Cloud computing, observability, and security research featured at SYSTOR 2023

Jun 16, 2023 | Featured News, Israel, News

By Anastasia Braginsky

The 16th ACM International System and Storage Conference (SYSTOR), held June 5-7 in Haifa, Israel, featured five posters highlighting Red Hat-sponsored research projects that target challenges in cloud implementation strategy, storage performance, network observability, and AI/ML-enhanced cybersecurity analysis.

SYSTOR is a prestigious international conference held annually, aimed at the shared interests of academic and industrial researchers and practitioners. Out of the 22 posters accepted for the conference, these five introduced innovative work from either Red Hat engineers or academic teams sponsored by Red Hat.

CCO—Cloud Cost Optimizer

Adi Yehoshua and Ilya Kolchinsky, Red Hat; Assaf Schuster, Technion

The Cloud Cost Optimizer project is a collaboration between Technion and Red Hat Research. Its goal is to design and implement a scalable multicloud cost optimizer capable of calculating the best scheme for deploying a given arbitrary complex workload over a public/hybrid cloud, thus reducing the monetary cost. A fully functional version of CCO is currently available for use, with extensions and improvements already underway.

To learn more, visit the CCO project page or read the article “Meet CCO: a scalable multicloud optimizer for complex workloads” in the May 2023 issue of the Red Hat Research Quarterly. 

Efficient hashing of sparse virtual disks

Nir Soffer, IBM; Erez Waisbard, CyberArk

Verifying the integrity of a file is a fundamental operation in file transfer. We introduce blkhash: a novel hash algorithm optimized for disk images that is up to four orders of magnitude faster than commonly used tools. We implemented a new command-line tool and library that can be used in the virtualization space for verifying storage management operations. Our approach can significantly contribute to use cases including very fast computing of virtual disk hash value in software-defined storage and verifying an entire disk image content as part of a supply chain integrity verification or in the context of confidential computing. Nir is a former Red Hatter, now at IBM. Anastasia Braginsky from Red Hat Research Israel collaborated with him on the poster submission.

To learn more, visit the Blkhash project repository.

On latency awareness with delayed hits

Gil Einziger, Nadav Keren, and Gabriel Scalosub, Ben Gurion University

We consider a new locality pattern in the form of burstiness to improve cache effectiveness in workflows where items are requested in possibly infrequent yet costly batches. Adding a cache that handles only bursty items to existing state-of-the-art algorithms shows a significant improvement in overall average time per query. This poster reports on work from the project “Advance proactive caching for heterogeneous storage systems,” which aims to improve the performance of distributed storage systems such as Ceph and NooBaa by developing novel caching frameworks that take into account request heterogeneity and perform proactive caching decisions.

To learn more, visit the “Advance proactive caching for heterogeneous storage systems” project page.

Next-generation security entity linkage harnessing the power of knowledge graphs and large language models

Daniel Alfasi and Tal Shapira, Reichman University; Anat Bremler-Barr, Tel Aviv University

With the continuous increase in reported Common Vulnerabilities and Exposures (CVEs), security teams are overwhelmed by vast amounts of data that is often analyzed manually, leading to a slow and inefficient process. Establishing connections across multiple security entity databases, including CVEs, Common Weakness Enumeration (CWEs), and Common Attack Pattern Enumeration and Classification (CAPECs), is essential to addressing cybersecurity threats effectively. We introduce a new approach leveraging the RotatE knowledge graph embedding model, initialized with embeddings from the Ada language model developed by OpenAI. Additionally, we extend this approach by initializing the embeddings for the relations.

Learn more about the project “Common Vulnerabilities and Exposures (CVEs) mining and prediction,” the Red Hat Research project from which this work is drawn, on its project page.

Smart network observability—connection tracking

Ronen Schaffer, Eran Raichstein, and Kalman Meth, IBM Research; Joel Takvorian and Julien Pinsonneau, Red Hat

Flow Logs Pipeline (FLP) is an observability tool that consumes flow logs from various inputs, transforms them, and exports logs to Loki and/or time series metrics to Prometheus. While flow logs encompass a lot of valuable data, the resolution of flow logs is often too low for observing the network effectively. We are often interested in observing it from a higher resolution— the resolution of connections. In this work, we introduce a new processing stage in FLP that allows aggregating flow logs from the same connection, or connection tracking. 

We are excited that many Red Hat associates actively participated in SYSTOR, and we are proud to have been a platinum sponsor of this important conference. By participating in SYSTOR 2023, we continue to foster innovation and collaboration in the field of systems and storage. 

Related Stories

Red Hat Research brings sustainability to the edge

Red Hat Research brings sustainability to the edge

A data-science-driven sustainability project supported by Red Hat Research was recognized as a FIWARE iHub at the 2023 FIWARE Summit in Vienna, Austria. Based on the SmartaByar smart village in Sweden, the project was a recipient of the Red Hat Collaboratory at Boston University Research Incubation Award in 2022 and 2023. FIWARE describes iHubs as centers for accelerated growth that support companies, cities, and developers in their innovation and digitalization journey by offering easy access to open source technologies, business development support, and community building.

Red Hat Collaboratory at Boston University announces Request for Proposals for 2024 Grants

Red Hat Collaboratory at Boston University announces Request for Proposals for 2024 Grants

The Red Hat Collaboratory at Boston University has announced details on the Request for Proposals (RFP) for 2024 Grants. The goal of the program is to enable collaborative research between Boston University researchers and Red Hat engineers. Projects must be open source and should generally focus on problems of distributed, operating, security, or network systems whose solution shows promise for advancing their field and impacting industry.

Watch recordings of the Mass Open Cloud Alliance Workshop

Watch recordings of the Mass Open Cloud Alliance Workshop

Over 30 Red Hatters attend the 2023 Mass Open Cloud (MOC) Alliance Workshop on March 20 - 21, 2023, at Boston University.  Recordings of each day of the event are available (see below with the schedule - currently unedited), and we will announce in the coming...

EU-funded cybersecurity consortium kicks off in Brno, Czech Republic

EU-funded cybersecurity consortium kicks off in Brno, Czech Republic

Authors Jaroslav Řezník, Principal Program Manager—Technical at Red HatViktor Malík, Senior Software Engineer at Red Hat Cybersecurity has become a critical focus of research in today's interconnected world, especially with the rise of cyberattacks posing a threat to...

Meet the new 2023 Red Hat Collaboratory Research Incubation Award Recipients

Meet the new 2023 Red Hat Collaboratory Research Incubation Award Recipients

We are pleased to announce the recipients of the 2023 Red Hat Collaboratory Research Incubation Awards. The awards are part of a joint effort between Red Hat and Boston University (BU) aimed at recognizing, supporting and funding research in cloud computing, and to advance the state of the art in open source technologies such as distributed systems, security, operating systems, and networking.