1 | GEC15 - GENI "Hive Mind" Report |
---|
2 | =============================== |
---|
3 | |
---|
4 | Period: July 1, 2012 - November 1, 2012 |
---|
5 | |
---|
6 | I. Major accomplishments this period |
---|
7 | ------------------------------------- |
---|
8 | |
---|
9 | ### A. Milestones achieved this period |
---|
10 | |
---|
11 | Hive: Year S4.c Report on Experimentation and Hive Mind demo. Due 7/27/12 |
---|
12 | |
---|
13 | -Completed |
---|
14 | |
---|
15 | Hive: S4.d Deliver software and documentation |
---|
16 | |
---|
17 | -Completed |
---|
18 | |
---|
19 | ### B. Deliverables made this period |
---|
20 | |
---|
21 | Hive: Year S4.c Report on Experimentation and Hive Mind demo. Due 7/27/12 |
---|
22 | |
---|
23 | - Written report on Security Experimentation in GENI. (Completed) |
---|
24 | |
---|
25 | - Demonstration of monitoring system being used to collect information about an experiment's environment and making this information available through the portal identified in Milestone b. (Completed) |
---|
26 | |
---|
27 | Hive: S4.d Deliver software and documentation. (Due 9/14/12) |
---|
28 | |
---|
29 | - Updated report of Security Experimentation in GENI based on presentation of this report at GEC14 (July 2012). (Completed) |
---|
30 | |
---|
31 | - Deliver working software and user documentation for monitoring system. (Completed) |
---|
32 | |
---|
33 | |
---|
34 | II. Description of work performed during this period |
---|
35 | ---------------------------------------------------- |
---|
36 | |
---|
37 | ### A. Activities and findings |
---|
38 | |
---|
39 | We demonstrated our Hive Mind prototype at GEC14 and GEC15. We have also delivered and posted a working version of our software and documentation. Our development and experimentation work is continuing as we both make the software more robust, usable, and extensible, as well as assess the efficacy of the software for a variety of circumstances. |
---|
40 | |
---|
41 | ### B. Current project participants |
---|
42 | |
---|
43 | PI: Sean Peisert (UC Davis) |
---|
44 | |
---|
45 | Senior Personnel: |
---|
46 | Matt Bishop (UC Davis) |
---|
47 | Steven Templeton (UC Davis) |
---|
48 | |
---|
49 | Students: |
---|
50 | Vinod Balachandran (UC Davis) |
---|
51 | Mina Doroud (UC Davis) |
---|
52 | Julian Fuchs (UC Davis) |
---|
53 | Vishak Muthukumar (UC Davis) |
---|
54 | |
---|
55 | ### C. Publications (individual and organizational) this period |
---|
56 | |
---|
57 | Sean Whalen, Sean Peisert, and Matt Bishop, "Multiclass Classification of Distributed Memory Parallel Computations," to appear in Pattern Recognition Letters (PRL), 2012. |
---|
58 | |
---|
59 | Xiao Li, Zhifang Wang, Vishak Muthukumar, Anna Scaglione, Chuck McParland, and Sean Peisert, "Networked Loads in the Distribution Grid," to appear in Proceedings of the 2012 APSIPA Annual Summit and Conference, Hollywood, CA, December 3â6, 2012. |
---|
60 | |
---|
61 | Sean Peisert, Ed Talbot, and Matt Bishop, "Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems," to appear in Proceedings of the 2012 New Security Paradigms Workshop (NSPW), Bertinoro, Italy, September 19â21, 2012. |
---|
62 | |
---|
63 | Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop, "Network-Theoretic Classification of Parallel Computation Patterns," International Journal of High Performance Computing Applications (IJHPCA), 26(2), pp. 159â169, May 2012. |
---|
64 | |
---|
65 | Sean Whalen, Sean Peisert, and Matt Bishop, "Network-Theoretic Classification of Parallel Computation Patterns," Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES), Tucson, AZ, June 4, 2011. |
---|
66 | |
---|
67 | ### D. Outreach activities this period |
---|
68 | |
---|
69 | Prof. Peisert served as program co-chair of the 5th Workshop on Cyber Security Experimentation and Test (CSET '12) on August 6, 2012: |
---|
70 | |
---|
71 | https://www.usenix.org/conference/cset12 |
---|
72 | |
---|
73 | This workshop will had considerable discussion of and focus on testbeds, including GENI. |
---|
74 | |
---|
75 | Prof. Peisert presented the Hive Mind at the "Lawrence Livermore National Laboratory 2012 Workshop on Current Challenges in Computing (C3): Network Science," on August 27â29, 2012. |
---|
76 | |
---|
77 | https://nsic.llnl.gov/?q=education_and_outreach-professional_development-past_events-m_s_for_cyber_workshop |
---|
78 | |
---|
79 | ### E. Collaborations this period |
---|
80 | |
---|
81 | Our project collaborated closely with the "Attribution for GENI" project (PI: M. Bishop, UC Davis). |
---|
82 | |
---|
83 | We also are working with staff at the DETER project, who are facilitating our implementation and experimental work on DETER, and with Rob Ricci, who is facilitating our implementation and experimental work on ProtoGENI. We are grateful to the staff at both projects for their valuable help. |
---|
84 | |
---|
85 | ### F. Other Contributions |
---|
86 | |
---|
87 | N/A |
---|