{"title":"基于攻击图结构的虚拟云环境保护方法","authors":"V. V. Vyshnivsʹkyy","doi":"10.31673/2409-7292.2023.010003","DOIUrl":null,"url":null,"abstract":"The article proposes the creation of an effective system for detecting and responding to external influences in order to minimize the consequences of breaching the protection of cloud virtual resources in a timely manner. Mathematical models have been improved to ensure the protection of virtual cloud resources for software-configured networks, namely: a mathematical model of the impact of an attack on virtual cloud resources, a mathematical model for assessing the state of virtual cloud resources, a mathematical model for choosing a countermeasure based on a complex indicator for software-configured networks. Based on the obtained mathematical models, a graph of attacks on the virtual cloud environment was developed. This graph allows you to get information about all known system vulnerabilities.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Virtual Cloud Environment Protection Method Based on Attack Graph Structure\",\"authors\":\"V. V. Vyshnivsʹkyy\",\"doi\":\"10.31673/2409-7292.2023.010003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article proposes the creation of an effective system for detecting and responding to external influences in order to minimize the consequences of breaching the protection of cloud virtual resources in a timely manner. Mathematical models have been improved to ensure the protection of virtual cloud resources for software-configured networks, namely: a mathematical model of the impact of an attack on virtual cloud resources, a mathematical model for assessing the state of virtual cloud resources, a mathematical model for choosing a countermeasure based on a complex indicator for software-configured networks. Based on the obtained mathematical models, a graph of attacks on the virtual cloud environment was developed. This graph allows you to get information about all known system vulnerabilities.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2023.010003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.010003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Virtual Cloud Environment Protection Method Based on Attack Graph Structure
The article proposes the creation of an effective system for detecting and responding to external influences in order to minimize the consequences of breaching the protection of cloud virtual resources in a timely manner. Mathematical models have been improved to ensure the protection of virtual cloud resources for software-configured networks, namely: a mathematical model of the impact of an attack on virtual cloud resources, a mathematical model for assessing the state of virtual cloud resources, a mathematical model for choosing a countermeasure based on a complex indicator for software-configured networks. Based on the obtained mathematical models, a graph of attacks on the virtual cloud environment was developed. This graph allows you to get information about all known system vulnerabilities.