2,163 research outputs found

    Comparison of the offer of selected cloud service providers from the point of view of implementing IT projects based on open code

    Get PDF
    The article presents a comparison of the offers of selected cloud computing providers in terms of their use in the process of developing and implementing IT services based on the idea of open source code. The conducted research concerns services provided according to the IaaS model in the form of a virtual machine lease and services provided according to the PaaS model in the form of database services. The presented analysis is both qualitative (subjective assessment) and quantitative, which consists in a series of measurements of the parameters of virtual instances. Based on this analysis, the best public cloud service provider for users starting to use cloud computing resources was selected. Keywords: cloud computing; IaaS service model; PaaS service mode

    Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

    Full text link
    Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available
    corecore