Conveners
Networking, Security, Infrastructure & Operation Session: I
- David Groep (Nikhef)
Networking, Security, Infrastructure & Operation Session: II
- Joy CHAN ()
Networking, Security, Infrastructure & Operation Session: III
- David Kelsey (STFC-RAL)
Networking, Security, Infrastructure & Operation Session: IV
- Gang Chen (Institute Of High Energy Physics)
Networking, Security, Infrastructure & Operation Session: V
- Kenny HUANG (TWNIC)
Romain Wartel
(CERN)
20/03/2018, 14:00
Networking, Security, Infrastructure & Operations
Oral Presentation
A growing number of organisations realise the only cost-effective mean to protect themselves against cybercrime is to join forces with peer organisations and operate a community-based response to common security threats.
However, organising such a joint response is challenging both from the trust and technical aspects. This presentation provides guidance and advice on how to setup a trust...
Dr
David Crooks
(University of Glasgow)
, Mr
Liviu Valsan
(CERN)
20/03/2018, 14:20
Networking, Security, Infrastructure & Operations
Oral Presentation
The modern security landscape affecting Grid and Cloud sites is evolving to include possible threats from a range of avenues, including social engineering as well as more direct approaches. An effective strategy to defend against these risks must include cooperation between security teams in different contexts. It is essential that sites have the ability to share threat intelligence data with...
Dr
Sven Gabriel
(Nikhef/EGI)
20/03/2018, 14:40
Networking, Security, Infrastructure & Operations
Oral Presentation
The EOSC-hub proposes a new vision to data-driven science, where researchers from
all disciplines have easy, integrated and open access to the advanced digital
services, scientific instruments, data, knowledge and expertise they need to
collaborate to achieve excellence in science, research and innovation.
The process towards the integration of the different security activities will...
Dr
David Kelsey
(STFC-RAL)
20/03/2018, 15:00
Networking, Security, Infrastructure & Operations
Oral Presentation
Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. In many research communities there is an increasing interest in a common approach to FIM as there is obviously a large potential for synergies. FIM4R [1] provides a...
Mr
Liviu Valsan
(CERN)
22/03/2018, 14:00
Networking, Security, Infrastructure & Operations
Oral Presentation
Computer security threats have always been a major concern and continue to increase in frequency and complexity. The nature and techniques of the attacks evolve rapidly over time, making the detection of attacks more difficult, therefore the means and tools used to deal with them need to evolve at the same pace if not faster.
In this paper a system for intrusion detection (IDS) both at the...
Mr
Hanji Shen
(Computer Network Information Center of Chinese Academy of Sciences)
22/03/2018, 14:20
Networking, Security, Infrastructure & Operations
Oral Presentation
With the development of demands in the network security operation, how to assess the network security situation becomes a research hotspot. In order to solve the problem that the security situation of current network cannot be reflected by the alarm information from security equipment, the security situation assessment model based on state transition was built with HMM, by re-searching hosts...
Ms
Hao Hu
(Institute of High Energy Physics)
22/03/2018, 14:40
Networking, Security, Infrastructure & Operations
Oral Presentation
Huge amount of experimental data are produced by large scientific facilities of IHEP, such as Daya Bay, JUNO, LHASSO and CSNS. The performance and efficiency of the data exchange are playing an important role in these scientific research activities.
The quality of data exchange among the members relies heavily on the stability and reliability of the network. The statistics and analysis for...
Ms
Li Wang
(IHEP)
22/03/2018, 15:00
Networking, Security, Infrastructure & Operations
Oral Presentation
The goal of the project is to improve the computing network topology and performance of the China IHEP Data Center taking into account growing numbers of hosts, experiments and computing resources including cloud computing environment.The analysis of the computing performance of the IHEP Data Center in order to optimize its distributed data processing system is a really hard problem due to the...
Dr
Eisaku Sakane
(National Institute of Informatics)
22/03/2018, 16:00
Networking, Security, Infrastructure & Operations
Oral Presentation
Single Sign-on mechanism raises usability of Information Communication Technology (ICT) service and is currently an essential technology. It is an ideal situation for users to be able to receive the desired services with only one credential. However, there is still a situation where they need to use each appropriate credential according to services.
The purpose of this paper is to...
Dr
Muhammad Imran
(National Centre for Physics)
22/03/2018, 16:30
Networking, Security, Infrastructure & Operations
Oral Presentation
National Centre for Physics (NCP) in Pakistan, maintains a large computing infrastructure for scientific community. Major portion of computing and storage resources are reserved for CMS experiment of WLCG project, and small portion of the computing resources are reserved for other non EHEP scientific experiments. For efficient utilization of resources, most of the scientific organizations have...
Mr
Santhosh J
(C_DAC)
22/03/2018, 17:00
Networking, Security, Infrastructure & Operations
Oral Presentation
To improve quality of user support GARUDA Help Desk (GHD) extends single point gateway to Indian national grid computing initiative – GARUDA users. All operational, usage and computing related issues from scientists, academicians, system administrators and network service providers are effectively managed and addressed.
GHD has unified portal to receive queries from users. Over all focus...
Mr
Andreas Schreiber
(German Aerospace Center)
23/03/2018, 09:00
Networking, Security, Infrastructure & Operations
Oral Presentation
In science, results that are not reproducible by peer scientists are valueless and of no significance. Good practices for reproducible science are to publish used codes under Open Source licenses, perform code reviews, save the computational environments with containers (e.g., Docker), use open data formats, use a data management system, and record the provenance of all actions.
This talk...
Mr
Catalin Condurache
(STFC Rutherford Appleton Laboratory)
23/03/2018, 09:30
Networking, Security, Infrastructure & Operations
Oral Presentation
The CernVM File System (CernVM-FS) was developed to assist WLCG High Energy Physics (HEP) collaborations to deploy software on the worldwide distributed computing infrastructure used to run data processing applications. CernVM-FS has been the primary method for distributing WLCG experiment software and condition data for the last 7 years, and in the same period the use of CernVM-FS outside...
Dr
Qiulan Huang
(Institute of High Energy of Physics, Chinese Academy Sciences)
23/03/2018, 10:00
Networking, Security, Infrastructure & Operations
Oral Presentation
The exploitation of a new computing environment has become an urgent practice to overcome a series of challenges with the development of the new generation of High Energy Physics(HEP). LHAASO(Large High Altitude Air Shower Observatory) is expected the most sensitive project to studies the problems in Galactic cosmic ray physics, and requires massive storage and computing power. Efficient...
Mr
Charles Pike
(University of Kentucky)
23/03/2018, 10:50
Networking, Security, Infrastructure & Operations
Oral Presentation
Data-intensive computational techniques such as machine learning, data analytics, and visualization, increasingly require data sets at unprecedented scale - massive sizes that are orders of magnitude larger than previous work. This presents challenges for computer networks. This problem is particularly acute for universities where researchers are increasingly using big data in their research,...
Dr
Muhammad Imran
(National Centre for Physics)
23/03/2018, 11:20
Networking, Security, Infrastructure & Operations
Oral Presentation
Internet traffic has been increasing exponentially over the last few years due to the emergence of new end user applications which are based on cloud computing infrastructure. These applications run on the servers deployed in the data centers and require huge network bandwidths. The data centers are getting more and more importance in our lives because the cloud computing has shifted...