首页> 外文OA文献 >Operational security, threat intelligence distributed computing: the WLCG Security Operations Center Working Group
【2h】

Operational security, threat intelligence distributed computing: the WLCG Security Operations Center Working Group

机译:运营安全,威胁情报和分布式计算:WLCG安全运营中心工作组

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The modern security landscape for distributed computing in High Energy Physics (HEP) includes a wide range of threats employing different attack vectors. The nature of these threats is such that the most effective method for dealing with them is to work collaboratively, both within the HEP community and with partners further afield - these can, and should, include institutional and campus security teams. In parallel with this work, an appropriate technology stack is essential, incorporating current work on Big Data analytics. The work of the Worldwide LHC Computing Grid (WLCG) Security Operations Center (SOC) Working Group (WG) [1] is to pursue these goals to form a reference design (or guidelines) for WLCG sites of different types. The strategy of the group is to identify necessary components - starting with threat intelligence (MISP [2]) and network intrusion detection (Bro [3]), building a working model over time. We present on the progress of the working group thus far, in particular on the programme of workshops now underway. These workshops give an opportunity to engage with sites to allow the development of advice and procedures for deployment, as well as facilitating wider discussions on how to best work with trust groups at different levels. These trust groups vary in scope but can include institutes, National Grid Infrastructures and the WLCG as a whole.
机译:高能量物理(HEP)分布式计算的现代安全景观包括采用不同攻击向量的广泛威胁。这些威胁的性质是使他们处理的最有效的方法是在HEP社区和合作伙伴进一步朝着偏见的合作伙伴协同工作,而且应该包括机构和校园安全团队。与此工作并行,适当的技术堆栈是必不可少的,在大数据分析上包含当前的工作。全球LHC计算网格(WLCG)安全运营中心(SOC)工作组(SOC)[1]的工作是追求这些目标,以形成不同类型的WLCG网站的参考设计(或指南)。本集团的策略是识别必要的组件 - 从威胁情报开始(MISP [2])和网络入侵检测(BRO [3]),随着时间的推移构建工作模型。迄今为止,我们展示了工作组的进展,特别是现在正在进行研讨会方案。这些研讨会举办了有机会与地点进行融合,以便开发部署的建议和程序,并促进关于如何在不同层面的信任群体上最佳工作的更广泛的讨论。这些信任组在范围内各不相同,但可以包括机构,国家网格基础设施和整体WLCG。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号