Changes between Version 1 and Version 2 of HiveMind-Status-Dec2011


Ignore:
Timestamp:
03/24/12 07:39:58 (12 years ago)
Author:
Vic Thomas
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • HiveMind-Status-Dec2011

    v1 v2  
    5858Because the ant method can be effective in a variety of differenty implentation environments, we are also exploring the use of digital ants to cope with considerably different varieties of attacks, such as use of computational resources for [Bitcoin][] computation, or other cryptanalytic activities, because we have demonstrated in the HPC context how we are able to detect such activities: 
    5959
    60 > Sean Peisert, "[Fingerprinting Communication and Computation on HPC Machines][Pei10]," Technical Report LBNL-3483E, Lawrence Berkeley National Laboratory, June 2010. 
    61 > Sean Whalen, Sean Peisert, and Matt Bishop, "[Network-Theoretic Classification of Parallel Computation Patterns][WPB11],"  *Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES)*, Tucson, AZ, June 4, 2011.
     60> Sean Peisert, "[Fingerprinting Communication and Computation on HPC Machines][Pei10]," Technical Report LBNL-3483E, Lawrence Berkeley National Laboratory, June 2010.  [[BR]]
     61> Sean Whalen, Sean Peisert, and Matt Bishop, "[Network-Theoretic Classification of Parallel Computation Patterns][WPB11],"  *Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES)*, Tucson, AZ, June 4, 2011.[[BR]]
    6262> Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop, "Network-Theoretic Classification of Parallel Computation Patterns" (expanded version of CACHES paper), to appear in the *International Journal of High Performance Computing Applications (IJHPCA)*, 2011.
    6363
     
    103103Our experimental results, demonstrated at GEC12, have shown that the digital ant concept is effective at detecting a wide variety of attacks provided that ant-based sensors can obtain the required information. In order to meet the security monitoring requirements of GENI this will have to be augmented with some traditional IDS concepts at both the host and network layer. Ultimately, we believe that our new scheme provides significantly greater security and policy flexibility at lower resource cost.We look forward to showing this experimentally in a demonstration at GEC13.
    104104
    105 [Bitcoin]: http://www.bitcoin.org/bitcoin.pdf
    106 [KRL97]: http://seclab.cs.ucdavis.edu/papers/pdfs/ck-mr-kl-97.pdf
    107 [Pei10]: http://www.cs.ucdavis.edu/~peisert/research/2010-Peisert-TR-LBNL-3483E-FingerprintingHPC.pdf
     105[Bitcoin]: http://www.bitcoin.org/bitcoin.pdf [[BR]]
     106[KRL97]: http://seclab.cs.ucdavis.edu/papers/pdfs/ck-mr-kl-97.pdf [[BR]]
     107[Pei10]: http://www.cs.ucdavis.edu/~peisert/research/2010-Peisert-TR-LBNL-3483E-FingerprintingHPC.pdf [[BR]]
    108108[WPB11]: http://www.cs.ucdavis.edu/~peisert/research/2011-CACHES-ntc.pdf
    109109