Browse > Article
http://dx.doi.org/10.3745/KTCCS.2020.9.5.113

Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network  

Lee, Jae-Kook (한국과학기술정보연구원 슈퍼컴퓨팅인프라센터)
Kim, Sung-Jun (한국과학기술정보연구원 슈퍼컴퓨팅인프라센터)
Hong, Taeyoung (한국과학기술정보연구원 슈퍼컴퓨팅인프라센터)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.9, no.5, 2020 , pp. 113-120 More about this Journal
Abstract
KISTI(Korea Institute of Science and Technology Information) provides HPC(High Performance Computing) service to users of university, institute, government, affiliated organization, company and so on. The NURION, supercomputer that launched its official service on Jan. 1, 2019, is the fifth supercomputer established by the KISTI. The NURION has 25.7 petaflops computation performance. Understanding how supercomputing services are used and how researchers are using is critical to system operators and managers. It is central to monitor and analysis network traffic. In this paper, we briefly introduce the NURION system and supercomputing service network with security configuration. And we describe the monitoring system that checks the status of supercomputing services in real time. We analyze inbound/outbound traffics and abnormal (attack) IP addresses data that are collected in the NURION supercomputing service network for 11 months (from January to November 1919) using time series and correlation analysis method.
Keywords
NURION Supercomputer; Network Traffic; Frequency Analysis; Correlation Analysis; Time Series Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KISTI National Supercomputing Center [Internet], https://www.ksc.re.kr
2 Bu Young Ahn, Ji Hoon Jang, Sun Il Ahn, Myung Il Kim, Noo Ri On, Jong Hyun Hong, and Sik Lee, “Study of High Performance Computing Activation Strategy,” International Journal of Multimedia and Ubiquitous Engineering, Vol. 9, No. 6, pp. 59-66, 2014.   DOI
3 Jae-Kook Lee, Sung-Jun Kim, Chan Yeol Park, Taeyoung Hong, and Huiseung Chae, “Heavy-Tailed Distribution of the SSH Brute-Force Attack Duration in a Multi-user Environment,” Journal of the Korean Physical Society, Vol. 69, No. 2, pp. 253-258, Jul. 2016.   DOI
4 Jae-Kook Lee, Sung-Jun Kim, and Taeyoung Hong, “Bruteforce Attacks Analysis against SSH in HPC Multi-user Service Environment,” Indian Journal of Science and Technology, Vol. 9, No. 24, pp. 1-4, Jun. 2016.
5 Jae-Kook Lee, Sung-Jun Kim, Joon Woo, and Chan Yeol Park, “Analysis and Response of SSH Brute Force Attacks in Multi-user Computing Environment,” KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 6, pp. 205-212, Jun. 2015.   DOI
6 Alessandro D’Alconzo, Idilio Drago and Andrea Morichetta, “A Survey on Big Data for Network Traffic Monitoring and Analysis,” IEEE Transactions on Network and Service Management, Vol. 16, No. 3, pp. 800-813, Sep. 2019.   DOI
7 A. Callado, Carlos Kamienski, Geza Szabo, Balazs Peter Gero, Judith Kelner, Stenio Fernandes, and Djamel Sadok, “A survey on Internet traffic identification,” IEEE Commun. Surveys Trts., Vol. 11, No. 3, pp. 37-52, 2009.   DOI
8 I. Drago, M. Mellia, and M. Crovella, "Studying interdomain routing over long timescales," Proceedings of the 2013 Conference on Internet Measurement Conference, Oct. 2013.
9 Sung-Jun Kim and Taeyoung Hong, "Implementation supercomputer system dashboard using RESTful API," The KIPS Fall Conference 2019, Vol. 26, No. 2, Nov. 2019.
10 Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, and Kuinam J. Kim, “A Survey of Deep Learning-based Network Anomaly Detection,” Cluster Computing Journal, Vol. 22, No. 1, pp. 949-961, 2019.   DOI
11 Mukrimah Nawir, Amiza Amir, Naimah Yaakob, and Ong Bi Lynn, “Effective and efficient network anomaly detection system using machine learning algorithm,” Bulletine of Electrical Engineering and Informatics, Vol. 8, No. 1, pp. 46-51, Mar. 2019.   DOI
12 R. Artusi, P. Verderio, and E. Marubini, “Bravais-Pearson and Spearman correlation coefficients: meaning, test of hypothesis and confidence interval,” The International Journal of Biological Markers, Vol. 17, No. 2, pp. 148-151, 2002.   DOI
13 Douglas G. Bonett and Thomas A. Wright, “Sample size requirements for estimating pearson, kendall and spearman correlations,” Psychometrika, Vol. 65, No. 1, pp. 23-28, Mar. 2000   DOI
14 Thuy T.T. Nguyen, and Grenville Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Communications Surveys & Tutorials, Vol. 10, No. 4, pp. 56-76, 2008.   DOI