Changes between Version 1 and Version 2 of HiveMind-Status-Dec2011
- Timestamp:
- 03/24/12 07:39:58 (12 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
HiveMind-Status-Dec2011
v1 v2 58 58 Because the ant method can be effective in a variety of differenty implentation environments, we are also exploring the use of digital ants to cope with considerably different varieties of attacks, such as use of computational resources for [Bitcoin][] computation, or other cryptanalytic activities, because we have demonstrated in the HPC context how we are able to detect such activities: 59 59 60 > Sean Peisert, "[Fingerprinting Communication and Computation on HPC Machines][Pei10]," Technical Report LBNL-3483E, Lawrence Berkeley National Laboratory, June 2010. 61 > Sean Whalen, Sean Peisert, and Matt Bishop, "[Network-Theoretic Classification of Parallel Computation Patterns][WPB11]," *Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES)*, Tucson, AZ, June 4, 2011. 60 > Sean Peisert, "[Fingerprinting Communication and Computation on HPC Machines][Pei10]," Technical Report LBNL-3483E, Lawrence Berkeley National Laboratory, June 2010. [[BR]] 61 > Sean Whalen, Sean Peisert, and Matt Bishop, "[Network-Theoretic Classification of Parallel Computation Patterns][WPB11]," *Proceedings of the First International Workshop on Characterizing Applications for Heterogeneous Exascale Systems (CACHES)*, Tucson, AZ, June 4, 2011.[[BR]] 62 62 > Sean Whalen, Sophie Engle, Sean Peisert, and Matt Bishop, "Network-Theoretic Classification of Parallel Computation Patterns" (expanded version of CACHES paper), to appear in the *International Journal of High Performance Computing Applications (IJHPCA)*, 2011. 63 63 … … 103 103 Our experimental results, demonstrated at GEC12, have shown that the digital ant concept is effective at detecting a wide variety of attacks provided that ant-based sensors can obtain the required information. In order to meet the security monitoring requirements of GENI this will have to be augmented with some traditional IDS concepts at both the host and network layer. Ultimately, we believe that our new scheme provides significantly greater security and policy flexibility at lower resource cost.We look forward to showing this experimentally in a demonstration at GEC13. 104 104 105 [Bitcoin]: http://www.bitcoin.org/bitcoin.pdf 106 [KRL97]: http://seclab.cs.ucdavis.edu/papers/pdfs/ck-mr-kl-97.pdf 107 [Pei10]: http://www.cs.ucdavis.edu/~peisert/research/2010-Peisert-TR-LBNL-3483E-FingerprintingHPC.pdf 105 [Bitcoin]: http://www.bitcoin.org/bitcoin.pdf [[BR]] 106 [KRL97]: http://seclab.cs.ucdavis.edu/papers/pdfs/ck-mr-kl-97.pdf [[BR]] 107 [Pei10]: http://www.cs.ucdavis.edu/~peisert/research/2010-Peisert-TR-LBNL-3483E-FingerprintingHPC.pdf [[BR]] 108 108 [WPB11]: http://www.cs.ucdavis.edu/~peisert/research/2011-CACHES-ntc.pdf 109 109