Conveners
Network, Security, Infrastructure & Operations Session: I
- David Kelsey (STFC-RAL)
- Gang Chen (Institute Of High Energy Physics)
Network, Security, Infrastructure & Operations Session: II
- Joy Chan (TWNIC)
- David Groep (Nikhef)
Network, Security, Infrastructure & Operations Session: III
- David Groep (Nikhef)
- Gang Chen (Institute Of High Energy Physics)
Network, Security, Infrastructure & Operations Session: IV
- Joy Chan (TWNIC)
- David Kelsey (STFC-RAL)
Mr
Qingbao Hu
(IHEP)
24/03/2021, 10:30
Network, Security, Infrastructure & Operations
Oral Presentation
At IHEP Computing Center, there are thousands of nodes managed by the htcondor scheduler, with about 12,000 cores, and these nodes provide computing services for multiple experimental groups. In the process of job scheduling, some work nodes will cause jobs abnormal due to some service exception. Under the traditional scheduling method, these abnormal nodes will continue to devour jobs, like...
Dr
Andrei Tsaregorodtsev
(Aix Marseille Univ, CNRS/IN2P3, CPPM, Marseille, France)
24/03/2021, 10:55
Network, Security, Infrastructure & Operations
Oral Presentation
The EGI Workload Manager Service (WMS) is based on the DIRAC Interware and is part of the EOSC Project service catalog. The service provides access to various computing resources of the EGI infrastructure to various scientific communities in Europe and in the world. Different kinds of computing resources can be connected to the Manager: HTC/grid resources, cloud resources or standalone...
Wataru Takase
(KEK)
24/03/2021, 11:20
Network, Security, Infrastructure & Operations
Oral Presentation
The Computing Research Center at High Energy Accelerator Research Organization (KEK) provides various IT services, such as email, WiFi network, data analysis system, etc. A user submits paper application forms to apply those services. Moreover, some services require endorsement by a KEK staff. From the Computing Research Center point of view, we receive applications from many users every day....
Dr
David Kelsey
(STFC-RAL)
24/03/2021, 13:00
Network, Security, Infrastructure & Operations
Oral Presentation
As most are fully aware, cybersecurity attacks are an ever-growing problem as larger parts of our lives take place on-line. Distributed digital infrastructures are no exception and action must be taken to both reduce the security risk and to handle security incidents when they inevitably happen. These activities are carried out by the various e-Infrastructures and in recent years a successful...
Jouke Roorda
(Nikhef)
24/03/2021, 13:30
Network, Security, Infrastructure & Operations
Oral Presentation
Centralizing (and visualizing) what is happening at a compute site enjoys ongoing effort from both industry and the community. An established example is include the ELK stack, importing, storing and visualizing logs, while more recently traffic analysis has gotten more and more attention - especially from WLCG.
At Nikhef, we have attempted to create a reasonable, recreatable SOC design...
Dr
David Crooks
(UKRI STFC)
, Mr
Liviu Valsan
(CERN)
24/03/2021, 14:00
Network, Security, Infrastructure & Operations
Oral Presentation
The information security threats currently faced by the research community are not only sophisticated, but also in many instances highly profitable for the actors involved. Evidence suggests that targeted organisations take on average more than six months to detect a cyber attack; the more sophisticated the attack, the more likely it is that it will pass undetected for longer. Enabling sites...
Mr
Zhongtian Liang
(Institute of High Energy Physics)
25/03/2021, 10:30
Network, Security, Infrastructure & Operations
Oral Presentation
The Institute of high energy physics is operating and launching many large science facilities in China, such as BEPCII in Beijing, CSNS in Guangdong and JUNO in Shenzhen. These large science facilities are facing many network security threats. How to detect and prevent these threats is becoming important.
The domain name system is the cornerstone of Internet services, and most network...
Dr
Wang Jiarong
(IHEP)
25/03/2021, 10:50
Network, Security, Infrastructure & Operations
Oral Presentation
The continued growth of cybersecurity incidents calls for effective cybersecurity monitoring solutions. The operation of security operation centers (SOCs) is the recommended best practice to which large and medium-size enterprises rely for the detection, notification, and ultimately response to cybersecurity incidents. However, traditional SOCs using passive defense can not meet the current...
Mr
Tom Dack
(STFC UKRI)
25/03/2021, 11:10
Network, Security, Infrastructure & Operations
Oral Presentation
Driven by the physics communities supported by UKRI-STFC (UK Research and Innovation Science and Technology Facilities Council) the eInfrastructure for Research and Innovation for STFC, or IRIS, is a collaboration of UKRI STFC, science activities and provider entities in the UK. Over the last few years the UK’s IRIS collaboration and IRIS 4x4 project (£16m as £4m p.a. for four years) has...
Mrs
Jule A. Ziegler
(Leibniz Supercomputing Centre)
25/03/2021, 11:30
Network, Security, Infrastructure & Operations
Oral Presentation
In both higher Research and Education (R&E) as well as in research-/ e-infrastructures (in short: infrastructures), federated access and single sign-on by way of national federations (operated in most cases by NRENs) are used as a means to provide users access to a variety of services. Whereas in national federations institutional accounts (e.g. provided by an university) are typically used to...
Dr
Hirotake Abe
(University of Tsukuba)
26/03/2021, 09:00
Network, Security, Infrastructure & Operations
Oral Presentation
Improving network performance is a key for grid computing system consisting of computational resources and data sources. There have been studies about network performance between them such as file transfer schedulers and network protocols. MPTCP is one of network protocols which has the potential to improve network performance. This protocol treats one TCP flow as one subflow and handle two or...
Dr
David Kelsey
(STFC-RAL)
26/03/2021, 09:30
Network, Security, Infrastructure & Operations
Oral Presentation
The use of IPv6 on the general internet continues to grow. Several Broadband/Mobile-phone companies, such as T-Mobile in the USA and BT/EE in the UK, now use IPv6-only networking with connectivity to the IPv4 legacy world enabled by the use of NAT64/DNS64/464XLAT. Large companies, such as Facebook, use IPv6-only networking within their internal networks, there being good management and...
Mr
Bruno Hoeft
(Karlsruhe Institute of Technology)
26/03/2021, 10:00
Network, Security, Infrastructure & Operations
Oral Presentation
This talk explores the methods and results confirming the baseline assumption that LHCONE traffic is science traffic. The LHCONE (LHC Open Network Environment) is a network conceived to support globally distributed collaborative science. The LHCONE connects thousands of researchers to LHC data sets at hundreds of universities and labs performing analysis within the global collaboration. It is...