From DEIXIS: “On guard”
January 2021
Wudan Yan
Pacific Northwest National Laboratory’s (PNNL) Ang Li wants to boost security in high-performance computers. Credit: PNNL.
A Pacific Northwest National Laboratory team is testing machine-learning methods that would detect and possibly block supercomputer intruders.
Though most of the world remains shut down from the pandemic, supercomputers are hard at work.

ORNL IBM AC922 SUMMIT supercomputer, was No.1 on the TOP500. Credit: Carlos Jones, Oak Ridge National Laboratory/U.S. Dept. of Energy.

NERSC Cray Cori II supercomputer, named after Gerty Cori, the first American woman to win a Nobel Prize in science.

NCSA U Illinois Urbana-Champaign Blue Waters Cray Linux XE/XK hybrid machine supercomputer,
at the National Center for Supercomputing Applications.
Some are simulating the coronavirus in search of therapies. Others are working to safeguard the nation’s nuclear stockpile, predict the weather or study climate change. Although supercomputers are more efficient than the device you’re reading this on, they share a vulnerability to attackers.
At Pacific Northwest National Laboratory, staff scientist Ang Li contributes to a range of projects in the lab’s high-performance computing (HPC) group. Li developed an interest in HPC over a decade ago, when he did an undergraduate internship at the Paris-Sud University in France. While there, he helped build a software framework that allowed programs to run efficiently on both graphics processing units (GPUs) and standard-HPC central processing units (CPUs).
Since then Li has worked to develop efficient software for GPUs – processors originally used to move images and videos quickly across screens. In HPC systems, GPUs can improve and optimize performance. He continued this work as he pursued two doctoral degrees from the National University of Singapore (SG) and Eindhoven University of Technology(NL) before joining PNNL in 2016.
Over the past year, Li and his colleagues in Richland, as part of PNNL’s Center for Advanced Technology (CENATE), have helped develop a way to protect U.S. supercomputers from cybersecurity attacks. The Department of Energy’s Office of Advanced Scientific Computing Research started the center a few years ago to investigate emerging computing technologies. Although Li and his team initially studied HPC performance challenges, they eventually shifted their focus because HPC systems are increasingly under cyberthreats. Under the guidance of their program sponsor at DOE, Li and his colleagues began to examine how attackers might exploit these computing technologies.
State-of-the-art HPC systems are hybrid machines comprised of GPUs and CPUs. Those who seek to exploit supercomputers for nefarious purposes would first go for the GPUs – the Achilles heel because of their higher computing capability and because standard security shields don’t cover them.
Li and his CENATE colleagues reasoned that machine learning might be one way to monitor ongoing activities and ultimately block attacks on HPC systems. Such algorithms could be trained to classify events as either normal or malicious.
The team designed recurrent neural networks, machine-learning algorithms that analyzed the signatures of normal versus potentially malicious GPU workloads, with algorithms running on the same computers they’re intended to protect. Most HPC systems have performance counters, which measure the number of events that happen over a given span, such as how much data are fetched from the CPU’s or GPU’s memory and how much power the system is using. Normal and malicious software would produce different values on these counters. “All these things form features that get fed into the neural network in order for it to do its classification,” explains CENATE’s lead and Li’s collaborator Kevin Barker. They used all these different features to draw a line between safe and nefarious applications. The neural network was initially trained with known malicious codes such as password crackers and hashing algorithms.
The CENATE algorithm is a good proof of principle, Li says, and the next step would be to use reinforcement learning based on artificial intelligence so the algorithm might be able to respond in real time. “If you come every time a security operator checks the instance, that attack has already happened,” Li says. “At some point, you might [want to have] some automatic techniques to handle that.”
In the future, this algorithm would be used to protect computational facilities at national laboratories, such as Oak Ridge and Argonne, or other smaller HPC clusters.
Future HPC systems will be more advanced, Li says, with many different kinds of processors. “How to keep them safe will continuously remain a big concern.”
See the full article here.
five-ways-keep-your-child-safe-school-shootings
Please help promote STEM in your local schools.
DEIXIS: Computational Science at the National Laboratories is the frequently updated online companion to the eponymous annual publication of the Computational Science Graduate Fellowship. The Krell Institute manages the program for the U.S. Department of Energy.
DOE and the Computational Science Graduate Fellowship
The Department of Energy mission is to advance the national, economic, and energy security of the United States; to promote scientific and technological innovation in support of that mission; and to ensure the environmental cleanup of the national nuclear weapons complex. Its Computational Science Graduate Fellowship program provides outstanding benefits and opportunities to students pursuing a Ph.D. in scientific or engineering disciplines with an emphasis in high-performance computing.
The Krell Institute
Since it inception in 1997, the Krell Institute has provided superior technical resources, knowledge and experience in managing technology-based education and information programs, including two of the most successful fellowships offered by a U.S. science agency. Krell is named after the advanced civilization that once inhabited the planet Altair IV in the classic 1956 science fiction movie Forbidden Planet.
Reply