Virtual Cloud Environment Protection Method Based on Attack Graph Structure
نویسندگان
چکیده
The article proposes the creation of an effective system for detecting and responding to external influences in order minimize consequences breaching protection cloud virtual resources a timely manner. Mathematical models have been improved ensure software-configured networks, namely: mathematical model impact attack on resources, assessing state choosing countermeasure based complex indicator networks. Based obtained models, graph attacks environment was developed. This allows you get information about all known vulnerabilities.
منابع مشابه
Survey on DDoS Attack in Cloud Environment
Cloud computing has become popular and a huge platform for computing where large number of data are available online. Nature of cloud computing is distributed, due to this kind of nature they have become easy target for attackers to exploits the security vulnerability. Availability of data is most important part of cloud computing and even for economic growth of the society. Attack name Denial ...
متن کاملA Cloud-Based Collaborative Virtual Environment
1 Problem statement Recent years have witnessed a huge spread of information, with an increased expectation to stay connected at all times. This is also true for professional environments where being physically present at the office is becoming less relevant. However, this connectivity requirement comes with various challenges: There are many legacy applications around that are not accessible...
متن کاملA confidence-based filtering method for DDoS attack defense in cloud environment
DistributedDenial-of-Service attack (DDoS) is amajor threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively lowefficiency, large storage, to name a few. In view of this challenge, a Confidence-Based Filteringmethod, named CBF, is investigated for cloud computing environment, in this paper. Concretely speaking, themethod ...
متن کاملAn Attack on SMC-Based Software Protection
Self-modifying codes (SMC) refer to programs that intentionally modify themselves at runtime, causing the runtime code to differ from the static binary representation of the code before execution. Hence SMC is an effective method to obstruct software disassembling. This paper presents a method which circumvents the SMC protection, thus improving the performance of disassembling. By disabling th...
متن کاملGASA: Presentation of an Initiative Method Based on Genetic Algorithm for Task Scheduling in the Cloud Environment
The need for calculating actions has been emerged everywhere and in any time, by advancing of information technology. Cloud computing is the latest response to such needs. Prominent popularity has recently been created for Cloud computing systems. Increasing cloud efficiency is an important subject of consideration. Heterogeneity and diversity among different resources and requests of users in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Su?asnij zahist ìnformacìï
سال: 2023
ISSN: ['2409-7292']
DOI: https://doi.org/10.31673/2409-7292.2023.010003