Providing security for virtual infrastructures based on an integrated mechanism

S. Sokolov, O. M. Alimov, Yulia A. Trubacheva, Yuri F. Katorin, K. Goloskokov
{"title":"Providing security for virtual infrastructures based on an integrated mechanism","authors":"S. Sokolov, O. M. Alimov, Yulia A. Trubacheva, Yuri F. Katorin, K. Goloskokov","doi":"10.1109/EICONRUS.2018.8317047","DOIUrl":null,"url":null,"abstract":"This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.). This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.).","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"5 1","pages":"132-135"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EICONRUS.2018.8317047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.). This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于集成机制为虚拟基础设施提供安全性
本文致力于回顾和分析确保虚拟空间信息安全和自动访问身份验证系统的现有方法。在可靠性的基础上分析了模型的优缺点。检测入侵和防火墙的系统。交通控制系统中的可视化。程序,硬件和组合决策,以实现此监控。管理系统的虚拟环境保护状态。访问虚拟基础设施的控制系统。实现拦截用户与虚拟基础设施的连接。使用用户、角色和组的列表进行访问划分。经典的保护系统。经典安全特性的描述(入侵检测系统和虚拟化环境中输入的防火墙等)。本文致力于回顾和分析确保虚拟空间信息安全和自动访问身份验证系统的现有方法。在可靠性的基础上分析了模型的优缺点。检测入侵和防火墙的系统。交通控制系统中的可视化。程序,硬件和组合决策,以实现此监控。管理系统的虚拟环境保护状态。访问虚拟基础设施的控制系统。实现拦截用户与虚拟基础设施的连接。使用用户、角色和组的列表进行访问划分。经典的保护系统。经典安全特性的描述(入侵检测系统和虚拟化环境中输入的防火墙等)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The modeling of emergency oil spills in GIS Load balancing in cloud computing Practical characterisation of the piezo electric properties of a 3K T300 carbon fibre for impact sensoring Modelling of a photovoltaic array using Analog System Lab Kit Pro board Design of optimum configuration of a hybrid power system for Abertay University campus
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1