T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov
{"title":"网络攻击监控、入侵检测与识别方法分析","authors":"T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov","doi":"10.1109/PICST54195.2021.9772226","DOIUrl":null,"url":null,"abstract":"Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks\",\"authors\":\"T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov\",\"doi\":\"10.1109/PICST54195.2021.9772226\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.\",\"PeriodicalId\":391592,\"journal\":{\"name\":\"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST54195.2021.9772226\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST54195.2021.9772226","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks
Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.