-
Hypersparse Traffic Matrices from Suricata Network Flows using GraphBLAS
Authors:
Michael Houle,
Michael Jones,
Dan Wallmeyer,
Risa Brodeur,
Justin Burr,
Hayden Jananthan,
Sam Merrell,
Peter Michaleas,
Anthony Perez,
Andrew Prout,
Jeremy Kepner
Abstract:
Hypersparse traffic matrices constructed from network packet source and destination addresses is a powerful tool for gaining insights into network traffic. SuiteSparse: GraphBLAS, an open source package or building, manipulating, and analyzing large hypersparse matrices, is one approach to constructing these traffic matrices. Suricata is a widely used open source network intrusion detection softwa…
▽ More
Hypersparse traffic matrices constructed from network packet source and destination addresses is a powerful tool for gaining insights into network traffic. SuiteSparse: GraphBLAS, an open source package or building, manipulating, and analyzing large hypersparse matrices, is one approach to constructing these traffic matrices. Suricata is a widely used open source network intrusion detection software package. This work demonstrates how Suricata network flow records can be used to efficiently construct hypersparse matrices using GraphBLAS.
△ Less
Submitted 18 September, 2024;
originally announced September 2024.
-
HPC with Enhanced User Separation
Authors:
Andrew Prout,
Albert Reuther,
Michael Houle,
Michael Jones,
Peter Michaleas,
LaToya Anderson,
William Arcand,
Bill Bergeron,
David Bestor,
Alex Bonn,
Daniel Burrill,
Chansup Byun,
Vijay Gadepally,
Matthew Hubbell,
Hayden Jananthan,
Piotr Luszczek,
Lauren Milechin,
Guillermo Morales,
Julie Mullen,
Antonio Rosa,
Charles Yee,
Jeremy Kepner
Abstract:
HPC systems used for research run a wide variety of software and workflows. This software is often written or modified by users to meet the needs of their research projects, and rarely is built with security in mind. In this paper we explore several of the key techniques that MIT Lincoln Laboratory Supercomputing Center has deployed on its systems to manage the security implications of these workf…
▽ More
HPC systems used for research run a wide variety of software and workflows. This software is often written or modified by users to meet the needs of their research projects, and rarely is built with security in mind. In this paper we explore several of the key techniques that MIT Lincoln Laboratory Supercomputing Center has deployed on its systems to manage the security implications of these workflows by providing enforced separation for processes, filesystem access, network traffic, and accelerators to make every user feel like they are running on a personal HPC.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
Anonymized Network Sensing Graph Challenge
Authors:
Hayden Jananthan,
Michael Jones,
William Arcand,
David Bestor,
William Bergeron,
Daniel Burrill,
Aydin Buluc,
Chansup Byun,
Timothy Davis,
Vijay Gadepally,
Daniel Grant,
Michael Houle,
Matthew Hubbell,
Piotr Luszczek,
Peter Michaleas,
Lauren Milechin,
Chasen Milner,
Guillermo Morales,
Andrew Morris,
Julie Mullen,
Ritesh Patel,
Alex Pentland,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther
, et al. (4 additional authors not shown)
Abstract:
The MIT/IEEE/Amazon GraphChallenge encourages community approaches to developing new solutions for analyzing graphs and sparse data derived from social media, sensor feeds, and scientific data to discover relationships between events as they unfold in the field. The anonymized network sensing Graph Challenge seeks to enable large, open, community-based approaches to protecting networks. Many large…
▽ More
The MIT/IEEE/Amazon GraphChallenge encourages community approaches to developing new solutions for analyzing graphs and sparse data derived from social media, sensor feeds, and scientific data to discover relationships between events as they unfold in the field. The anonymized network sensing Graph Challenge seeks to enable large, open, community-based approaches to protecting networks. Many large-scale networking problems can only be solved with community access to very broad data sets with the highest regard for privacy and strong community buy-in. Such approaches often require community-based data sharing. In the broader networking community (commercial, federal, and academia) anonymized source-to-destination traffic matrices with standard data sharing agreements have emerged as a data product that can meet many of these requirements. This challenge provides an opportunity to highlight novel approaches for optimizing the construction and analysis of anonymized traffic matrices using over 100 billion network packets derived from the largest Internet telescope in the world (CAIDA). This challenge specifies the anonymization, construction, and analysis of these traffic matrices. A GraphBLAS reference implementation is provided, but the use of GraphBLAS is not required in this Graph Challenge. As with prior Graph Challenges the goal is to provide a well-defined context for demonstrating innovation. Graph Challenge participants are free to select (with accompanying explanation) the Graph Challenge elements that are appropriate for highlighting their innovations.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
What is Normal? A Big Data Observational Science Model of Anonymized Internet Traffic
Authors:
Jeremy Kepner,
Hayden Jananthan,
Michael Jones,
William Arcand,
David Bestor,
William Bergeron,
Daniel Burrill,
Aydin Buluc,
Chansup Byun,
Timothy Davis,
Vijay Gadepally,
Daniel Grant,
Michael Houle,
Matthew Hubbell,
Piotr Luszczek,
Lauren Milechin,
Chasen Milner,
Guillermo Morales,
Andrew Morris,
Julie Mullen,
Ritesh Patel,
Alex Pentland,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther
, et al. (4 additional authors not shown)
Abstract:
Understanding what is normal is a key aspect of protecting a domain. Other domains invest heavily in observational science to develop models of normal behavior to better detect anomalies. Recent advances in high performance graph libraries, such as the GraphBLAS, coupled with supercomputers enables processing of the trillions of observations required. We leverage this approach to synthesize low-pa…
▽ More
Understanding what is normal is a key aspect of protecting a domain. Other domains invest heavily in observational science to develop models of normal behavior to better detect anomalies. Recent advances in high performance graph libraries, such as the GraphBLAS, coupled with supercomputers enables processing of the trillions of observations required. We leverage this approach to synthesize low-parameter observational models of anonymized Internet traffic with a high regard for privacy.
△ Less
Submitted 4 September, 2024;
originally announced September 2024.
-
LLload: Simplifying Real-Time Job Monitoring for HPC Users
Authors:
Chansup Byun,
Julia Mullen,
Albert Reuther,
William Arcand,
William Bergeron,
David Bestor,
Daniel Burrill,
Vijay Gadepally,
Michael Houle,
Matthew Hubbell,
Hayden Jananthan,
Michael Jones,
Peter Michaleas,
Guillermo Morales,
Andrew Prout,
Antonio Rosa,
Charles Yee,
Jeremy Kepner,
Lauren Milechin
Abstract:
One of the more complex tasks for researchers using HPC systems is performance monitoring and tuning of their applications. Developing a practice of continuous performance improvement, both for speed-up and efficient use of resources is essential to the long term success of both the HPC practitioner and the research project. Profiling tools provide a nice view of the performance of an application…
▽ More
One of the more complex tasks for researchers using HPC systems is performance monitoring and tuning of their applications. Developing a practice of continuous performance improvement, both for speed-up and efficient use of resources is essential to the long term success of both the HPC practitioner and the research project. Profiling tools provide a nice view of the performance of an application but often have a steep learning curve and rarely provide an easy to interpret view of resource utilization. Lower level tools such as top and htop provide a view of resource utilization for those familiar and comfortable with Linux but a barrier for newer HPC practitioners. To expand the existing profiling and job monitoring options, the MIT Lincoln Laboratory Supercomputing Center created LLoad, a tool that captures a snapshot of the resources being used by a job on a per user basis. LLload is a tool built from standard HPC tools that provides an easy way for a researcher to track resource usage of active jobs. We explain how the tool was designed and implemented and provide insight into how it is used to aid new researchers in developing their performance monitoring skills as well as guide researchers in their resource requests.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
Teaching Network Traffic Matrices in an Interactive Game Environment
Authors:
Chasen Milner,
Hayden Jananthan,
Jeremy Kepner,
Vijay Gadepally,
Michael Jones,
Peter Michaleas,
Ritesh Patel,
Sandeep Pisharody,
Gabriel Wachman,
Alex Pentland
Abstract:
The Internet has become a critical domain for modern society that requires ongoing efforts for its improvement and protection. Network traffic matrices are a powerful tool for understanding and analyzing networks and are broadly taught in online graph theory educational resources. Network traffic matrix concepts are rarely available in online computer network and cybersecurity educational resource…
▽ More
The Internet has become a critical domain for modern society that requires ongoing efforts for its improvement and protection. Network traffic matrices are a powerful tool for understanding and analyzing networks and are broadly taught in online graph theory educational resources. Network traffic matrix concepts are rarely available in online computer network and cybersecurity educational resources. To fill this gap, an interactive game environment has been developed to teach the foundations of traffic matrices to the computer networking community. The game environment provides a convenient, broadly accessible, delivery mechanism that enables making material available rapidly to a wide audience. The core architecture of the game is a facility to add new network traffic matrix training modules via an easily editable JSON file. Using this facility an initial set of modules were rapidly created covering: basic traffic matrices, traffic patterns, security/defense/deterrence, a notional cyber attack, a distributed denial-of-service (DDoS) attack, and a variety of graph theory concepts. The game environment enables delivery in a wide range of contexts to enable rapid feedback and improvement. The game can be used as a core unit as part of a formal course or as a simple interactive introduction in a presentation.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Testing RadiX-Nets: Advances in Viable Sparse Topologies
Authors:
Kevin Kwak,
Zack West,
Hayden Jananthan,
Jeremy Kepner
Abstract:
The exponential growth of data has sparked computational demands on ML research and industry use. Sparsification of hyper-parametrized deep neural networks (DNNs) creates simpler representations of complex data. Past research has shown that some sparse networks achieve similar performance as dense ones, reducing runtime and storage. RadiX-Nets, a subgroup of sparse DNNs, maintain uniformity which…
▽ More
The exponential growth of data has sparked computational demands on ML research and industry use. Sparsification of hyper-parametrized deep neural networks (DNNs) creates simpler representations of complex data. Past research has shown that some sparse networks achieve similar performance as dense ones, reducing runtime and storage. RadiX-Nets, a subgroup of sparse DNNs, maintain uniformity which counteracts their lack of neural connections. Generation, independent of a dense network, yields faster asymptotic training and removes the need for costly pruning. However, little work has been done on RadiX-Nets, making testing challenging. This paper presents a testing suite for RadiX-Nets in TensorFlow. We test RadiX-Net performance to streamline processing in scalable models, revealing relationships between network topology, initialization, and training behavior. We also encounter "strange models" that train inconsistently and to lower accuracy while models of similar sparsity train well.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Fuzzy Relational Databases via Associative Arrays
Authors:
Kevin Min,
Hayden Jananthan,
Jeremy Kepner
Abstract:
The increasing rise in artificial intelligence has made the use of imprecise language in computer programs like ChatGPT more prominent. Fuzzy logic addresses this form of imprecise language by introducing the concept of fuzzy sets, where elements belong to the set with a certain membership value (called the fuzzy value). This paper combines fuzzy data with relational algebra to provide the mathema…
▽ More
The increasing rise in artificial intelligence has made the use of imprecise language in computer programs like ChatGPT more prominent. Fuzzy logic addresses this form of imprecise language by introducing the concept of fuzzy sets, where elements belong to the set with a certain membership value (called the fuzzy value). This paper combines fuzzy data with relational algebra to provide the mathematical foundation for a fuzzy database querying language, describing various useful operations in the language of linear algebra and multiset operations, in addition to rigorously proving key identities.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
From Bits to Insights: Exploring Network Traffic, Traffic Matrices, and Heavy-Tailed Data
Authors:
Christopher Howard,
Hayden Jananthan,
Jeremy Kepner
Abstract:
With the Internet a central component of modern society, entire industries and fields have developed both in support and against cybersecurity. For cyber operators to best understand their networks, they must conduct detailed traffic analyses. A growing recognition is the ubiquity of heavy-tailed characteristics in network traffic. However, a thorough analysis of cybersecurity programs suggests li…
▽ More
With the Internet a central component of modern society, entire industries and fields have developed both in support and against cybersecurity. For cyber operators to best understand their networks, they must conduct detailed traffic analyses. A growing recognition is the ubiquity of heavy-tailed characteristics in network traffic. However, a thorough analysis of cybersecurity programs suggests little statistics educational background, worsened by the observation that college-level statistics courses largely lack heavy-tailed content, meaning cyber operators are both ill-equipped to appropriately analyze their network traffic and unable to easily access resources that could help. In response, we developed an accessible Jupyter Notebook module that guides individuals--regardless of statistical background--through traffic matrix creation, heavy-tailed data identification, data visualization, and distribution fitting. Such content empowers cyber operators, improving analyses and design.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Algebraic Conditions on One-Step Breadth-First Search
Authors:
Emma Fu,
Hayden Jananthan,
Jeremy Kepner
Abstract:
The GraphBLAS community has demonstrated the power of linear algebra-leveraged graph algorithms, such as matrix-vector products for breadth-first search (BFS) traversals. This paper investigates the algebraic conditions needed for such computations when working with directed hypergraphs, represented by incidence arrays with entries from an arbitrary value set with binary addition and multiplicatio…
▽ More
The GraphBLAS community has demonstrated the power of linear algebra-leveraged graph algorithms, such as matrix-vector products for breadth-first search (BFS) traversals. This paper investigates the algebraic conditions needed for such computations when working with directed hypergraphs, represented by incidence arrays with entries from an arbitrary value set with binary addition and multiplication operations. Our results show the one-step BFS traversal is equivalent to requiring specific algebraic properties of those operations. Assuming identity elements 0, 1 for operations, we show that the two operations must be zero-sum-free, zero-divisor-free, and 0 must be an annihilator under multiplication. Additionally, associativity and commutativity are shown to be necessary and sufficient for independence of the one-step BFS computation from several arbitrary conventions. These results aid in application and algorithm development by determining the efficacy of a value set in computations.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU
Authors:
William Bergeron,
Michael Jones,
Chase Barber,
Kale DeYoung,
George Amariucai,
Kaleb Ernst,
Nathan Fleming,
Peter Michaleas,
Sandeep Pisharody,
Nathan Wells,
Antonio Rosa,
Eugene Vasserman,
Jeremy Kepner
Abstract:
Low-power small form factor data processing units (DPUs) enable offloading and acceleration of a broad range of networking and security services. DPUs have accelerated the transition to programmable networking by enabling the replacement of FPGAs/ASICs in a wide range of network oriented devices. The GraphBLAS sparse matrix graph open standard math library is well-suited for constructing anonymize…
▽ More
Low-power small form factor data processing units (DPUs) enable offloading and acceleration of a broad range of networking and security services. DPUs have accelerated the transition to programmable networking by enabling the replacement of FPGAs/ASICs in a wide range of network oriented devices. The GraphBLAS sparse matrix graph open standard math library is well-suited for constructing anonymized hypersparse traffic matrices of network traffic which can enable a wide range of network analytics. This paper measures the performance of the GraphBLAS on an ARM based NVIDIA DPU (BlueField 2) and, to the best of our knowledge, represents the first reported GraphBLAS results on a DPU and/or ARM based system. Anonymized hypersparse traffic matrices were constructed at a rate of over 18 million packets per second.
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
Lincoln AI Computing Survey (LAICS) Update
Authors:
Albert Reuther,
Peter Michaleas,
Michael Jones,
Vijay Gadepally,
Siddharth Samsi,
Jeremy Kepner
Abstract:
This paper is an update of the survey of AI accelerators and processors from past four years, which is now called the Lincoln AI Computing Survey - LAICS (pronounced "lace"). As in past years, this paper collects and summarizes the current commercial accelerators that have been publicly announced with peak performance and peak power consumption numbers. The performance and power values are plotted…
▽ More
This paper is an update of the survey of AI accelerators and processors from past four years, which is now called the Lincoln AI Computing Survey - LAICS (pronounced "lace"). As in past years, this paper collects and summarizes the current commercial accelerators that have been publicly announced with peak performance and peak power consumption numbers. The performance and power values are plotted on a scatter graph, and a number of dimensions and observations from the trends on this plot are again discussed and analyzed. Market segments are highlighted on the scatter plot, and zoomed plots of each segment are also included. Finally, a brief description of each of the new accelerators that have been added in the survey this year is included.
△ Less
Submitted 13 October, 2023;
originally announced October 2023.
-
From Words to Watts: Benchmarking the Energy Costs of Large Language Model Inference
Authors:
Siddharth Samsi,
Dan Zhao,
Joseph McDonald,
Baolin Li,
Adam Michaleas,
Michael Jones,
William Bergeron,
Jeremy Kepner,
Devesh Tiwari,
Vijay Gadepally
Abstract:
Large language models (LLMs) have exploded in popularity due to their new generative capabilities that go far beyond prior state-of-the-art. These technologies are increasingly being leveraged in various domains such as law, finance, and medicine. However, these models carry significant computational challenges, especially the compute and energy costs required for inference. Inference energy costs…
▽ More
Large language models (LLMs) have exploded in popularity due to their new generative capabilities that go far beyond prior state-of-the-art. These technologies are increasingly being leveraged in various domains such as law, finance, and medicine. However, these models carry significant computational challenges, especially the compute and energy costs required for inference. Inference energy costs already receive less attention than the energy costs of training LLMs -- despite how often these large models are called on to conduct inference in reality (e.g., ChatGPT). As these state-of-the-art LLMs see increasing usage and deployment in various domains, a better understanding of their resource utilization is crucial for cost-savings, scaling performance, efficient hardware usage, and optimal inference strategies.
In this paper, we describe experiments conducted to study the computational and energy utilization of inference with LLMs. We benchmark and conduct a preliminary analysis of the inference performance and inference energy costs of different sizes of LLaMA -- a recent state-of-the-art LLM -- developed by Meta AI on two generations of popular GPUs (NVIDIA V100 \& A100) and two datasets (Alpaca and GSM8K) to reflect the diverse set of tasks/benchmarks for LLMs in research and practice. We present the results of multi-node, multi-GPU inference using model sharding across up to 32 GPUs. To our knowledge, our work is the one of the first to study LLM inference performance from the perspective of computational and energy resources at this scale.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Mapping of Internet "Coastlines" via Large Scale Anonymized Network Source Correlations
Authors:
Hayden Jananthan,
Jeremy Kepner,
Michael Jones,
William Arcand,
David Bestor,
William Bergeron,
Chansup Byun,
Timothy Davis,
Vijay Gadepally,
Daniel Grant,
Michael Houle,
Matthew Hubbell,
Anna Klein,
Lauren Milechin,
Guillermo Morales,
Andrew Morris,
Julie Mullen,
Ritesh Patel,
Alex Pentland,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Tyler Trigg
, et al. (3 additional authors not shown)
Abstract:
Expanding the scientific tools available to protect computer networks can be aided by a deeper understanding of the underlying statistical distributions of network traffic and their potential geometric interpretations. Analyses of large scale network observations provide a unique window into studying those underlying statistics. Newly developed GraphBLAS hypersparse matrices and D4M associative ar…
▽ More
Expanding the scientific tools available to protect computer networks can be aided by a deeper understanding of the underlying statistical distributions of network traffic and their potential geometric interpretations. Analyses of large scale network observations provide a unique window into studying those underlying statistics. Newly developed GraphBLAS hypersparse matrices and D4M associative array technologies enable the efficient anonymized analysis of network traffic on the scale of trillions of events. This work analyzes over 100,000,000,000 anonymized packets from the largest Internet telescope (CAIDA) and over 10,000,000 anonymized sources from the largest commercial honeyfarm (GreyNoise). Neither CAIDA nor GreyNoise actively emit Internet traffic and provide distinct observations of unsolicited Internet traffic (primarily botnets and scanners). Analysis of these observations confirms the previously observed Cauchy-like distributions describing temporal correlations between Internet sources. The Gull lighthouse problem is a well-known geometric characterization of the standard Cauchy distribution and motivates a potential geometric interpretation for Internet observations. This work generalizes the Gull lighthouse problem to accommodate larger classes of coastlines, deriving a closed-form solution for the resulting probability distributions, stating and examining the inverse problem of identifying an appropriate coastline given a continuous probability distribution, identifying a geometric heuristic for solving this problem computationally, and applying that heuristic to examine the temporal geometry of different subsets of network observations. Application of this method to the CAIDA and GreyNoise data reveals a several orders of magnitude difference between known benign and other traffic which can lead to potentially novel ways to protect networks.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
pPython Performance Study
Authors:
Chansup Byun,
William Arcand,
David Bestor,
Bill Bergeron,
Vijay Gadepally,
Michael Houle,
Matthew Hubbell,
Hayden Jananthan,
Michael Jones,
Anna Klein,
Peter Michaleas,
Lauren Milechin,
Guillermo Morales,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Jeremy Kepner
Abstract:
pPython seeks to provide a parallel capability that provides good speed-up without sacrificing the ease of programming in Python by implementing partitioned global array semantics (PGAS) on top of a simple file-based messaging library (PythonMPI) in pure Python. pPython follows a SPMD (single program multiple data) model of computation. pPython runs on a single-node (e.g., a laptop) running Window…
▽ More
pPython seeks to provide a parallel capability that provides good speed-up without sacrificing the ease of programming in Python by implementing partitioned global array semantics (PGAS) on top of a simple file-based messaging library (PythonMPI) in pure Python. pPython follows a SPMD (single program multiple data) model of computation. pPython runs on a single-node (e.g., a laptop) running Windows, Linux, or MacOS operating systems or on any combination of heterogeneous systems that support Python, including on a cluster through a Slurm scheduler interface so that pPython can be executed in a massively parallel computing environment. It is interesting to see what performance pPython can achieve compared to the traditional socket-based MPI communication because of its unique file-based messaging implementation. In this paper, we present the point-to-point and collective communication performances of pPython and compare them with those obtained by using mpi4py with OpenMPI. For large messages, pPython demonstrates comparable performance as compared to mpi4py.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Deployment of Real-Time Network Traffic Analysis using GraphBLAS Hypersparse Matrices and D4M Associative Arrays
Authors:
Michael Jones,
Jeremy Kepner,
Andrew Prout,
Timothy Davis,
William Arcand,
David Bestor,
William Bergeron,
Chansup Byun,
Vijay Gadepally,
Micheal Houle,
Matthew Hubbell,
Hayden Jananthan,
Anna Klein,
Lauren Milechin,
Guillermo Morales,
Julie Mullen,
Ritesh Patel,
Sandeep Pisharody,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Peter Michaleas
Abstract:
Matrix/array analysis of networks can provide significant insight into their behavior and aid in their operation and protection. Prior work has demonstrated the analytic, performance, and compression capabilities of GraphBLAS (graphblas.org) hypersparse matrices and D4M (d4m.mit.edu) associative arrays (a mathematical superset of matrices). Obtaining the benefits of these capabilities requires int…
▽ More
Matrix/array analysis of networks can provide significant insight into their behavior and aid in their operation and protection. Prior work has demonstrated the analytic, performance, and compression capabilities of GraphBLAS (graphblas.org) hypersparse matrices and D4M (d4m.mit.edu) associative arrays (a mathematical superset of matrices). Obtaining the benefits of these capabilities requires integrating them into operational systems, which comes with its own unique challenges. This paper describes two examples of real-time operational implementations. First, is an operational GraphBLAS implementation that constructs anonymized hypersparse matrices on a high-bandwidth network tap. Second, is an operational D4M implementation that analyzes daily cloud gateway logs. The architectures of these implementations are presented. Detailed measurements of the resources and the performance are collected and analyzed. The implementations are capable of meeting their operational requirements using modest computational resources (a couple of processing cores). GraphBLAS is well-suited for low-level analysis of high-bandwidth connections with relatively structured network data. D4M is well-suited for higher-level analysis of more unstructured data. This work demonstrates that these technologies can be implemented in operational settings.
△ Less
Submitted 8 December, 2023; v1 submitted 4 September, 2023;
originally announced September 2023.
-
Focusing and Calibration of Large Scale Network Sensors using GraphBLAS Anonymized Hypersparse Matrices
Authors:
Jeremy Kepner,
Michael Jones,
Phil Dykstra,
Chansup Byun,
Timothy Davis,
Hayden Jananthan,
William Arcand,
David Bestor,
William Bergeron,
Vijay Gadepally,
Micheal Houle,
Matthew Hubbell,
Anna Klein,
Lauren Milechin,
Guillermo Morales,
Julie Mullen,
Ritesh Patel,
Alex Pentland,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Tyler Trigg,
Charles Yee
, et al. (1 additional authors not shown)
Abstract:
Defending community-owned cyber space requires community-based efforts. Large-scale network observations that uphold the highest regard for privacy are key to protecting our shared cyberspace. Deployment of the necessary network sensors requires careful sensor placement, focusing, and calibration with significant volumes of network observations. This paper demonstrates novel focusing and calibrati…
▽ More
Defending community-owned cyber space requires community-based efforts. Large-scale network observations that uphold the highest regard for privacy are key to protecting our shared cyberspace. Deployment of the necessary network sensors requires careful sensor placement, focusing, and calibration with significant volumes of network observations. This paper demonstrates novel focusing and calibration procedures on a multi-billion packet dataset using high-performance GraphBLAS anonymized hypersparse matrices. The run-time performance on a real-world data set confirms previously observed real-time processing rates for high-bandwidth links while achieving significant data compression. The output of the analysis demonstrates the effectiveness of these procedures at focusing the traffic matrix and revealing the underlying stable heavy-tail statistical distributions that are necessary for anomaly detection. A simple model of the corresponding probability of detection ($p_{\rm d}$) and probability of false alarm ($p_{\rm fa}$) for these distributions highlights the criticality of network sensor focusing and calibration. Once a sensor is properly focused and calibrated it is then in a position to carry out two of the central tenets of good cybersecurity: (1) continuous observation of the network and (2) minimizing unbrokered network connections.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Are ChatGPT and Other Similar Systems the Modern Lernaean Hydras of AI?
Authors:
Dimitrios Ioannidis,
Jeremy Kepner,
Andrew Bowne,
Harriet S. Bryant
Abstract:
The rise of Generative Artificial Intelligence systems ("AI systems") has created unprecedented social engagement. AI code generation systems provide responses (output) to questions or requests by accessing the vast library of open-source code created by developers over the past few decades. However, they do so by allegedly stealing the open-source code stored in virtual libraries, known as reposi…
▽ More
The rise of Generative Artificial Intelligence systems ("AI systems") has created unprecedented social engagement. AI code generation systems provide responses (output) to questions or requests by accessing the vast library of open-source code created by developers over the past few decades. However, they do so by allegedly stealing the open-source code stored in virtual libraries, known as repositories. This Article focuses on how this happens and whether there is a solution that protects innovation and avoids years of litigation. We also touch upon the array of issues raised by the relationship between AI and copyright. Looking ahead, we propose the following: (a) immediate changes to the licenses for open-source code created by developers that will limit access and/or use of any open-source code to humans only; (b) we suggest revisions to the Massachusetts Institute of Technology ("MIT") license so that AI systems are required to procure appropriate licenses from open-source code developers, which we believe will harmonize standards and build social consensus for the benefit of all of humanity, rather than promote profit-driven centers of innovation; (c) we call for urgent legislative action to protect the future of AI systems while also promoting innovation; and (d) we propose a shift in the burden of proof to AI systems in obfuscation cases.
△ Less
Submitted 30 January, 2024; v1 submitted 15 June, 2023;
originally announced June 2023.
-
AI Enabled Maneuver Identification via the Maneuver Identification Challenge
Authors:
Kaira Samuel,
Matthew LaRosa,
Kyle McAlpin,
Morgan Schaefer,
Brandon Swenson,
Devin Wasilefsky,
Yan Wu,
Dan Zhao,
Jeremy Kepner
Abstract:
Artificial intelligence (AI) has enormous potential to improve Air Force pilot training by providing actionable feedback to pilot trainees on the quality of their maneuvers and enabling instructor-less flying familiarization for early-stage trainees in low-cost simulators. Historically, AI challenges consisting of data, problem descriptions, and example code have been critical to fueling AI breakt…
▽ More
Artificial intelligence (AI) has enormous potential to improve Air Force pilot training by providing actionable feedback to pilot trainees on the quality of their maneuvers and enabling instructor-less flying familiarization for early-stage trainees in low-cost simulators. Historically, AI challenges consisting of data, problem descriptions, and example code have been critical to fueling AI breakthroughs. The Department of the Air Force-Massachusetts Institute of Technology AI Accelerator (DAF-MIT AI Accelerator) developed such an AI challenge using real-world Air Force flight simulator data. The Maneuver ID challenge assembled thousands of virtual reality simulator flight recordings collected by actual Air Force student pilots at Pilot Training Next (PTN). This dataset has been publicly released at Maneuver-ID.mit.edu and represents the first of its kind public release of USAF flight training data. Using this dataset, we have applied a variety of AI methods to separate "good" vs "bad" simulator data and categorize and characterize maneuvers. These data, algorithms, and software are being released as baselines of model performance for others to build upon to enable the AI ecosystem for flight simulator training.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
AI and ML Accelerator Survey and Trends
Authors:
Albert Reuther,
Peter Michaleas,
Michael Jones,
Vijay Gadepally,
Siddharth Samsi,
Jeremy Kepner
Abstract:
This paper updates the survey of AI accelerators and processors from past three years. This paper collects and summarizes the current commercial accelerators that have been publicly announced with peak performance and power consumption numbers. The performance and power values are plotted on a scatter graph, and a number of dimensions and observations from the trends on this plot are again discuss…
▽ More
This paper updates the survey of AI accelerators and processors from past three years. This paper collects and summarizes the current commercial accelerators that have been publicly announced with peak performance and power consumption numbers. The performance and power values are plotted on a scatter graph, and a number of dimensions and observations from the trends on this plot are again discussed and analyzed. Two new trends plots based on accelerator release dates are included in this year's paper, along with the additional trends of some neuromorphic, photonic, and memristor-based inference accelerators.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
Hypersparse Network Flow Analysis of Packets with GraphBLAS
Authors:
Tyler Trigg,
Chad Meiners,
Sandeep Pisharody,
Hayden Jananthan,
Michael Jones,
Adam Michaleas,
Timothy Davis,
Erik Welch,
William Arcand,
David Bestor,
William Bergeron,
Chansup Byun,
Vijay Gadepally,
Micheal Houle,
Matthew Hubbell,
Anna Klein,
Peter Michaleas,
Lauren Milechin,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Doug Stetson,
Charles Yee
, et al. (1 additional authors not shown)
Abstract:
Internet analysis is a major challenge due to the volume and rate of network traffic. In lieu of analyzing traffic as raw packets, network analysts often rely on compressed network flows (netflows) that contain the start time, stop time, source, destination, and number of packets in each direction. However, many traffic analyses benefit from temporal aggregation of multiple simultaneous netflows,…
▽ More
Internet analysis is a major challenge due to the volume and rate of network traffic. In lieu of analyzing traffic as raw packets, network analysts often rely on compressed network flows (netflows) that contain the start time, stop time, source, destination, and number of packets in each direction. However, many traffic analyses benefit from temporal aggregation of multiple simultaneous netflows, which can be computationally challenging. To alleviate this concern, a novel netflow compression and resampling method has been developed leveraging GraphBLAS hyperspace traffic matrices that preserve anonymization while enabling subrange analysis. Standard multitemporal spatial analyses are then performed on each subrange to generate detailed statistical aggregates of the source packets, source fan-out, unique links, destination fan-in, and destination packets of each subrange which can then be used for background modeling and anomaly detection. A simple file format based on GraphBLAS sparse matrices is developed for storing these statistical aggregates. This method is scale tested on the MIT SuperCloud using a 50 trillion packet netflow corpus from several hundred sites collected over several months. The resulting compression achieved is significant (<0.1 bit per packet) enabling extremely large netflow analyses to be stored and transported. The single node parallel performance is analyzed in terms of both processors and threads showing that a single node can perform hundreds of simultaneous analyses at over a million packets/sec (roughly equivalent to a 10 Gigabit link).
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic (Enriquecimiento a gran escala y caracterización cibernética estadÃstica del tráfico de red)
Authors:
Ivan Kawaminami,
Arminda Estrada,
Youssef Elsakkary,
Hayden Jananthan,
Aydın Buluç,
Tim Davis,
Daniel Grant,
Michael Jones,
Chad Meiners,
Andrew Morris,
Sandeep Pisharody,
Jeremy Kepner
Abstract:
Modern network sensors continuously produce enormous quantities of raw data that are beyond the capacity of human analysts. Cross-correlation of network sensors increases this challenge by enriching every network event with additional metadata. These large volumes of enriched network data present opportunities to statistically characterize network traffic and quickly answer a key question: "What a…
▽ More
Modern network sensors continuously produce enormous quantities of raw data that are beyond the capacity of human analysts. Cross-correlation of network sensors increases this challenge by enriching every network event with additional metadata. These large volumes of enriched network data present opportunities to statistically characterize network traffic and quickly answer a key question: "What are the primary cyber characteristics of my network data?" The Python GraphBLAS and PyD4M analysis frameworks enable anonymized statistical analysis to be performed quickly and efficiently on very large network data sets. This approach is tested using billions of anonymized network data samples from the largest Internet observatory (CAIDA Telescope) and tens of millions of anonymized records from the largest commercially available background enrichment capability (GreyNoise). The analysis confirms that most of the enriched variables follow expected heavy-tail distributions and that a large fraction of the network traffic is due to a small number of cyber activities. This information can simplify the cyber analysts' task by enabling prioritization of cyber activities based on statistical prevalence.
--
Los sensores de red modernos producen enormes cantidades de datos sin procesar que están más allá de la capacidad del análisis humano. Una correlación cruzada de sensores de red se convierte en un desafÃo al enriquecer cada evento de red con metadatos adicionales. Estos grandes volúmenes de datos de red enriquecidos presentan una oportunidad para caracterizar estadÃsticamente el tráfico de red y responder a la pregunta: "?Cuáles son las principales caracterÃsticas cibernéticas de mis datos de red?" Los esquemas de análisis de Python GraphBLAS y D4M permiten realizar análisis estadÃsticos anónimos, rápidos y eficientes en conjuntos grandes de datos de red. Este enfoque se prueba utilizando miles de millones de muestras de datos de red anónimos del observatorio de Internet más grande (Telescopio CAIDA) y decenas de millones de registros anónimos del fondo comercial con la mayor capacidad de enriquecimiento (GreyNoise). El análisis confirma que la mayorÃa de las variables enriquecidas siguen las distribuciones de cola pesada y que una gran fracción del tráfico de red se debe a una pequena cantidad de actividades cibernéticas. Esta información puede simplificar la tarea de los analistas cibernéticos al permitir la priorización de las actividades cibernéticas en función de la prevalencia estadÃstica.
△ Less
Submitted 1 December, 2022; v1 submitted 7 September, 2022;
originally announced September 2022.
-
Python Implementation of the Dynamic Distributed Dimensional Data Model
Authors:
Hayden Jananthan,
Lauren Milechin,
Michael Jones,
William Arcand,
William Bergeron,
David Bestor,
Chansup Byun,
Michael Houle,
Matthew Hubbell,
Vijay Gadepally,
Anna Klein,
Peter Michaleas,
Guillermo Morales,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Jeremy Kepner
Abstract:
Python has become a standard scientific computing language with fast-growing support of machine learning and data analysis modules, as well as an increasing usage of big data. The Dynamic Distributed Dimensional Data Model (D4M) offers a highly composable, unified data model with strong performance built to handle big data fast and efficiently. In this work we present an implementation of D4M in P…
▽ More
Python has become a standard scientific computing language with fast-growing support of machine learning and data analysis modules, as well as an increasing usage of big data. The Dynamic Distributed Dimensional Data Model (D4M) offers a highly composable, unified data model with strong performance built to handle big data fast and efficiently. In this work we present an implementation of D4M in Python. $D4M.py$ implements all foundational functionality of D4M and includes Accumulo and SQL database support via Graphulo. We describe the mathematical background and motivation, an explanation of the approaches made for its fundamental functions and building blocks, and performance results which compare $D4M.py$'s performance to D4M-MATLAB and D4M.jl.
△ Less
Submitted 22 November, 2022; v1 submitted 1 September, 2022;
originally announced September 2022.
-
pPython for Parallel Python Programming
Authors:
Chansup Byun,
William Arcand,
David Bestor,
Bill Bergeron,
Vijay Gadepally,
Michael Houle,
Matthew Hubbell,
Hayden Jananthan,
Michael Jones,
Kurt Keville,
Anna Klein,
Peter Michaleas,
Lauren Milechin,
Guillermo Morales,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Jeremy Kepner
Abstract:
pPython seeks to provide a parallel capability that provides good speed-up without sacrificing the ease of programming in Python by implementing partitioned global array semantics (PGAS) on top of a simple file-based messaging library (PythonMPI) in pure Python. The core data structure in pPython is a distributed numerical array whose distribution onto multiple processors is specified with a map c…
▽ More
pPython seeks to provide a parallel capability that provides good speed-up without sacrificing the ease of programming in Python by implementing partitioned global array semantics (PGAS) on top of a simple file-based messaging library (PythonMPI) in pure Python. The core data structure in pPython is a distributed numerical array whose distribution onto multiple processors is specified with a map construct. Communication operations between distributed arrays are abstracted away from the user and pPython transparently supports redistribution between any block-cyclic-overlapped distributions in up to four dimensions. pPython follows a SPMD (single program multiple data) model of computation. pPython runs on any combination of heterogeneous systems that support Python, including Windows, Linux, and MacOS operating systems. In addition to running transparently on single-node (e.g., a laptop), pPython provides a scheduler interface, so that pPython can be executed in a massively parallel computing environment. The initial implementation uses the Slurm scheduler. Performance of pPython on the HPC Challenge benchmark suite demonstrates both ease of programming and scalability.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Apiary: A DBMS-Integrated Transactional Function-as-a-Service Framework
Authors:
Peter Kraft,
Qian Li,
Kostis Kaffes,
Athinagoras Skiadopoulos,
Deeptaanshu Kumar,
Danny Cho,
Jason Li,
Robert Redmond,
Nathan Weckwerth,
Brian Xia,
Peter Bailis,
Michael Cafarella,
Goetz Graefe,
Jeremy Kepner,
Christos Kozyrakis,
Michael Stonebraker,
Lalith Suresh,
Xiangyao Yu,
Matei Zaharia
Abstract:
Developers increasingly use function-as-a-service (FaaS) platforms for data-centric applications that perform low-latency and transactional operations on data, such as for microservices or web serving. Unfortunately, existing FaaS platforms support these applications poorly because they physically and logically separate application logic, executed in cloud functions, from data management, done in…
▽ More
Developers increasingly use function-as-a-service (FaaS) platforms for data-centric applications that perform low-latency and transactional operations on data, such as for microservices or web serving. Unfortunately, existing FaaS platforms support these applications poorly because they physically and logically separate application logic, executed in cloud functions, from data management, done in interactive transactions accessing remote storage. Physical separation harms performance while logical separation complicates efficiently providing transactional guarantees and fault tolerance.
This paper introduces Apiary, a novel DBMS-integrated FaaS platform for deploying and composing fault-tolerant transactional functions. Apiary physically co-locates and logically integrates function execution and data management by wrapping a distributed DBMS engine and using it as a unified runtime for function execution, data management, and operational logging, thus providing similar or stronger transactional guarantees as comparable systems while greatly improving performance and observability. To allow developers to write complex stateful programs, we leverage this integration to enable efficient and fault-tolerant function composition, building a frontend for orchestrating workflows of functions with the guarantees that each workflow runs to completion and each function in a workflow executes exactly once. We evaluate Apiary against research and production FaaS platforms and show it outperforms them by 2--68x on microservice workloads by reducing communication overhead.
△ Less
Submitted 30 June, 2023; v1 submitted 27 August, 2022;
originally announced August 2022.
-
Developing a Series of AI Challenges for the United States Department of the Air Force
Authors:
Vijay Gadepally,
Gregory Angelides,
Andrei Barbu,
Andrew Bowne,
Laura J. Brattain,
Tamara Broderick,
Armando Cabrera,
Glenn Carl,
Ronisha Carter,
Miriam Cha,
Emilie Cowen,
Jesse Cummings,
Bill Freeman,
James Glass,
Sam Goldberg,
Mark Hamilton,
Thomas Heldt,
Kuan Wei Huang,
Phillip Isola,
Boris Katz,
Jamie Koerner,
Yen-Chen Lin,
David Mayo,
Kyle McAlpin,
Taylor Perron
, et al. (17 additional authors not shown)
Abstract:
Through a series of federal initiatives and orders, the U.S. Government has been making a concerted effort to ensure American leadership in AI. These broad strategy documents have influenced organizations such as the United States Department of the Air Force (DAF). The DAF-MIT AI Accelerator is an initiative between the DAF and MIT to bridge the gap between AI researchers and DAF mission requireme…
▽ More
Through a series of federal initiatives and orders, the U.S. Government has been making a concerted effort to ensure American leadership in AI. These broad strategy documents have influenced organizations such as the United States Department of the Air Force (DAF). The DAF-MIT AI Accelerator is an initiative between the DAF and MIT to bridge the gap between AI researchers and DAF mission requirements. Several projects supported by the DAF-MIT AI Accelerator are developing public challenge problems that address numerous Federal AI research priorities. These challenges target priorities by making large, AI-ready datasets publicly available, incentivizing open-source solutions, and creating a demand signal for dual use technologies that can stimulate further research. In this article, we describe these public challenges being developed and how their application contributes to scientific advances.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
The MIT Supercloud Workload Classification Challenge
Authors:
Benny J. Tang,
Qiqi Chen,
Matthew L. Weiss,
Nathan Frey,
Joseph McDonald,
David Bestor,
Charles Yee,
William Arcand,
Chansup Byun,
Daniel Edelman,
Matthew Hubbell,
Michael Jones,
Jeremy Kepner,
Anna Klein,
Adam Michaleas,
Peter Michaleas,
Lauren Milechin,
Julia Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Andrew Bowne,
Lindsey McEvoy,
Baolin Li,
Devesh Tiwari
, et al. (2 additional authors not shown)
Abstract:
High-Performance Computing (HPC) centers and cloud providers support an increasingly diverse set of applications on heterogenous hardware. As Artificial Intelligence (AI) and Machine Learning (ML) workloads have become an increasingly larger share of the compute workloads, new approaches to optimized resource usage, allocation, and deployment of new AI frameworks are needed. By identifying compute…
▽ More
High-Performance Computing (HPC) centers and cloud providers support an increasingly diverse set of applications on heterogenous hardware. As Artificial Intelligence (AI) and Machine Learning (ML) workloads have become an increasingly larger share of the compute workloads, new approaches to optimized resource usage, allocation, and deployment of new AI frameworks are needed. By identifying compute workloads and their utilization characteristics, HPC systems may be able to better match available resources with the application demand. By leveraging datacenter instrumentation, it may be possible to develop AI-based approaches that can identify workloads and provide feedback to researchers and datacenter operators for improving operational efficiency. To enable this research, we released the MIT Supercloud Dataset, which provides detailed monitoring logs from the MIT Supercloud cluster. This dataset includes CPU and GPU usage by jobs, memory usage, and file system logs. In this paper, we present a workload classification challenge based on this dataset. We introduce a labelled dataset that can be used to develop new approaches to workload classification and present initial results based on existing approaches. The goal of this challenge is to foster algorithmic innovations in the analysis of compute workloads that can achieve higher accuracy than existing methods. Data and code will be made publicly available via the Datacenter Challenge website : https://dcc.mit.edu.
△ Less
Submitted 13 April, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic
Authors:
Michael Jones,
Jeremy Kepner,
Daniel Andersen,
Aydin Buluc,
Chansup Byun,
K Claffy,
Timothy Davis,
William Arcand,
Jonathan Bernays,
David Bestor,
William Bergeron,
Vijay Gadepally,
Micheal Houle,
Matthew Hubbell,
Hayden Jananthan,
Anna Klein,
Chad Meiners,
Lauren Milechin,
Julie Mullen,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Jon Sreekanth
, et al. (3 additional authors not shown)
Abstract:
Long range detection is a cornerstone of defense in many operating domains (land, sea, undersea, air, space, ..,). In the cyber domain, long range detection requires the analysis of significant network traffic from a variety of observatories and outposts. Construction of anonymized hypersparse traffic matrices on edge network devices can be a key enabler by providing significant data compression i…
▽ More
Long range detection is a cornerstone of defense in many operating domains (land, sea, undersea, air, space, ..,). In the cyber domain, long range detection requires the analysis of significant network traffic from a variety of observatories and outposts. Construction of anonymized hypersparse traffic matrices on edge network devices can be a key enabler by providing significant data compression in a rapidly analyzable format that protects privacy. GraphBLAS is ideally suited for both constructing and analyzing anonymized hypersparse traffic matrices. The performance of GraphBLAS on an Accolade Technologies edge network device is demonstrated on a near worse case traffic scenario using a continuous stream of CAIDA Telescope darknet packets. The performance for varying numbers of traffic buffers, threads, and processor cores is explored. Anonymized hypersparse traffic matrices can be constructed at a rate of over 50,000,000 packets per second; exceeding a typical 400 Gigabit network link. This performance demonstrates that anonymized hypersparse traffic matrices are readily computable on edge network devices with minimal compute resources and can be a viable data product for such devices.
△ Less
Submitted 5 September, 2022; v1 submitted 25 March, 2022;
originally announced March 2022.
-
Temporal Correlation of Internet Observatories and Outposts
Authors:
Jeremy Kepner,
Michael Jones,
Daniel Andersen,
Aydın Buluç,
Chansup Byun,
K Claffy,
Timothy Davis,
William Arcand,
Jonathan Bernays,
David Bestor,
William Bergeron,
Vijay Gadepally,
Daniel Grant,
Micheal Houle,
Matthew Hubbell,
Hayden Jananthan,
Anna Klein,
Chad Meiners,
Lauren Milechin,
Andrew Morris,
Julie Mullen,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther,
Antonio Rosa
, et al. (4 additional authors not shown)
Abstract:
The Internet has become a critical component of modern civilization requiring scientific exploration akin to endeavors to understand the land, sea, air, and space environments. Understanding the baseline statistical distributions of traffic are essential to the scientific understanding of the Internet. Correlating data from different Internet observatories and outposts can be a useful tool for gai…
▽ More
The Internet has become a critical component of modern civilization requiring scientific exploration akin to endeavors to understand the land, sea, air, and space environments. Understanding the baseline statistical distributions of traffic are essential to the scientific understanding of the Internet. Correlating data from different Internet observatories and outposts can be a useful tool for gaining insights into these distributions. This work compares observed sources from the largest Internet telescope (the CAIDA darknet telescope) with those from a commercial outpost (the GreyNoise honeyfarm). Neither of these locations actively emit Internet traffic and provide distinct observations of unsolicited Internet traffic (primarily botnets and scanners). Newly developed GraphBLAS hyperspace matrices and D4M associative array technologies enable the efficient analysis of these data on significant scales. The CAIDA sources are well approximated by a Zipf-Mandelbrot distribution. Over a 6-month period 70\% of the brightest (highest frequency) sources in the CAIDA telescope are consistently detected by coeval observations in the GreyNoise honeyfarm. This overlap drops as the sources dim (reduce frequency) and as the time difference between the observations grows. The probability of seeing a CAIDA source is proportional to the logarithm of the brightness. The temporal correlations are well described by a modified Cauchy distribution. These observations are consistent with a correlated high frequency beam of sources that drifts on a time scale of a month.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
New Phenomena in Large-Scale Internet Traffic
Authors:
Jeremy Kepner,
Kenjiro Cho,
KC Claffy,
Vijay Gadepally,
Sarah McGuire,
Lauren Milechin,
William Arcand,
David Bestor,
William Bergeron,
Chansup Byun,
Matthew Hubbell,
Michael Houle,
Michael Jones,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Peter Michaleas
Abstract:
The Internet is transforming our society, necessitating a quantitative understanding of Internet traffic. Our team collects and curates the largest publicly available Internet traffic data sets. An analysis of 50 billion packets using 10,000 processors in the MIT SuperCloud reveals a new phenomenon: the importance of otherwise unseen leaf nodes and isolated links in Internet traffic. Our analysis…
▽ More
The Internet is transforming our society, necessitating a quantitative understanding of Internet traffic. Our team collects and curates the largest publicly available Internet traffic data sets. An analysis of 50 billion packets using 10,000 processors in the MIT SuperCloud reveals a new phenomenon: the importance of otherwise unseen leaf nodes and isolated links in Internet traffic. Our analysis further shows that a two-parameter modified Zipf-Mandelbrot distribution accurately describes a wide variety of source/destination statistics on moving sample windows ranging from 100{,}000 to 100{,}000{,}000 packets over collections that span years and continents. The measured model parameters distinguish different network streams, and the model leaf parameter strongly correlates with the fraction of the traffic in different underlying network topologies.
△ Less
Submitted 16 January, 2022;
originally announced January 2022.
-
Zero Botnets: An Observe-Pursue-Counter Approach
Authors:
Jeremy Kepner,
Jonathan Bernays,
Stephen Buckley,
Kenjiro Cho,
Cary Conrad,
Leslie Daigle,
Keeley Erhardt,
Vijay Gadepally,
Barry Greene,
Michael Jones,
Robert Knake,
Bruce Maggs,
Peter Michaleas,
Chad Meiners,
Andrew Morris,
Alex Pentland,
Sandeep Pisharody,
Sarah Powazek,
Andrew Prout,
Philip Reiner,
Koichi Suzuki,
Kenji Takahashi,
Tony Tauber,
Leah Walker,
Douglas Stetson
Abstract:
Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the…
▽ More
Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the presence of botnets on the Internet, with the aspirational target of zero, is a powerful vision for galvanizing policy action. Setting a global goal, encouraging international cooperation, creating incentives for improving networks, and supporting entities for botnet takedowns are among several policies that could advance this goal. These policies raise significant questions regarding proper authorities/access that cannot be answered in the abstract. Systems analysis has been widely used in other domains to achieve sufficient detail to enable these questions to be dealt with in concrete terms. Defeating botnets using an observe-pursue-counter architecture is analyzed, the technical feasibility is affirmed, and the authorities/access questions are significantly narrowed. Recommended next steps include: supporting the international botnet takedown community, expanding network observatories, enhancing the underlying network science at scale, conducting detailed systems analysis, and developing appropriate policy frameworks.
△ Less
Submitted 16 January, 2022;
originally announced January 2022.
-
Realizing Forward Defense in the Cyber Domain
Authors:
Sandeep Pisharody,
Jonathan Bernays,
Vijay Gadepally,
Michael Jones,
Jeremy Kepner,
Chad Meiners,
Peter Michaleas,
Adam Tse,
Doug Stetson
Abstract:
With the recognition of cyberspace as an operating domain, concerted effort is now being placed on addressing it in the whole-of-domain manner found in land, sea, undersea, air, and space domains. Among the first steps in this effort is applying the standard supporting concepts of security, defense, and deterrence to the cyber domain. This paper presents an architecture that helps realize forward…
▽ More
With the recognition of cyberspace as an operating domain, concerted effort is now being placed on addressing it in the whole-of-domain manner found in land, sea, undersea, air, and space domains. Among the first steps in this effort is applying the standard supporting concepts of security, defense, and deterrence to the cyber domain. This paper presents an architecture that helps realize forward defense in cyberspace, wherein adversarial actions are repulsed as close to the origin as possible. However, substantial work remains in making the architecture an operational reality including furthering fundamental research cyber science, conducting design trade-off analysis, and developing appropriate public policy frameworks.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Naming Schema for a Human Brain-Scale Neural Network
Authors:
Morgan Schaefer,
Lauren Michelin,
Jeremy Kepner
Abstract:
Deep neural networks have become increasingly large and sparse, allowing for the storage of large-scale neural networks with decreased costs of storage and computation. Storage of a neural network with as many connections as the human brain is possible with current versions of the high-performance Apache Accumulo database and the Distributed Dimensional Data Model (D4M) software. Neural networks o…
▽ More
Deep neural networks have become increasingly large and sparse, allowing for the storage of large-scale neural networks with decreased costs of storage and computation. Storage of a neural network with as many connections as the human brain is possible with current versions of the high-performance Apache Accumulo database and the Distributed Dimensional Data Model (D4M) software. Neural networks of such large scale may be of particular interest to scientists within the human brain Connectome community. To aid in research and understanding of artificial neural networks that parallel existing neural networks like the brain, a naming schema can be developed to label groups of neurons in the artificial network that parallel those in the brain. Groups of artificial neurons are able to be specifically labeled in small regions for future study.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
AI Accelerator Survey and Trends
Authors:
Albert Reuther,
Peter Michaleas,
Michael Jones,
Vijay Gadepally,
Siddharth Samsi,
Jeremy Kepner
Abstract:
Over the past several years, new machine learning accelerators were being announced and released every month for a variety of applications from speech recognition, video object detection, assisted driving, and many data center applications. This paper updates the survey of AI accelerators and processors from past two years. This paper collects and summarizes the current commercial accelerators tha…
▽ More
Over the past several years, new machine learning accelerators were being announced and released every month for a variety of applications from speech recognition, video object detection, assisted driving, and many data center applications. This paper updates the survey of AI accelerators and processors from past two years. This paper collects and summarizes the current commercial accelerators that have been publicly announced with peak performance and power consumption numbers. The performance and power values are plotted on a scatter graph, and a number of dimensions and observations from the trends on this plot are again discussed and analyzed. This year, we also compile a list of benchmarking performance results and compute the computational efficiency with respect to peak performance.
△ Less
Submitted 18 September, 2021;
originally announced September 2021.
-
3D Real-Time Supercomputer Monitoring
Authors:
Bill Bergeron,
Matthew Hubbell,
Dylan Sequeira,
Winter Williams,
William Arcand,
David Bestor,
Chansup,
Byun,
Vijay Gadepally,
Michael Houle,
Michael Jones,
Anna Klien,
Peter Michaleas,
Lauren Milechin,
Julie Mullen Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Jeremy Kepner
Abstract:
Supercomputers are complex systems producing vast quantities of performance data from multiple sources and of varying types. Performance data from each of the thousands of nodes in a supercomputer tracks multiple forms of storage, memory, networks, processors, and accelerators. Optimization of application performance is critical for cost effective usage of a supercomputer and requires efficient me…
▽ More
Supercomputers are complex systems producing vast quantities of performance data from multiple sources and of varying types. Performance data from each of the thousands of nodes in a supercomputer tracks multiple forms of storage, memory, networks, processors, and accelerators. Optimization of application performance is critical for cost effective usage of a supercomputer and requires efficient methods for effectively viewing performance data. The combination of supercomputing analytics and 3D gaming visualization enables real-time processing and visual data display of massive amounts of information that humans can process quickly with little training. Our system fully utilizes the capabilities of modern 3D gaming environments to create novel representations of computing hardware which intuitively represent the physical attributes of the supercomputer while displaying real-time alerts and component utilization. This system allows operators to quickly assess how the supercomputer is being used, gives users visibility into the resources they are consuming, and provides instructors new ways to interactively teach the computing architecture concepts necessary for efficient computing
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
Supercomputing Enabled Deployable Analytics for Disaster Response
Authors:
Kaira Samuel,
Jeremy Kepner,
Michael Jones,
Lauren Milechin,
Vijay Gadepally,
William Arcand,
David Bestor,
William Bergeron,
Chansup Byun,
Matthew Hubbell,
Michael Houle,
Anna Klein,
Victor Lopez,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Sid Samsi,
Charles Yee,
Peter Michaleas
Abstract:
First responders and other forward deployed essential workers can benefit from advanced analytics. Limited network access and software security requirements prevent the usage of standard cloud based microservice analytic platforms that are typically used in industry. One solution is to precompute a wide range of analytics as files that can be used with standard preinstalled software that does not…
▽ More
First responders and other forward deployed essential workers can benefit from advanced analytics. Limited network access and software security requirements prevent the usage of standard cloud based microservice analytic platforms that are typically used in industry. One solution is to precompute a wide range of analytics as files that can be used with standard preinstalled software that does not require network access or additional software and can run on a wide range of legacy hardware. In response to the COVID-19 pandemic, this approach was tested for providing geo-spatial census data to allow quick analysis of demographic data for better responding to emergencies. These data were processed using the MIT SuperCloud to create several thousand Google Earth and Microsoft Excel files representative of many advanced analytics. The fast mapping of census data using Google Earth and Microsoft Excel has the potential to give emergency responders a powerful tool to improve emergency preparedness. Our approach displays relevant census data (total population, population under 15, population over 65, median age) per census block, sorted by county, through a Microsoft Excel spreadsheet (xlsx file) and Google Earth map (kml file). The spreadsheet interface includes features that allow users to convert between different longitude and latitude coordinate units. For the Google Earth files, a variety of absolute and relative colors maps of population density have been explored to provide an intuitive and meaningful interface. Using several hundred cores on the MIT SuperCloud, new analytics can be generated in a few minutes.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Maneuver Identification Challenge
Authors:
Kaira Samuel,
Vijay Gadepally,
David Jacobs,
Michael Jones,
Kyle McAlpin,
Kyle Palko,
Ben Paulk,
Sid Samsi,
Ho Chit Siu,
Charles Yee,
Jeremy Kepner
Abstract:
AI algorithms that identify maneuvers from trajectory data could play an important role in improving flight safety and pilot training. AI challenges allow diverse teams to work together to solve hard problems and are an effective tool for developing AI solutions. AI challenges are also a key driver of AI computational requirements. The Maneuver Identification Challenge hosted at maneuver-id.mit.ed…
▽ More
AI algorithms that identify maneuvers from trajectory data could play an important role in improving flight safety and pilot training. AI challenges allow diverse teams to work together to solve hard problems and are an effective tool for developing AI solutions. AI challenges are also a key driver of AI computational requirements. The Maneuver Identification Challenge hosted at maneuver-id.mit.edu provides thousands of trajectories collected from pilots practicing in flight simulators, descriptions of maneuvers, and examples of these maneuvers performed by experienced pilots. Each trajectory consists of positions, velocities, and aircraft orientations normalized to a common coordinate system. Construction of the data set required significant data architecture to transform flight simulator logs into AI ready data, which included using a supercomputer for deduplication and data conditioning. There are three proposed challenges. The first challenge is separating physically plausible (good) trajectories from unfeasible (bad) trajectories. Human labeled good and bad trajectories are provided to aid in this task. Subsequent challenges are to label trajectories with their intended maneuvers and to assess the quality of those maneuvers.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Node-Based Job Scheduling for Large Scale Simulations of Short Running Jobs
Authors:
Chansup Byun,
William Arcand,
David Bestor,
Bill Bergeron,
Vijay Gadepally,
Michael Houle,
Matthew Hubbell,
Michael Jones,
Anna Klein,
Peter Michaleas,
Lauren Milechin,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Jeremy Kepner
Abstract:
Diverse workloads such as interactive supercomputing, big data analysis, and large-scale AI algorithm development, requires a high-performance scheduler. This paper presents a novel node-based scheduling approach for large scale simulations of short running jobs on MIT SuperCloud systems, that allows the resources to be fully utilized for both long running batch jobs while simultaneously providing…
▽ More
Diverse workloads such as interactive supercomputing, big data analysis, and large-scale AI algorithm development, requires a high-performance scheduler. This paper presents a novel node-based scheduling approach for large scale simulations of short running jobs on MIT SuperCloud systems, that allows the resources to be fully utilized for both long running batch jobs while simultaneously providing fast launch and release of large-scale short running jobs. The node-based scheduling approach has demonstrated up to 100 times faster scheduler performance that other state-of-the-art systems.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Spatial Temporal Analysis of 40,000,000,000,000 Internet Darkspace Packets
Authors:
Jeremy Kepner,
Michael Jones,
Daniel Andersen,
Aydin Buluc,
Chansup Byun,
K Claffy,
Timothy Davis,
William Arcand,
Jonathan Bernays,
David Bestor,
William Bergeron,
Vijay Gadepally,
Micheal Houle,
Matthew Hubbell,
Anna Klein,
Chad Meiners,
Lauren Milechin,
Julie Mullen,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Doug Stetson,
Adam Tse
, et al. (2 additional authors not shown)
Abstract:
The Internet has never been more important to our society, and understanding the behavior of the Internet is essential. The Center for Applied Internet Data Analysis (CAIDA) Telescope observes a continuous stream of packets from an unsolicited darkspace representing 1/256 of the Internet. During 2019 and 2020 over 40,000,000,000,000 unique packets were collected representing the largest ever assem…
▽ More
The Internet has never been more important to our society, and understanding the behavior of the Internet is essential. The Center for Applied Internet Data Analysis (CAIDA) Telescope observes a continuous stream of packets from an unsolicited darkspace representing 1/256 of the Internet. During 2019 and 2020 over 40,000,000,000,000 unique packets were collected representing the largest ever assembled public corpus of Internet traffic. Using the combined resources of the Supercomputing Centers at UC San Diego, Lawrence Berkeley National Laboratory, and MIT, the spatial temporal structure of anonymized source-destination pairs from the CAIDA Telescope data has been analyzed with GraphBLAS hierarchical hypersparse matrices. These analyses provide unique insight on this unsolicited Internet darkspace traffic with the discovery of many previously unseen scaling relations. The data show a significant sustained increase in unsolicited traffic corresponding to the start of the COVID19 pandemic, but relatively little change in the underlying scaling relations associated with unique sources, source fan-outs, unique links, destination fan-ins, and unique destinations. This work provides a demonstration of the practical feasibility and benefit of the safe collection and analysis of significant quantities of anonymized Internet traffic.
△ Less
Submitted 14 August, 2021;
originally announced August 2021.
-
Vertical, Temporal, and Horizontal Scaling of Hierarchical Hypersparse GraphBLAS Matrices
Authors:
Jeremy Kepner,
Tim Davis,
Chansup Byun,
William Arcand,
David Bestor,
William Bergeron,
Vijay Gadepally,
Matthew Hubbell,
Michael Houle,
Michael Jones,
Anna Klein,
Lauren Milechin,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Peter Michaleas
Abstract:
Hypersparse matrices are a powerful enabler for a variety of network, health, finance, and social applications. Hierarchical hypersparse GraphBLAS matrices enable rapid streaming updates while preserving algebraic analytic power and convenience. In many contexts, the rate of these updates sets the bounds on performance. This paper explores hierarchical hypersparse update performance on a variety o…
▽ More
Hypersparse matrices are a powerful enabler for a variety of network, health, finance, and social applications. Hierarchical hypersparse GraphBLAS matrices enable rapid streaming updates while preserving algebraic analytic power and convenience. In many contexts, the rate of these updates sets the bounds on performance. This paper explores hierarchical hypersparse update performance on a variety of hardware with identical software configurations. The high-level language bindings of the GraphBLAS readily enable performance experiments on simultaneous diverse hardware. The best single process performance measured was 4,000,000 updates per second. The best single node performance measured was 170,000,000 updates per second. The hardware used spans nearly a decade and allows a direct comparison of hardware improvements for this computation over this time range; showing a 2x increase in single-core performance, a 3x increase in single process performance, and a 5x increase in single node performance. Running on nearly 2,000 MIT SuperCloud nodes simultaneously achieved a sustained update rate of over 200,000,000,000 updates per second. Hierarchical hypersparse GraphBLAS allows the MIT SuperCloud to analyze extremely large streaming network data sets.
△ Less
Submitted 14 August, 2021;
originally announced August 2021.
-
The MIT Supercloud Dataset
Authors:
Siddharth Samsi,
Matthew L Weiss,
David Bestor,
Baolin Li,
Michael Jones,
Albert Reuther,
Daniel Edelman,
William Arcand,
Chansup Byun,
John Holodnack,
Matthew Hubbell,
Jeremy Kepner,
Anna Klein,
Joseph McDonald,
Adam Michaleas,
Peter Michaleas,
Lauren Milechin,
Julia Mullen,
Charles Yee,
Benjamin Price,
Andrew Prout,
Antonio Rosa,
Allan Vanterpool,
Lindsey McEvoy,
Anson Cheng
, et al. (2 additional authors not shown)
Abstract:
Artificial intelligence (AI) and Machine learning (ML) workloads are an increasingly larger share of the compute workloads in traditional High-Performance Computing (HPC) centers and commercial cloud systems. This has led to changes in deployment approaches of HPC clusters and the commercial cloud, as well as a new focus on approaches to optimized resource usage, allocations and deployment of new…
▽ More
Artificial intelligence (AI) and Machine learning (ML) workloads are an increasingly larger share of the compute workloads in traditional High-Performance Computing (HPC) centers and commercial cloud systems. This has led to changes in deployment approaches of HPC clusters and the commercial cloud, as well as a new focus on approaches to optimized resource usage, allocations and deployment of new AI frame- works, and capabilities such as Jupyter notebooks to enable rapid prototyping and deployment. With these changes, there is a need to better understand cluster/datacenter operations with the goal of developing improved scheduling policies, identifying inefficiencies in resource utilization, energy/power consumption, failure prediction, and identifying policy violations. In this paper we introduce the MIT Supercloud Dataset which aims to foster innovative AI/ML approaches to the analysis of large scale HPC and datacenter/cloud operations. We provide detailed monitoring logs from the MIT Supercloud system, which include CPU and GPU usage by jobs, memory usage, file system logs, and physical monitoring data. This paper discusses the details of the dataset, collection methodology, data availability, and discusses potential challenge problems being developed using this data. Datasets and future challenge announcements will be available via https://dcc.mit.edu.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Hybrid Power-Law Models of Network Traffic
Authors:
Pat Devlin,
Jeremy Kepner,
Ashley Luo,
Erin Meger
Abstract:
The availability of large scale streaming network data has reinforced the ubiquity of power-law distributions in observations and enabled precision measurements of the distribution parameters. The increased accuracy of these measurements allows new underlying generative network models to be explored. The preferential attachment model is a natural starting point for these models. This work adds add…
▽ More
The availability of large scale streaming network data has reinforced the ubiquity of power-law distributions in observations and enabled precision measurements of the distribution parameters. The increased accuracy of these measurements allows new underlying generative network models to be explored. The preferential attachment model is a natural starting point for these models. This work adds additional model components to account for observed phenomena in the distributions. In this model, preferential attachment is supplemented to provide a more accurate theoretical model of network traffic. Specifically, a probabilistic complex network model is proposed using preferential attachment as well as additional parameters to describe the newly observed prevalence of leaves and unattached nodes. Example distributions from this model are generated by considering random sampling of the networks created by the model in such a way that replicates the current data collection methods.
△ Less
Submitted 29 March, 2021;
originally announced March 2021.
-
Mathematics of Digital Hyperspace
Authors:
Jeremy Kepner,
Timothy Davis,
Vijay Gadepally,
Hayden Jananthan,
Lauren Milechin
Abstract:
Social media, e-commerce, streaming video, e-mail, cloud documents, web pages, traffic flows, and network packets fill vast digital lakes, rivers, and oceans that we each navigate daily. This digital hyperspace is an amorphous flow of data supported by continuous streams that stretch standard concepts of type and dimension. The unstructured data of digital hyperspace can be elegantly represented,…
▽ More
Social media, e-commerce, streaming video, e-mail, cloud documents, web pages, traffic flows, and network packets fill vast digital lakes, rivers, and oceans that we each navigate daily. This digital hyperspace is an amorphous flow of data supported by continuous streams that stretch standard concepts of type and dimension. The unstructured data of digital hyperspace can be elegantly represented, traversed, and transformed via the mathematics of hypergraphs, hypersparse matrices, and associative array algebra. This paper explores a novel mathematical concept, the semilink, that combines pairs of semirings to provide the essential operations for graph analytics, database operations, and machine learning. The GraphBLAS standard currently supports hypergraphs, hypersparse matrices, the mathematics required for semilinks, and seamlessly performs graph, network, and matrix operations. With the addition of key based indices (such as pointers to strings) and semilinks, GraphBLAS can become a richer associative array algebra and be a plug-in replacement for spreadsheets, database tables, and data centric operating systems, enhancing the navigation of unstructured data found in digital hyperspace.
△ Less
Submitted 28 March, 2021;
originally announced March 2021.
-
Survey of Machine Learning Accelerators
Authors:
Albert Reuther,
Peter Michaleas,
Michael Jones,
Vijay Gadepally,
Siddharth Samsi,
Jeremy Kepner
Abstract:
New machine learning accelerators are being announced and released each month for a variety of applications from speech recognition, video object detection, assisted driving, and many data center applications. This paper updates the survey of of AI accelerators and processors from last year's IEEE-HPEC paper. This paper collects and summarizes the current accelerators that have been publicly annou…
▽ More
New machine learning accelerators are being announced and released each month for a variety of applications from speech recognition, video object detection, assisted driving, and many data center applications. This paper updates the survey of of AI accelerators and processors from last year's IEEE-HPEC paper. This paper collects and summarizes the current accelerators that have been publicly announced with performance and power consumption numbers. The performance and power values are plotted on a scatter graph and a number of dimensions and observations from the trends on this plot are discussed and analyzed. For instance, there are interesting trends in the plot regarding power consumption, numerical precision, and inference versus training. This year, there are many more announced accelerators that are implemented with many more architectures and technologies from vector engines, dataflow engines, neuromorphic designs, flash-based analog memory processing, and photonic-based processing.
△ Less
Submitted 31 August, 2020;
originally announced September 2020.
-
Accuracy and Performance Comparison of Video Action Recognition Approaches
Authors:
Matthew Hutchinson,
Siddharth Samsi,
William Arcand,
David Bestor,
Bill Bergeron,
Chansup Byun,
Micheal Houle,
Matthew Hubbell,
Micheal Jones,
Jeremy Kepner,
Andrew Kirby,
Peter Michaleas,
Lauren Milechin,
Julie Mullen,
Andrew Prout,
Antonio Rosa,
Albert Reuther,
Charles Yee,
Vijay Gadepally
Abstract:
Over the past few years, there has been significant interest in video action recognition systems and models. However, direct comparison of accuracy and computational performance results remain clouded by differing training environments, hardware specifications, hyperparameters, pipelines, and inference methods. This article provides a direct comparison between fourteen off-the-shelf and state-of-t…
▽ More
Over the past few years, there has been significant interest in video action recognition systems and models. However, direct comparison of accuracy and computational performance results remain clouded by differing training environments, hardware specifications, hyperparameters, pipelines, and inference methods. This article provides a direct comparison between fourteen off-the-shelf and state-of-the-art models by ensuring consistency in these training characteristics in order to provide readers with a meaningful comparison across different types of video action recognition algorithms. Accuracy of the models is evaluated using standard Top-1 and Top-5 accuracy metrics in addition to a proposed new accuracy metric. Additionally, we compare computational performance of distributed training from two to sixty-four GPUs on a state-of-the-art HPC system.
△ Less
Submitted 20 August, 2020;
originally announced August 2020.
-
Benchmarking network fabrics for data distributed training of deep neural networks
Authors:
Siddharth Samsi,
Andrew Prout,
Michael Jones,
Andrew Kirby,
Bill Arcand,
Bill Bergeron,
David Bestor,
Chansup Byun,
Vijay Gadepally,
Michael Houle,
Matthew Hubbell,
Anna Klein,
Peter Michaleas,
Lauren Milechin,
Julie Mullen,
Antonio Rosa,
Charles Yee,
Albert Reuther,
Jeremy Kepner
Abstract:
Artificial Intelligence/Machine Learning applications require the training of complex models on large amounts of labelled data. The large computational requirements for training deep models have necessitated the development of new methods for faster training. One such approach is the data parallel approach, where the training data is distributed across multiple compute nodes. This approach is simp…
▽ More
Artificial Intelligence/Machine Learning applications require the training of complex models on large amounts of labelled data. The large computational requirements for training deep models have necessitated the development of new methods for faster training. One such approach is the data parallel approach, where the training data is distributed across multiple compute nodes. This approach is simple to implement and supported by most of the commonly used machine learning frameworks. The data parallel approach leverages MPI for communicating gradients across all nodes. In this paper, we examine the effects of using different physical hardware interconnects and network-related software primitives for enabling data distributed deep learning. We compare the effect of using GPUDirect and NCCL on Ethernet and OmniPath fabrics. Our results show that using Ethernet-based networking in shared HPC systems does not have a significant effect on the training times for commonly used deep neural network architectures or traditional HPC applications such as Computational Fluid Dynamics.
△ Less
Submitted 18 August, 2020;
originally announced August 2020.
-
Best of Both Worlds: High Performance Interactive and Batch Launching
Authors:
Chansup Byun,
Jeremy Kepner,
William Arcand,
David Bestor,
Bill Bergeron,
Vijay Gadepally,
Michael Houle,
Matthew Hubbell,
Michael Jones,
Andrew Kirby,
Anna Klein,
Peter Michaleas,
Lauren Milechin,
Julie Mullen,
Andrew Prout,
Antonio Rosa,
Siddharth Samsi,
Charles Yee,
Albert Reuther
Abstract:
Rapid launch of thousands of jobs is essential for effective interactive supercomputing, big data analysis, and AI algorithm development. Achieving thousands of launches per second has required hardware to be available to receive these jobs. This paper presents a novel preemptive approach to implement spot jobs on MIT SuperCloud systems allowing the resources to be fully utilized for both long run…
▽ More
Rapid launch of thousands of jobs is essential for effective interactive supercomputing, big data analysis, and AI algorithm development. Achieving thousands of launches per second has required hardware to be available to receive these jobs. This paper presents a novel preemptive approach to implement spot jobs on MIT SuperCloud systems allowing the resources to be fully utilized for both long running batch jobs while still providing fast launch for interactive jobs. The new approach separates the job preemption and scheduling operations and can achieve 100 times faster performance in the scheduling of a job with preemption when compared to using the standard scheduler-provided automatic preemption-based capability. The results demonstrate that the new approach can schedule interactive jobs preemptively at a performance comparable to when the required computing resources are idle and available. The spot job capability can be deployed without disrupting the interactive user experience while increasing the overall system utilization.
△ Less
Submitted 5 August, 2020;
originally announced August 2020.
-
Multi-Temporal Analysis and Scaling Relations of 100,000,000,000 Network Packets
Authors:
Jeremy Kepner,
Chad Meiners,
Chansup Byun,
Sarah McGuire,
Timothy Davis,
William Arcand,
Jonathan Bernays,
David Bestor,
William Bergeron,
Vijay Gadepally,
Raul Harnasch,
Matthew Hubbell,
Micheal Houle,
Micheal Jones,
Andrew Kirby,
Anna Klein,
Lauren Milechin,
Julie Mullen,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Doug Stetson,
Adam Tse,
Charles Yee
, et al. (1 additional authors not shown)
Abstract:
Our society has never been more dependent on computer networks. Effective utilization of networks requires a detailed understanding of the normal background behaviors of network traffic. Large-scale measurements of networks are computationally challenging. Building on prior work in interactive supercomputing and GraphBLAS hypersparse hierarchical traffic matrices, we have developed an efficient me…
▽ More
Our society has never been more dependent on computer networks. Effective utilization of networks requires a detailed understanding of the normal background behaviors of network traffic. Large-scale measurements of networks are computationally challenging. Building on prior work in interactive supercomputing and GraphBLAS hypersparse hierarchical traffic matrices, we have developed an efficient method for computing a wide variety of streaming network quantities on diverse time scales. Applying these methods to 100,000,000,000 anonymized source-destination pairs collected at a network gateway reveals many previously unobserved scaling relationships. These observations provide new insights into normal network background traffic that could be used for anomaly detection, AI feature engineering, and testing theoretical models of streaming networks.
△ Less
Submitted 1 August, 2020;
originally announced August 2020.
-
DBOS: A Proposal for a Data-Centric Operating System
Authors:
Michael Cafarella,
David DeWitt,
Vijay Gadepally,
Jeremy Kepner,
Christos Kozyrakis,
Tim Kraska,
Michael Stonebraker,
Matei Zaharia
Abstract:
Current operating systems are complex systems that were designed before today's computing environments. This makes it difficult for them to meet the scalability, heterogeneity, availability, and security challenges in current cloud and parallel computing environments. To address these problems, we propose a radically new OS design based on data-centric architecture: all operating system state shou…
▽ More
Current operating systems are complex systems that were designed before today's computing environments. This makes it difficult for them to meet the scalability, heterogeneity, availability, and security challenges in current cloud and parallel computing environments. To address these problems, we propose a radically new OS design based on data-centric architecture: all operating system state should be represented uniformly as database tables, and operations on this state should be made via queries from otherwise stateless tasks. This design makes it easy to scale and evolve the OS without whole-system refactoring, inspect and debug system state, upgrade components without downtime, manage decisions using machine learning, and implement sophisticated security features. We discuss how a database OS (DBOS) can improve the programmability and performance of many of today's most important applications and propose a plan for the development of a DBOS proof of concept.
△ Less
Submitted 21 July, 2020;
originally announced July 2020.
-
Layer-Parallel Training with GPU Concurrency of Deep Residual Neural Networks via Nonlinear Multigrid
Authors:
Andrew C. Kirby,
Siddharth Samsi,
Michael Jones,
Albert Reuther,
Jeremy Kepner,
Vijay Gadepally
Abstract:
A Multigrid Full Approximation Storage algorithm for solving Deep Residual Networks is developed to enable neural network parallelized layer-wise training and concurrent computational kernel execution on GPUs. This work demonstrates a 10.2x speedup over traditional layer-wise model parallelism techniques using the same number of compute units.
A Multigrid Full Approximation Storage algorithm for solving Deep Residual Networks is developed to enable neural network parallelized layer-wise training and concurrent computational kernel execution on GPUs. This work demonstrates a 10.2x speedup over traditional layer-wise model parallelism techniques using the same number of compute units.
△ Less
Submitted 30 August, 2020; v1 submitted 14 July, 2020;
originally announced July 2020.