2 research outputs found

    Protection of a Shared HPC Cluster

    No full text
    International audienceThe security of shared High Performance Com- puting clusters is still an open research problem. Existing solutions deal with sandboxing and Discretionary Access Con- trol for controlling remote connections. Guaranteeing security properties for a shared cluster is complex since users demand an environment at the same time efficient and preventing confidentiality and integrity violations. This paper studies two different approaches for protecting remote interactive accesses against malicious operations. Those two approaches leverage the SELinux protection. They have been successfully implemented using standard MAC from SELinux, and guar- antee supplementary security properties thanks to our PIGA HIPS. The paper compares those two different approaches. It presents a real use case for the security of a shared cluster that allows interactive connections for users while preventing confidentiality and integrity violations. We propose a new approach to extend the protection offered by SELinux. One of the two policies studied previously is used as a basis, and PIGA is used to define new security properties that cannot be guaranteed by SELinux. These new properties are defined in the article, in a language specific to PIGA. Their objective is to prevent complex or indirect malicious activities that use combinations of processes and covert channels. Then PIGA analyses the SELinux policy and finds the remaining allowed illegal activities, either direct or indirect. Finally the article shows how PIGA can be used as an HIPS to enforce these new security properties that cannot be enforced by SELinux alone

    PIGA-HIPS: Protection of a shared HPC cluster

    No full text
    International audienceProtecting a shared High Performance Computing cluster is still an open research problem. Existing solutions deal with sand-boxing and Discretionary Access Control for controlling remote connections. Guaranteeing security properties for a shared cluster is complex since users demand an environment at the same time efficient and preventing confidentiality and integrity violations. This paper proposes two different approaches for protecting remote interactive accesses against malicious operations. Those two approaches leverage the SELinux protection. They have been successfully implemented using standard MAC from SELinux, and guarantee supplementary security properties thanks to our PIGA HIPS. The paper compares those two different approaches. It presents a real use case for the security of a shared cluster that allows interactive connections for users while preventing confidentiality and integrity violations. That paper takes advantage of previous works and goes one step further for protecting shared clusters against malicious activities. It proposes a new framework to share a cluster among partners while guaranteeing advanced security properties. This solution aims to prevent complex or indirect malicious activities that use combinations of processes and covert channels in their attempt to bypass the required properties
    corecore