Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2792745.2792762acmotherconferencesArticle/Chapter ViewAbstractPublication PagesxsedeConference Proceedingsconference-collections
research-article

ISLET: an isolated, scalable, & lightweight environment for training

Published: 26 July 2015 Publication History

Abstract

In this paper we present ISLET; the Isolated, Scalable, & Lightweight Environment for Training. ISLET overcomes many of the distribution, scaling and security challenges of providing mass training to students requiring an interactive GNU/Linux command-line environment. This Docker-based solution is evaluated and lessons learned from real world experience with ISLET are discussed.

References

[1]
Comparable training environment solutions include: A Tour Go https://tour.golang.org/welcome/1, O'Reilly School of Technology's Learning Sandbox http://www.oreillyschool.com/whyost/learn-by-making/, Docker's Web Tour https://www.docker.com/tryit/.
[2]
Linux* Containers Streamline Virtualization and Complement Hypervisor-Based Virtual Machines. http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/linux-containers-hypervisor-based-vms-paper.pdf, 2014. {Online; accessed: 11-February-2015}.
[3]
Amazon Web Services, Inc. Amazon EC2. http://aws.amazon.com/ec2/, 2015. {Online; accessed: 24-February-2015}.
[4]
Andrea Luzzardi and Victor Vieux. Swarm: a Docker-native clustering system. https://github.com/docker/swarm, 2015. {Online; accessed: 11-February-2015}.
[5]
CoreOS, Inc. https://coreos.com/, 2015. {Online; accessed: 11-February-2015}.
[6]
CoreOS, Inc. Container Overview. https://coreos.com/using-coreos/containers, 2015. {Online; accessed: 05-March-2015}.
[7]
David Recordon and Brad Fitzpatrick. OpenID Authentication 1.1. http://openid.net/specs/openid-authentication-1_1.html, 2015. {Online; accessed: 16-February-2015}.
[8]
Github, Inc. Docker fails to mount the block device for the container on devicemapper. https://github.com/docker/docker/issues/4036, 2015. {Online; accessed: 18-March-2015}.
[9]
Jon Schipp. Build a Dynamically Linked Docker. http://sickbits.net/build-a-dynamically-linked-docker/, 2015. {Online; accessed: 18-March-2015}.
[10]
Jon Schipp. Isolated, Scalable, & Lightweight Environment for Training. https://github.com/jonschipp/ISLET, 2015. {Online; accessed: 24-February-2015}.
[11]
LinuxContainers.org. Home. https://linuxcontainers.org/, 2015. {Online; accessed: 05-March-2015}.
[12]
Michael Kerrisk. Linux Programmer's Manual. http://man7.org/linux/man-pages/man7/capabilities.7.html, 2015. {Online; accessed: 25-February-2015}.
[13]
Open Stack Foundation. OpenStack: The Open Source Cloud Operating System. http://www.openstack.org/software/, 2015. {Online; accessed: 24-February-2015}.
[14]
V. Paxson. Bro: a System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435--2463, 1999.
[15]
Rami Rosen. Linux Containers and the Future Cloud. http://media.wix.com/ugd/295986_d5059f95a78e451db5de3d54f711e45d.pdf. {Online; accessed: 11-February-2015}.
[16]
The Bro Project. BroCon '14. https://www.bro.org/community/brocon2014.html, 2014. {Online; accessed: 17-March-2015}.
[17]
The Bro Project. Try Bro. http://try.bro.org/, 2014. {Online; accessed: 17-March-2015}.
[18]
The FreeBSD Documentation Project. FreeBSD Handbook. https://www.freebsd.org/doc/handbook/jails.html, 2015. {Online; accessed: 05-March-2015}.
[19]
Wes Felter, Alexandre Ferreira, Ram Rajamony, Juan Rubio. An Updated Performance Comparison of Virtual Machines and Linux Containers. http://domino.research.ibm.com/library/cyberdig.nsf/papers/0929052195DD819C85257D2300681E7B/$File/rc25482. pdf, 2014. {Online; accessed: 06-March-2015}.
[20]
M. G. Xavier, M. V. Neves, F. D. Rossi, T. C. Ferreto, T. Lange, and C. A. F. De Rose. Performance evaluation of container-based virtualization for high performance computing environments. In Proceedings of the 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP '13, pages 233--240, Washington, DC, USA, 2013. IEEE Computer Society.

Cited By

View all
  • (2021)A Machine Learning Based Monitoring Framework for Side-Channel Information LeaksIEEE Open Journal of the Computer Society10.1109/OJCS.2021.30614452(139-151)Online publication date: 2021
  • (2020)The state‐of‐the‐art in container technologies: Application, orchestration and securityConcurrency and Computation: Practice and Experience10.1002/cpe.566832:17Online publication date: 19-Jan-2020
  • (2017)Container based testbed for gate security using open API mashupProcedia Computer Science10.1016/j.procs.2017.06.062111:C(260-267)Online publication date: 1-Sep-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
XSEDE '15: Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by Enhanced Cyberinfrastructure
July 2015
296 pages
ISBN:9781450337205
DOI:10.1145/2792745
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

  • San Diego Super Computing Ctr: San Diego Super Computing Ctr
  • HPCWire: HPCWire
  • Omnibond: Omnibond Systems, LLC
  • SGI
  • Internet2
  • Indiana University: Indiana University
  • CASC: The Coalition for Academic Scientific Computation
  • NICS: National Institute for Computational Sciences
  • Intel: Intel
  • DDN: DataDirect Networks, Inc
  • DELL
  • CORSA: CORSA Technology
  • ALLINEA: Allinea Software
  • Cray
  • RENCI: Renaissance Computing Institute

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 July 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. containers
  2. docker
  3. education
  4. security
  5. training

Qualifiers

  • Research-article

Conference

XSEDE '15
Sponsor:
  • San Diego Super Computing Ctr
  • HPCWire
  • Omnibond
  • Indiana University
  • CASC
  • NICS
  • Intel
  • DDN
  • CORSA
  • ALLINEA
  • RENCI

Acceptance Rates

XSEDE '15 Paper Acceptance Rate 49 of 70 submissions, 70%;
Overall Acceptance Rate 129 of 190 submissions, 68%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)A Machine Learning Based Monitoring Framework for Side-Channel Information LeaksIEEE Open Journal of the Computer Society10.1109/OJCS.2021.30614452(139-151)Online publication date: 2021
  • (2020)The state‐of‐the‐art in container technologies: Application, orchestration and securityConcurrency and Computation: Practice and Experience10.1002/cpe.566832:17Online publication date: 19-Jan-2020
  • (2017)Container based testbed for gate security using open API mashupProcedia Computer Science10.1016/j.procs.2017.06.062111:C(260-267)Online publication date: 1-Sep-2017
  • (2016)ReferencesDeploying Secure Containers for Training and Development10.1016/B978-0-12-804717-0.00013-2(35)Online publication date: 2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media