29 research outputs found

    Formal security model for virtual machine hypervisors in cloud computing systems

    Get PDF
    The paper describes a formal security model for virtual machine hypervisors in cloud systems based on the graph theory. This model defines security properties and data access operations hierarchy inside virtual machines and hypervisors in the cloud. The proposed model makes it possible to formalize major security issues for cloud systems and define tasks for hypervisor security and methods to solve them as well as the security condition for the virtual machine hypervisors

    A finite-state model of botnets’ desinfection and removal

    Get PDF
    Existing multi-agent systems (either for implementing distributed security threats or for countering them in the Internet) either do not maintain agent graph connectivity or maintain it with network redundancy, which significantly increases the overheads. The paper analyzes a finite-state model of adaptive behavior in a multi-agent system. This model uses a d-regular agent graph and some methods to maintain network connectivity, which provides sustainable system performance in aggressive environment

    Modern problems of cybersecurity

    Get PDF
    Analysis of the basic tendencies of occurrence of new threats of safety is resulted. Characteristics of a postindustrial society is given. New problems of maintenance of cybersafety are formulated. Ordering of technological protection on the basis of the o˙ered model is spent

    Efficiency estimation of the protection software for neutralization and elimination of botnets

    No full text
    Today there are no methods to evaluate protection effectiveness that would allow comparing defense and botnet attacks in particular. A set of metrics for efficiency evaluation has been proposed. The proposed efficiency evaluation metrics account for the network nature of modern defense and attack. They will provide quantitative assessment of factors affecting defense or attack efficiency. Therefore, these metrics will allow making a conclusion about results of the network contradiction between benign and malignant agents, and about LAN and WAN protection nodes

    A Finite-State Model of Botnets' Desinfection and Removal

    No full text
    Existing multi-agent systems (either for implementing distributed security threats or for countering them in the Internet) either do not maintain agent graph connectivity or maintain it with network redundancy, which significantly increases the overheads. The paper analyzes a finite-state model of adaptive behavior in a multi-agent system. This model uses a d -regular agent graph and some methods to maintain network connectivity, which provides sustainable system performance in aggressive environment

    Formal security model for virtual machine hypervisors in cloud computing systems

    No full text
    The paper describes a formal security model for virtual machine hypervisors in cloud systems based on the graph theory. This model defines security properties and data access operations hierarchy inside virtual machines and hypervisors in the cloud. The proposed model makes it possible to formalize major security issues for cloud systems and define tasks for hypervisor security and methods to solve them as well as the security condition for the virtual machine hypervisors

    Modern problems of cybersecurity

    No full text
    Analysis of the basic tendencies of occurrence of new threats of safety is resulted. Characteristics of a postindustrial society is given. New problems of maintenance of cybersafety are formulated. Ordering of technological protection on the basis of the o˙ered model is spent

    Ladle brick from semiacid clays

    No full text
    corecore