S. Sokolov, O. M. Alimov, Yulia A. Trubacheva, Yuri F. Katorin, K. Goloskokov
{"title":"Providing security for virtual infrastructures based on an integrated mechanism","authors":"S. Sokolov, O. M. Alimov, Yulia A. Trubacheva, Yuri F. Katorin, K. Goloskokov","doi":"10.1109/EICONRUS.2018.8317047","DOIUrl":null,"url":null,"abstract":"This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.). This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.).","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"5 1","pages":"132-135"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EICONRUS.2018.8317047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.). This article is devoted to the review and analysis of existing methods for ensuring information security of virtual spaces and automated access to authentication systems. The strengths and weaknesses of the model are investigated on the basis of reliability. Systems of detection of invasions and firewalling. Control of traffic in the system of visualization. Program, hardware and combined decisions for implementation of this monitoring. Management systems status of protection of the virtual environment. Control systems of access to the virtual infrastructure. Implementation of interception of connections of users with the virtual infrastructure. Use of lists of users, roles and groups for access demarcation. Classical systems of protection. The description of classical security features (system of detection of invasions and firewalling on an input in the virtualization environment, etc.).