Jae-Kook Lee, Sungjun Kim, Taeyoung Hong, M. Joh, Huiseung Chae
{"title":"Malicious Activity Against an HPC Service Environment Exhibits a Power-Law-Like Frequency Distribution","authors":"Jae-Kook Lee, Sungjun Kim, Taeyoung Hong, M. Joh, Huiseung Chae","doi":"10.1109/ICUFN.2018.8436667","DOIUrl":null,"url":null,"abstract":"Many researchers often use the HPC (High Performance Computing) service at KISTI via advanced high-speed network technology. In particular, the 4th Supercomputer at KISTI provides HPC services through an internet connection via 10-Gbps high-speed networks. However, there has been an increasing number of cyberattacks targeting the supercomputing services every year. In this study, based on the collected data, we show that the number of cyberattacks against KISTI supercomputing services is increasing every year. In addition, we show that this malicious activity appears to follow a power-law distribution by categorizing the source IP addresses of these attacks based on the originating country and analyzing the frequency of these attacks.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUFN.2018.8436667","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Many researchers often use the HPC (High Performance Computing) service at KISTI via advanced high-speed network technology. In particular, the 4th Supercomputer at KISTI provides HPC services through an internet connection via 10-Gbps high-speed networks. However, there has been an increasing number of cyberattacks targeting the supercomputing services every year. In this study, based on the collected data, we show that the number of cyberattacks against KISTI supercomputing services is increasing every year. In addition, we show that this malicious activity appears to follow a power-law distribution by categorizing the source IP addresses of these attacks based on the originating country and analyzing the frequency of these attacks.