Virtual Cloud Environment Protection Method Based on Attack Graph Structure

نویسندگان

چکیده

The article proposes the creation of an effective system for detecting and responding to external influences in order minimize consequences breaching protection cloud virtual resources a timely manner. Mathematical models have been improved ensure software-configured networks, namely: mathematical model impact attack on resources, assessing state choosing countermeasure based complex indicator networks. Based obtained models, graph attacks environment was developed. This allows you get information about all known vulnerabilities.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on DDoS Attack in Cloud Environment

Cloud computing has become popular and a huge platform for computing where large number of data are available online. Nature of cloud computing is distributed, due to this kind of nature they have become easy target for attackers to exploits the security vulnerability. Availability of data is most important part of cloud computing and even for economic growth of the society. Attack name Denial ...

متن کامل

A Cloud-Based Collaborative Virtual Environment

1 Problem statement Recent years have witnessed a huge spread of information, with an increased expectation to stay connected at all times. This is also true for professional environments where being physically present at the office is becoming less relevant. However, this connectivity requirement comes with various challenges:  There are many legacy applications around that are not accessible...

متن کامل

A confidence-based filtering method for DDoS attack defense in cloud environment

DistributedDenial-of-Service attack (DDoS) is amajor threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively lowefficiency, large storage, to name a few. In view of this challenge, a Confidence-Based Filteringmethod, named CBF, is investigated for cloud computing environment, in this paper. Concretely speaking, themethod ...

متن کامل

An Attack on SMC-Based Software Protection

Self-modifying codes (SMC) refer to programs that intentionally modify themselves at runtime, causing the runtime code to differ from the static binary representation of the code before execution. Hence SMC is an effective method to obstruct software disassembling. This paper presents a method which circumvents the SMC protection, thus improving the performance of disassembling. By disabling th...

متن کامل

GASA: Presentation of an Initiative Method Based on Genetic Algorithm for Task Scheduling in the Cloud Environment

The need for calculating actions has been emerged everywhere and in any time, by advancing of information technology. Cloud computing is the latest response to such needs. Prominent popularity has recently been created for Cloud computing systems. Increasing cloud efficiency is an important subject of consideration. Heterogeneity and diversity among different resources and requests of users in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Su?asnij zahist ìnformacìï

سال: 2023

ISSN: ['2409-7292']

DOI: https://doi.org/10.31673/2409-7292.2023.010003