Blog
About

7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Enhancing HPC Security with a User-Based Firewall

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          HPC systems traditionally allow their users unrestricted use of their internal network. While this network is normally controlled enough to guarantee privacy without the need for encryption, it does not provide a method to authenticate peer connections. Protocols built upon this internal network must provide their own authentication. Many methods have been employed to perform this authentication. However, support for all of these methods requires the HPC application developer to include support and the user to configure and enable these services. The user-based firewall capability we have prototyped enables a set of rules governing connections across the HPC internal network to be put into place using Linux netfilter. By using an operating system-level capability, the system is not reliant on any developer or user actions to enable security. The rules we have chosen and implemented are crafted to not impact the vast majority of users and be completely invisible to them.

          Related collections

          Most cited references 1

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Clusters and security: distributed security for distributed systems

            Bookmark

            Author and article information

            Journal
            2016-07-11
            Article
            1607.02982

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            Custom metadata
            cs.DC cs.CR

            Security & Cryptology, Networking & Internet architecture

            Comments

            Comment on this article