Designing a monitoring model for cluster super–computers
DOI:
https://doi.org/10.15587/1729-4061.2016.85433Keywords:
super-computer, monitoring system, detection of anomalies, computational systems, multi-agent approachAbstract
Recently there has been an increase in the number of cyber attacks against computational systems. Growth in the amounts of information that passes through computational clusters and savings on staff requires an application of effective means of monitoring computational resources for the purpose of prediction and elimination of cyber attacks. An analysis of hacker attacks revealed that the break-in was not detected by technical equipment.
We examined a concept of building existing systems of monitoring of cluster super-computers. Deficiencies are established in the monitoring systems, which lead not only to the reduction in efficiency of computational clusters but to their safety violations. We described a formal model for the detection of anomalies in the functioning of a computational cluster. The model is the sets of the states of the system depending on functional tasks, it separates processes of targeted functioning of the system from the interface processes of interaction with the network infrastructure and provides for the possibility of their use in neural network technology for detecting anomalies in the functioning of a computational cluster. This model makes it possible to locally control parameters for each process and, based on the formed vector, to detect anomalous influence on the system as a whole.
Data of the study can be used for the improvement of already existing subsystems of monitoring of super-computer technologies, as well as form a foundation for creating fundamentally new neural network multi-agent system of monitoring of the detection of anomalous incidents in the performance of computational clusters.
References
- Voevodyn, V. V. (2012). Superkompiuternie tekhnolohyy v nauke, obrazovanyy y promishlennosty. Moscow: Yzdatelsvo Moskovskogo universiteta, 232.
- DDOS-ataky v pervom kvartale 2016 hoda. Available at: https://securelist.ru/analysis/malware-quarterly/28429/ddos-ataki-v-pervom-kvartale-2016-goda (Last accessed: 22.07.2016).
- Bronk, C., Tikk-Ringas, E. (2013). The Cyber Attack on Saudi Aramco. Survival, 55 (2), 81–96. doi: 10.1080/00396338.2013.784468
- Knopová, M., Knopová, E. (2014). The Third World War? In The Cyberspace. Cyber Warfare in the Middle East. Acta Informatica Pragensia, 3 (1), 23–32. doi: 10.18267/j.aip.33
- Ruban, I. V. (2015). An approach to cyber security support. Information processing systems, 11, 6–8.
- Kora, A. D., Soidridine, M. M. (2012). Nagios based enhanced IT management system. International Journal of Engineering Science and Technology (IJEST), 4 (4), 1199–1207.
- Cigala, V., Mahale, D., Shah, M., Bhingarkar, S. (2011). Job-Oriented Monitoring of Clusters. International Journal on Computer Science and Engineering, 3 (3), 1333–1337.
- Stefanov, K., Voevodin, V., Zhumatiy, S., Voevodin, V. (2015). Dynamically Reconfigurable Distributed Modular Monitoring System for Supercomputers (DiMMon). Procedia Computer Science, 66, 625–634. doi: 10.1016/j.procs.2015.11.071
- Sydorov, Y. A., Oparyn, H. A., Skorov, V. V. (2014). Ynstrumentalnii kompleks metamonytorynha raspredelennikh vichyslytelnikh sred. Parallelnie vichyslytelnie tekhnolohyy, 159–167.
- Tarasov, A. G. (2010). Integration of computing cluster monitoring system. In Proc. of the First Russia and Pacific Conference on Computer Technology and Applications (RPC 2010), 221–224.
- Tirenko, A. (2016). IT na rubezhe epokh. Otkritie systemi. SUBD, 1, 46–47.
- Nemniuhyn, S. A. (2002). Parallel′noe prohrammyrovanye dlia mnohoprotsessornikh vichyslytel′nikh system. St. Petersburg, 255.
- Olad’ko, A. Iu. (2012). Podsystema monytorynha y audyta ynformatsyonnoĭ bezopasnosty v operatsyonnoĭ systeme Linux. Yzvestyia Iuzhnoho federal′noho unyversyteta. Tekhnycheskye nauky, 137 (12), 22–28.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Igor Ruban, Vitalii Martovytskyi, Nataliia Lukova-Chuiko
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.