Designing a monitoring model for cluster super–computers

Authors

DOI:

https://doi.org/10.15587/1729-4061.2016.85433

Keywords:

super-computer, monitoring system, detection of anomalies, computational systems, multi-agent approach

Abstract

Recently there has been an increase in the number of cyber attacks against computational systems. Growth in the amounts of information that passes through computational clusters and savings on staff requires an application of effective means of monitoring computational resources for the purpose of prediction and elimination of cyber attacks. An analysis of hacker attacks revealed that the break-in was not detected by technical equipment.

We examined a concept of building existing systems of monitoring of cluster super-computers. Deficiencies are established in the monitoring systems, which lead not only to the reduction in efficiency of computational clusters but to their safety violations. We described a formal model for the detection of anomalies in the functioning of a computational cluster. The model is the sets of the states of the system depending on functional tasks, it separates processes of targeted functioning of the system from the interface processes of interaction with the network infrastructure and provides for the possibility of their use in neural network technology for detecting anomalies in the functioning of a computational cluster. This model makes it possible to locally control parameters for each process and, based on the formed vector, to detect anomalous influence on the system as a whole.

Data of the study can be used for the improvement of already existing subsystems of monitoring of super-computer technologies, as well as form a foundation for creating fundamentally new neural network multi-agent system of monitoring of the detection of anomalous incidents in the performance of computational clusters. 

Author Biographies

Igor Ruban, Kharkiv National University of Radioelectronics Nauky ave., 14, Kharkіv, Ukraine, 61000

Doctor of Technical Sciences, Professor, Head of Department

Department of Electronic Computers

Vitalii Martovytskyi, Kharkiv National University of Radioelectronics Nauky ave., 14, Kharkіv, Ukraine, 61000

Postgraduate student

Department of Information Technology Security

Nataliia Lukova-Chuiko, Taras Shevchenko National University of Kyiv Volodymyrska str., 64/13, Kyiv, Ukraine, 01601

PhD, Associate Professor

Department of Cybersecurity and Information Protection

References

  1. Voevodyn, V. V. (2012). Superkompiuternie tekhnolohyy v nauke, obrazovanyy y promishlennosty. Moscow: Yzdatelsvo Moskovskogo universiteta, 232.
  2. DDOS-ataky v pervom kvartale 2016 hoda. Available at: https://securelist.ru/analysis/malware-quarterly/28429/ddos-ataki-v-pervom-kvartale-2016-goda (Last accessed: 22.07.2016).
  3. Bronk, C., Tikk-Ringas, E. (2013). The Cyber Attack on Saudi Aramco. Survival, 55 (2), 81–96. doi: 10.1080/00396338.2013.784468
  4. Knopová, M., Knopová, E. (2014). The Third World War? In The Cyberspace. Cyber Warfare in the Middle East. Acta Informatica Pragensia, 3 (1), 23–32. doi: 10.18267/j.aip.33
  5. Ruban, I. V. (2015). An approach to cyber security support. Information processing systems, 11, 6–8.
  6. Kora, A. D., Soidridine, M. M. (2012). Nagios based enhanced IT management system. International Journal of Engineering Science and Technology (IJEST), 4 (4), 1199–1207.
  7. Cigala, V., Mahale, D., Shah, M., Bhingarkar, S. (2011). Job-Oriented Monitoring of Clusters. International Journal on Computer Science and Engineering, 3 (3), 1333–1337.
  8. Stefanov, K., Voevodin, V., Zhumatiy, S., Voevodin, V. (2015). Dynamically Reconfigurable Distributed Modular Monitoring System for Supercomputers (DiMMon). Procedia Computer Science, 66, 625–634. doi: 10.1016/j.procs.2015.11.071
  9. Sydorov, Y. A., Oparyn, H. A., Skorov, V. V. (2014). Ynstrumentalnii kompleks metamonytorynha raspredelennikh vichyslytelnikh sred. Parallelnie vichyslytelnie tekhnolohyy, 159–167.
  10. Tarasov, A. G. (2010). Integration of computing cluster monitoring system. In Proc. of the First Russia and Pacific Conference on Computer Technology and Applications (RPC 2010), 221–224.
  11. Tirenko, A. (2016). IT na rubezhe epokh. Otkritie systemi. SUBD, 1, 46–47.
  12. Nemniuhyn, S. A. (2002). Parallel′noe prohrammyrovanye dlia mnohoprotsessornikh vichyslytel′nikh system. St. Petersburg, 255.
  13. Olad’ko, A. Iu. (2012). Podsystema monytorynha y audyta ynformatsyonnoĭ bezopasnosty v operatsyonnoĭ systeme Linux. Yzvestyia Iuzhnoho federal′noho unyversyteta. Tekhnycheskye nauky, 137 (12), 22–28.

Downloads

Published

2016-12-14

How to Cite

Ruban, I., Martovytskyi, V., & Lukova-Chuiko, N. (2016). Designing a monitoring model for cluster super–computers. Eastern-European Journal of Enterprise Technologies, 6(2 (84), 32–37. https://doi.org/10.15587/1729-4061.2016.85433