首页> 外文会议>IEEE/ACS International Conference on Computer Systems and Applications >Autonomic Secure HPC Architecture Against Power Attacks
【24h】

Autonomic Secure HPC Architecture Against Power Attacks

机译:自主的安全HPC架构可抵御电源攻击

获取原文

摘要

High Performance Computing (HPC) systems are enabling broad computing capabilities across scientific simulations, data analytics, and machine learning. Such HPC systems are composed of high-end compute elements (CPUs, accelerators, co-processors...) to handle high throughput and high parallelism, which results in significant power consumption. However, the power infrastructures built for such systems are proportionately older and may not be built to sustain system's peak power for extensive periods of time. Therefore, innovative power management schemes are used to allocate power across all system's components within a given power limit. HPC power management systems regulate resources' power within budget constraints and the overall system's power limit. Failing not to limit system's power consumption can result in operational failures that can bring down the whole system. Additionally, system reliability would be compromised under extensive computational system power and temperature. In addition to power consumption, possible attack scenarios can cause reliability issues where the attackers can manipulate the reported data of the measured power that is used for power management, which in turn can misguide the schedulers or can assign tasks that will result in exceeding the power limits, leading to system failures. Hence, intrusion detection systems (IDS) for power attacks are extremely important. This paper presents a framework for power attack IDS and describe each steps to be taken.
机译:高性能计算(HPC)系统在科学模拟,数据分析和机器学习中实现了广泛的计算功能。这种HPC系统由高端计算元素(CPU,加速器,协处理器...)组成,以处理高吞吐量和高并行度,从而导致大量功耗。但是,为此类系统构建的电源基础结构相对较旧,可能无法构建为长时间维持系统的峰值功率。因此,创新的电源管理方案用于在给定的功率限制内跨所有系统组件分配功率。 HPC电源管理系统在预算限制和整个系统的电源限制范围内调节资源的电源。不限制系统的功耗会导致操作失败,从而导致整个系统瘫痪。另外,在广泛的计算系统功率和温度下,系统可靠性将受到损害。除了功耗之外,可能的攻击情形还可能引起可靠性问题,攻击者可以操纵报告的功率管理数据以用于电源管理的报告数据,从而又可能误导调度程序或分配任务,从而导致功率超标。限制,导致系统故障。因此,用于电源攻击的入侵检测系统(IDS)极为重要。本文介绍了一种用于电源攻击IDS的框架,并描述了要采取的每个步骤。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号