메뉴 건너뛰기




Volumn 17, Issue 13, 2005, Pages 1547-1578

Lightweight monitoring of MPI programs in real time

Author keywords

Anomaly detection; Artificial neural networks; Cluster monitoring; Hidden Markov model; Interposition library; Loadable kernel module; Message passing interface

Indexed keywords

ALGORITHMS; ARTIFICIAL INTELLIGENCE; COMPUTER OPERATING SYSTEMS; DETECTORS;

EID: 27644434963     PISSN: 15320626     EISSN: None     Source Type: Journal    
DOI: 10.1002/cpe.889     Document Type: Article
Times cited : (13)

References (44)
  • 5
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications: Confining the wily hacker
    • San Jose, CA, 1996. USENIX Association: Berkeley, CA
    • Goldberg I, Wagner D, Thomas R, Brewer EA. A secure environment for untrusted helper applications: Confining the wily hacker. Proceedings of the 1996 USENIX Security Symposium, San Jose, CA, 1996. USENIX Association: Berkeley, CA, 1996.
    • (1996) Proceedings of the 1996 USENIX Security Symposium
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.A.4
  • 6
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • IEEE Computer Society Press: Los Alamitos. CA
    • Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs by execution monitoring. Proceedings of the 10th Annual Computer Security Applications Conference. IEEE Computer Society Press: Los Alamitos. CA, 1994; 134-144.
    • (1994) Proceedings of the 10th Annual Computer Security Applications Conference , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 16
    • 84940106242 scopus 로고    scopus 로고
    • Hardening COTS software with generic software wrappers
    • Oakland, CA. 1999. IEEE Computer Society Press: Los Alamitos, CA
    • Fraser T, Badger L, Feldman M. Hardening COTS software with generic software wrappers. Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA. 1999. IEEE Computer Society Press: Los Alamitos, CA, 1999; 399-413.
    • (1999) Proceedings of IEEE Symposium on Security and Privacy , pp. 399-413
    • Fraser, T.1    Badger, L.2    Feldman, M.3
  • 20
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • USENIX Association: Berkeley, CA
    • Loscocco P, Smalley S. Integrating flexible support for security policies into the Linux operating system. Proceedings of 2001 USENIX Annual Technical Conference, FREENIX Track. USENIX Association: Berkeley, CA, 2001; 29-42.
    • (2001) Proceedings of 2001 USENIX Annual Technical Conference, FREENIX Track , pp. 29-42
    • Loscocco, P.1    Smalley, S.2
  • 21
    • 85084160094 scopus 로고
    • Profiling and tracing dynamic library usage via interposition
    • USENIX Association: Berkeley, CA
    • Curry TW. Profiling and tracing dynamic library usage via interposition. Proceedings of the USENIX 1994 Summer Conference. USENIX Association: Berkeley, CA, 1994; 267-278.
    • (1994) Proceedings of the USENIX 1994 Summer Conference , pp. 267-278
    • Curry, T.W.1
  • 22
    • 0006062387 scopus 로고    scopus 로고
    • Generation of application level audit data via library interposition
    • COAST Laboratory, Purdue University
    • Kuperman B, Spafford E. Generation of application level audit data via library interposition. Technical Report TR 99-11, COAST Laboratory, Purdue University, 1998.
    • (1998) Technical Report , vol.TR 99-11
    • Kuperman, B.1    Spafford, E.2
  • 23
    • 85180753454 scopus 로고    scopus 로고
    • User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
    • Jain K, Sekar R. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. Proceedings of the Network and Distributed Systems Security, 2000; 19-34.
    • (2000) Proceedings of the Network and Distributed Systems Security , pp. 19-34
    • Jain, K.1    Sekar, R.2
  • 29
    • 0032598743 scopus 로고    scopus 로고
    • Software fault tolerance in a clustered architecture: Techniques and reliability modeling
    • Snowmass, CO, 1999. IEEE Press: Piscataway, NJ
    • Lyu MR, Mendiratta VB. Software fault tolerance in a clustered architecture: Techniques and reliability modeling. Proceedings of the 1999 IEEE Aerospace Conference, Snowmass, CO, 1999. IEEE Press: Piscataway, NJ, 1999; 141-150.
    • (1999) Proceedings of the 1999 IEEE Aerospace Conference , pp. 141-150
    • Lyu, M.R.1    Mendiratta, V.B.2
  • 33
    • 0030243005 scopus 로고    scopus 로고
    • A high-performance, portable implementation of the MPI message-passing interface standard
    • Gropp W, Lusk E, Doss N, Skjellum A. A high-performance, portable implementation of the MPI message-passing interface standard. Parallel Computing 1996; 22:789-828.
    • (1996) Parallel Computing , vol.22 , pp. 789-828
    • Gropp, W.1    Lusk, E.2    Doss, N.3    Skjellum, A.4
  • 34
    • 0346941337 scopus 로고    scopus 로고
    • A multi-threaded Message Passing Interface (MPI) architecture: Performance and program issues
    • Protopopov B, Skjellum A. A multi-threaded Message Passing Interface (MPI) architecture: Performance and program issues. Journal of Parallel and Distributed Computing 1997; 61(4):449-466.
    • (1997) Journal of Parallel and Distributed Computing , vol.61 , Issue.4 , pp. 449-466
    • Protopopov, B.1    Skjellum, A.2
  • 36
    • 27644502235 scopus 로고    scopus 로고
    • Solving systems of linear equations using LU factorization
    • Mississippi State University
    • Dandass Y. Solving systems of linear equations using LU factorization. Technical Report, Mississippi State University, 1999.
    • (1999) Technical Report
    • Dandass, Y.1
  • 40
    • 27644437094 scopus 로고    scopus 로고
    • Using adaboost with different network topologies for system call analysis
    • Rolla, MO, November
    • Florez G, Boggess L. Using adaboost with different network topologies for system call analysis. Proceedings of the 2002 ANNIE Conference, Rolla, MO, November 2002.
    • (2002) Proceedings of the 2002 ANNIE Conference
    • Florez, G.1    Boggess, L.2
  • 41
    • 27644490136 scopus 로고    scopus 로고
    • Classification of anomalous traces of privileged and parallel programs by neural networks
    • St. Louis, MO, May
    • Liu Z, Bridges S, Vaughn R. Classification of anomalous traces of privileged and parallel programs by neural networks. Proceedings of FUZZIEEE 2003, St. Louis, MO, May 2003.
    • (2003) Proceedings of FUZZIEEE 2003
    • Liu, Z.1    Bridges, S.2    Vaughn, R.3
  • 43
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Rabiner L. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 1989; 77(2):257-286.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.