Affiliation:
1. National Supercomputing Center, Korea Institute of Science and Technology Information, 245 Daehak-ro, Yuseong-gu, Daejeon 34141, Republic of Korea
Abstract
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we introduced several security devices, such as anti-DDoS, intrusion prevention systems (IPSs), firewalls, and web application firewalls, to ensure the secure use of supercomputing resources. Potential threats are identified based on predefined security policies and added to the firewall rules for access control after detecting abnormal behavior through anti-DDoS, IPS, and system access logs. After analyzing the status change patterns for rule policies added owing to human errors among these added firewall log events, 289,320 data points were extracted over a period of four years. Security experts and operators must go through a strict verification process to rectify policies that were added incorrectly owing to human error, which adds to their workload. To address this challenge, our research applies various machine- and deep-learning algorithms to autonomously determine the normalcy of detection without requiring administrative intervention. Machine-learning algorithms, including naïve Bayes, K-nearest neighbor (KNN), OneR, a decision tree called J48, support vector machine (SVM), logistic regression, and the implemented neural network (NN) model with the cross-entropy loss function, were tested. The results indicate that the KNN and NN models exhibited an accuracy of 97%. Additional training and feature refinement led to even better improvements, increasing the accuracy to 98%, a 1% increase. By leveraging the capabilities of machine-learning and deep-learning technologies, we have provided the basis for a more robust, efficient, and autonomous network security infrastructure for supercomputing services.
Funder
Korea Institute of Science and Technology Information
Reference37 articles.
1. He, S., Zhu, J., He, P., and Lyu, M.R. (2016, January 23–27). Experience Report: System Log Analysis for Anomaly Detection. Proceedings of the 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), Ottawa, ON, Canada.
2. Analysis of botnet attack communication pattern behavior on computer networks;Putra;Int. J. Intell. Eng. Syst.,2022
3. A hierarchical security event correlation model for real-time threat detection and response;Maosa;Network,2024
4. Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network;Lee;J. Commun. Netw.,2021
5. Classification of Firewall Logs Using Supervised Machine Learning Algorithms;Khamitkar;Int. J. Comput. Sci. Eng. (JCSE),2019