘Meltdown’ and ‘Spectre’ Loom Large

January 4, 2018

The HPC and wider tech community have been abuzz this week over the discovery of critical design flaws that impact virtually all contemporary microprocessors. T Read more…

By Tiffany Trader

Perspective: What Really Happened at SC17?

November 22, 2017

SC is over. Now comes the myriad of follow-ups. Inboxes are filled with templated emails from vendors and other exhibitors hoping to win a place in the post-SC thinking of booth visitors. Attendees of tutorials, workshops and other technical sessions will be inundated with requests for feedback. Read more…

By Andrew Jones

Tensors Come of Age: Why the AI Revolution Will Help HPC

November 13, 2017

Thirty years ago, parallel computing was coming of age. A bitter battle began between stalwart vector computing supporters and advocates of various approaches to parallel computing. IBM skeptic Alan Karp, reacting to announcements of nCUBE’s 1024-microprocessor system and Thinking Machines’ 65,536-element array, made a public $100 wager that no one could get a parallel speedup of over 200 on real HPC workloads. Read more…

By John Gustafson & Lenore Mullin

Delays, Smoke, Records & Markets – A Candid Conversation with Cray CEO Peter Ungaro

October 5, 2017

Earlier this month, Tom Tabor, publisher of HPCwire and I had a very personal conversation with Cray CEO Peter Ungaro. Cray has been on something of a Cinderell Read more…

By Tiffany Trader & Tom Tabor

Flipping the Flops and Reading the Top500 Tea Leaves

November 13, 2017

The 50th edition of the Top500 list, the biannual publication of the world’s fastest supercomputers based on public Linpack benchmarking results, was released Read more…

By Tiffany Trader

GlobalFoundries, Ayar Labs Team Up to Commercialize Optical I/O

December 4, 2017

GlobalFoundries (GF) and Ayar Labs, a startup focused on using light, instead of electricity, to transfer data between chips, today announced they've entered in Read more…

By Tiffany Trader

How Meltdown and Spectre Patches Will Affect HPC Workloads

January 10, 2018

There have been claims that the fixes for the Meltdown and Spectre security vulnerabilities, named the KPTI (aka KAISER) patches, are going to affect applicatio Read more…

By Rosemary Francis

HPC Chips – A Veritable Smorgasbord?

October 10, 2017

For the first time since AMD's ill-fated launch of Bulldozer the answer to the question, 'Which CPU will be in my next HPC system?' doesn't have to be 'Whichever variety of Intel Xeon E5 they are selling when we procure'. Read more…

By Dairsie Latimer

  • arrow
  • Click Here for More Headlines
  • arrow
Share This