Advanced Vulnerability Assessment Tool for Distributed Systems

被引:1
|
作者
Acs, Sandor [1 ,2 ]
Kozlovszky, Miklos [1 ,2 ]
Kotcauer, Peter [1 ,2 ]
机构
[1] Univ Obuda, H-1300 Budapest, Hungary
[2] MTA SZTAKI Comp & Automat Res Inst, H-1518 Budapest, Hungary
关键词
distributed computing; HPC; security; vulnerability assessment; HP-SEE; supercomputing infrastructure;
D O I
10.1007/978-3-319-01520-0_17
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Large-scale high performance systems have significant amount of processing power. One example of such system is the HPSEE's HPC and supercomputing infrastructures, which is geologically distributed, and provides 24/7, high performance/high throughput computing services primarily for high-end research communities. Due to the direct impact on research and indirectly on economy such systems can be categorized as critical infrastructure. System features (like nonstop availability, geographically distributed and community based usage) make such infrastructure vulnerable and valuable targets of malicious attacks. In order to decrease the threat, we designed the Advanced Vulnerability Assessment Tool (AVAT) suitable for HPC/supercomputing systems. Our developed solution can submit vulnerability assessment jobs into the HP-SEE infrastructure and run vulnerability assessment on the infrastructure components. It collects assessment information by the decentralized Security Monitor and archives the results received from the components and visualize them via a web interface for the local/regional administrators. In this paper we present our Advanced Vulnerability Assessment Tool, we describe its functionalities and provide its monitoring test results captured in real systems.
引用
收藏
页码:139 / 146
页数:8
相关论文
共 50 条
  • [1] Non-intrusive techniques for vulnerability assessment of services in distributed systems
    Genge, Bela
    Graur, Flavius
    Enachescu, Calin
    [J]. 8TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2014, 2015, 19 : 12 - 19
  • [2] Intelligent tool for enterprise vulnerability assessment on a distributed network environment using Nessus and OVAL
    Kim, Y
    Baek, SY
    Lee, G
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 1056 - 1061
  • [3] Vulnerability assessment as a tool for hazard mitigation
    Williams, AT
    Alvarez, RA
    [J]. SUBMARINE LANDSLIDES AND TSUNAMIS, 2003, 21 : 303 - 313
  • [4] Spreadability and vulnerability of distributed parameter systems
    Bernoussi, A.
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2007, 38 (04) : 305 - 317
  • [5] Distributed Analysis Tool for Vulnerability Prioritization in Corporate Networks
    Walkowski, Michal
    Krakowiak, Maciej
    Oko, Jacek
    Sujecki, Slawomir
    [J]. 2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 344 - 349
  • [6] The advanced distributed region of interest tool
    Marchette, DJ
    Solka, JL
    Guidry, R
    Green, J
    [J]. PATTERN RECOGNITION, 1998, 31 (12) : 2103 - 2118
  • [7] An improvement for a mathematical model for distributed vulnerability assessment
    Bognar, Laszlo
    Joos, Antal
    Nagy, Balint
    [J]. ACTA UNIVERSITATIS SAPIENTIAE-MATHEMATICA, 2018, 10 (02) : 203 - 217
  • [8] Employing Miniaturized Computers for Distributed Vulnerability Assessment
    Hu, Yi
    Sulek, Dustin
    Carella, Anthony
    Cox, Joshua
    Frame, Allyson
    Cipriano, Karen
    Wang, Hong-xia
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 57 - 61
  • [9] Vulnerability Assessment of Sensor Systems
    Bialas, Andrzej
    [J]. SENSORS, 2019, 19 (11):
  • [10] DRAT : A Drone Attack Tool for Vulnerability Assessment
    Fadilah, Mohammad Shameel bin Mohammad
    Balachandran, Vivek
    Loh, Peter
    Chua, Melissa
    [J]. PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 153 - 155