T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov
{"title":"Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks","authors":"T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov","doi":"10.1109/PICST54195.2021.9772226","DOIUrl":null,"url":null,"abstract":"Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST54195.2021.9772226","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.