29 research outputs found
Formal security model for virtual machine hypervisors in cloud computing systems
The paper describes a formal security model for virtual machine hypervisors in cloud systems based on the graph theory. This model defines security properties and data access operations hierarchy inside virtual machines and hypervisors in the cloud. The proposed model makes it possible to formalize major security issues for cloud systems and define tasks for hypervisor security and methods to solve them as well as the security condition for the virtual machine hypervisors
A finite-state model of botnets’ desinfection and removal
Existing multi-agent systems (either for implementing distributed security threats or for countering them in the Internet) either do not maintain agent graph connectivity or maintain it with network redundancy, which significantly increases the overheads. The paper analyzes a finite-state model of adaptive behavior in a multi-agent system. This model uses a d-regular agent graph and some methods to maintain network connectivity, which provides sustainable system performance in aggressive environment
Modern problems of cybersecurity
Analysis of the basic tendencies of occurrence of new threats of safety is resulted. Characteristics of a postindustrial society is given. New problems of maintenance of cybersafety are formulated. Ordering of technological protection on the basis of the o˙ered model is spent
Efficiency estimation of the protection software for neutralization and elimination of botnets
Today there are no methods to evaluate protection effectiveness that would allow comparing defense and botnet attacks in particular. A set of metrics for efficiency evaluation has been proposed. The proposed efficiency evaluation metrics account for the network nature of modern defense and attack. They will provide quantitative assessment of factors affecting defense or attack efficiency. Therefore, these metrics will allow making a conclusion about results of the network contradiction between benign and malignant agents, and about LAN and WAN protection nodes
A Finite-State Model of Botnets' Desinfection and Removal
Existing multi-agent systems (either for implementing distributed security threats or for countering them in the Internet) either do not maintain agent graph connectivity or maintain it with network redundancy, which significantly increases the overheads. The paper analyzes a finite-state model of adaptive behavior in a multi-agent system. This model uses a d -regular agent graph and some methods to maintain network connectivity, which provides sustainable system performance in aggressive environment
Formal security model for virtual machine hypervisors in cloud computing systems
The paper describes a formal security model for virtual machine hypervisors in cloud systems based on the graph theory. This model defines security properties and data access operations hierarchy inside virtual machines and hypervisors in the cloud. The proposed model makes it possible to formalize major security issues for cloud systems and define tasks for hypervisor security and methods to solve them as well as the security condition for the virtual machine hypervisors
Modern problems of cybersecurity
Analysis of the basic tendencies of occurrence of new threats of safety is resulted. Characteristics of a postindustrial society is given. New problems of maintenance of cybersafety are formulated. Ordering of technological protection on the basis of the o˙ered model is spent