Scalable Cyber-Security for Terabit Cloud Computing

被引:0
|
作者
Ros-Giralt, Jordi [1 ]
Szilagyi, Peter [1 ]
Lethin, Richard [1 ]
机构
[1] Reservoir Labs Inc, New York, NY 10012 USA
关键词
cyber-security; cloud computing; energy efficient; high speed networks; many-core processors;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the problem of scalable cyber-security using a cloud computing architecture. Scalability is treated in two contexts: (1) performance and power efficiency and (2) degree of cyber security-relevant information detected by the cyber-security cloud (CSC). We provide a framework to construct CSCs, which derives from a set of fundamental building blocks (forwarders, analyzers and grounds) and the identification of the smallest functional units (atomic CSC cells or simply aCSC cells) capable of embedding the full functionality of the cyber-security cloud. aCSC cells are then studied and several high-performance algorithms are presented to optimize the system's performance and power efficiency. Among these, a new queuing policy-called tail early detection (TED)-is introduced to proactively drop packets in a way that the degree of detected information is maximized while saving power by avoiding spending cycles on less relevant traffic components. We also show that it is possible to use aCSC cells as core building blocks to construct arbitrarily large cyber-security clouds by structuring the cells using a hierarchical architecture. To demonstrate the utility of our framework, we implement one cyber-security "mini-cloud" on a single chip prototype based on the Tilera's TILEPro64 processor demonstrating performance of up to 10Gbps.(1)
引用
收藏
页码:1607 / 1616
页数:10
相关论文
共 50 条
  • [1] State-of-The-Art of Cloud Computing Cyber-Security
    Bennasar, Hanane
    Essaaidi, Mohammad
    Bendahmane, Ahmed
    Ben-othman, Jalel
    [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [2] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
    Bennasar, H.
    Bendahmane, A.
    Essaaidi, M.
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67
  • [3] Cyber-Security and a Potential Role for the Maritime Cloud
    Wimpenny, G.
    Safar, J.
    Grant, A.
    Bransby, M.
    Ward, N.
    [J]. PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808
  • [4] Is quantum computing becoming relevant to cyber-security?
    Keplinger K.
    [J]. 2018, Elsevier Ltd (2018) : 16 - 19
  • [5] Defining and computing a value based cyber-security measure
    Anis Ben Aissa
    Robert K. Abercrombie
    Frederick T. Sheldon
    Ali Mili
    [J]. Information Systems and e-Business Management, 2012, 10 : 433 - 453
  • [6] Defining and computing a value based cyber-security measure
    Ben Aissa, Anis
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    Mili, Ali
    [J]. INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 433 - 453
  • [7] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [8] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [9] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [10] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11