Evaluating single board computer clusters for cyber operations

The emergence of single board computers (SBCs) has enabled individuals cheap and portable access to multicore architectures. In this paper, we discuss the use of SBC clusters to assist in cyberspace operations. The small form-factor of SBCs make them highly portable, allowing soldiers to easily transport individual units and clusters. While each individual SBC is not very powerful, a cluster of SBCs can greatly increase the computational power available for cyberspace applications down range for relatively low cost. We discuss common SBC architectures and present a case study in which two clusters of SBCs are used to crack canonically “weak” passwords encoded with bcrypt. Our results show that an 8-node Parallella SBC cluster can crack password files up to 5.95 times faster than a high end laptop, at roughly half the cost. We also present several novel applications for offensive and defensive cyberspace operations using SBCs and SBC clusters. We believe that our work can be used to develop novel parallel military applications incorporating SBCs, and is useful for educating soldiers and endusers about the potentials (and dangers) of parallel processing.

[1]  David A. Richie,et al.  Implementing Image Processing Algorithms for the Epiphany Many-Core Coprocessor with Threaded MPI , 2015 .

[2]  Fung Po Tso,et al.  The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing Infrastructures , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[3]  Sven Helmer,et al.  Affordable and Energy-Efficient Cloud Computing Clusters: The Bolzano Raspberry Pi Cloud Cluster Experiment , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[4]  Bob Edwards,et al.  Programming the Adapteva Epiphany 64-Core Network-on-Chip Coprocessor , 2014, IPDPS Workshops.

[5]  Eugene Albin A Comparative Analysis of the Snort and Suricata Intrusion-Detection Systems , 2011 .

[7]  David Mazières,et al.  The Advanced Computing Systems Association a Future-adaptable Password Scheme a Future-adaptable Password Scheme , 2022 .

[8]  Mikko-Olavi Seppälä Raspberry Pi 3 Model B : mediakeskus , 2017 .

[9]  David Mazières,et al.  A future-adaptive password scheme , 1999 .

[10]  Josip Knezovic,et al.  Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware , 2014, WOOT.

[11]  Jeremiah Gertler,et al.  Homeland Security: Unmanned Aerial Vehicles and Border Surveillance , 2010 .

[12]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[13]  Dale R. Shires,et al.  Threaded MPI programming model for the Epiphany RISC array processor , 2015, J. Comput. Sci..

[14]  Vladimir Vujovic,et al.  Raspberry Pi as a Wireless Sensor node: Performances and constraints , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[15]  Anthony Skjellum,et al.  A High-Performance, Portable Implementation of the MPI Message Passing Interface Standard , 1996, Parallel Comput..

[16]  Virginijus Marcinkevicius,et al.  Energy efficient platform for sobel filter implementation in energy and size constrained systems , 2015, 2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE).

[17]  Ellen-Louise Bleeker,et al.  Creating a Raspberry Pi-Based Beowulf Cluster , 2017 .

[18]  Frank Stajano,et al.  Passwords and the evolution of imperfect authentication , 2015, Commun. ACM.

[19]  Spiros N. Agathos,et al.  OpenMP 4.0 Device Support in the OMPi Compiler , 2015, IWOMP.

[20]  Nicholas Weaver,et al.  Stress Testing Cluster Bro , 2007, DETER.

[21]  Steven J. Johnston,et al.  Iridis-pi: a low-cost, compact demonstration cluster , 2014, Cluster Computing.

[22]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .