Conveners
Networking, Security & Operations - II
- David Groep (Nikhef and Maastricht University)
Description
Networking and the connected e-Infrastructures are becoming ubiquitous. Ensuring the smooth operation and integrity of the services for research communities in a rapidly changing environment are key challenges. This track focuses on the current state of the art and recent advances in these areas: networking, infrastructure, operations, security and identity management. The scope of this track includes advances in high-performance networking (software defined networks, community private networks, the IPv4 to IPv6 transition, cross-domain provisioning), the connected data and compute infrastructures (storage and compute systems architectures, improving service and site reliability, interoperability between infrastructures, data centre models), monitoring tools and metrics, service management (ITIL and SLAs), and infrastructure/systems operations and management. Also included here are issues related to the integrity, reliability, and security of services and data: developments in security middleware, operational security, security policy, federated identity management, and community management. Submissions related to the general theme of the conference are particularly welcome.
Universities and research institutes have been early adopters of IPv4, which
have served scientific research infrastructure well in the past. But now the
time has come to let go of the legacy protocol with awkward limits, and phase
it out in favour of IPv6.
The World-wide LHC Computing Grid (WLCG) is half-way through the transition
from IPv4 to IPv6, with almost all services now being...
The Authentication and Authorisation for Research and Collaboration (AARC) community, funded by the AAR-TREE project is releasing the AARC Compendium, a comprehensive introductory guide to implementing federated identity management for research infrastructures and their communities. Building on the AARC Blueprint Architecture (AARC BPA), the Compendium bridges the gap between technology,...
In this presentation we will share our experience in providing training for
security personnel providing operational security for different types of large
distributed infrastructures.
Depending on the target audience and the topics to be addressed, these were
developed in two categories, technical hands on training and table top
exercises.
In the first category either a technical...
Network security operations at the Institute of High Energy Physics (IHEP) face severe challenges, including massive data volumes, high alarm complexity, and low manual processing efficiency. While the current Security Operations Center (SOC) system at IHEP has improved cybersecurity operational efficiency to a certain extent through big data platforms and automated workflows, its intelligence...
With the deepening application of large artificial intelligence (AI) models in high energy physics (HEP) data analysis, both data access patterns and storage architectures are undergoing profound transformation. Traditional file systems face performance and scalability bottlenecks when dealing with unstructured data, high-concurrency access, and cross-site data sharing. Object storage, with...