BEGIN:VCALENDAR
VERSION:2.0
PRODID:Linklings LLC
BEGIN:VTIMEZONE
TZID:America/New_York
X-LIC-LOCATION:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:19700308T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:19701101T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250626T234541Z
LOCATION:B305
DTSTART;TZID=America/New_York:20241117T143000
DTEND;TZID=America/New_York:20241117T150000
UID:submissions.supercomputing.org_SC24_sess733_ws_shpc104@linklings.com
SUMMARY:Security Testbed for Preempting Attacks against Supercomputing Inf
 rastructure: A Case Study of a Ransomware.
DESCRIPTION:Phuong Cao (University of Illinois Urbana-Champaign, National 
 Center for Supercomputing Applications (NCSA)) and Ravi Iyer and Kalbarczy
 k Zbigniew (University of Illinois Urbana-Champaign)\n\nPreempting attacks
  targeting supercomputing systems before damage remains the top security p
 riority. The main challenge is that noisy attack attempts and unreliable a
 lerts often mask real attacks. This paper describes a security testbed emb
 edded in live traffic of a supercomputer at the National Center for Superc
 omputing Applications (NCSA). The objective is to demonstrate attack preem
 ption, i.e., stopping system compromise and data breaches at petascale sup
 ercomputers. Deployment of our testbed at NCSA enables the following key c
 ontributions: 1) Insights from characterizing unique attack patterns found
  in real security logs of more than 200 security incidents curated in the 
 past two decades at NCSA. 2) Deployment of an attack visualization tool to
  illustrate the challenges of identifying real attacks in HPC environments
  and to support security operators in interactive attack analyses. 3) Demo
 nstrate the testbed's utility by running novel models, such as Factor Grap
 h-Based models, to preempt a real-world ransomware family.\n\nTag: Applica
 tions and Application Frameworks, Artificial Intelligence/Machine Learning
 , Security\n\nRegistration Category: Workshop Reg Pass\n\nSession Chairs: 
 Nael Abu-Ghazaleh (University of California, Riverside); Kevin J. Barker (
 Pacific Northwest National Laboratory (PNNL)); Yang Guo (National Institut
 e of Standards and Technology (NIST)); Joseph Manzano (Pacific Northwest N
 ational Laboratory (PNNL)); Andres Marquez (Pacific Northwest National Lab
 oratory (PNNL)); and Sean Peisert (Lawrence Berkeley National Laboratory (
 LBNL); University of California, Davis)\n\n
END:VEVENT
END:VCALENDAR
