BASIC APPROACHES OF DEVELOPMENT OF DATA CENTER PROTECTION SYSTEMS
Journal Title: Наукові доповіді НУБіП України - Year 2018, Vol 2, Issue 2
Abstract
Data Center cyber- protection methods based on host-based intrusion prevention systems and network based intrusion prevention systems were considered. Basic algorithm of intrusion prevention system functioning and operational readiness evaluation which includes objects of analysis, procedures and evaluation indicators was discussed. It was shown that procedures to be done by Data Center cyber-protection system are identification of the event, signatures database management and denial management. Evaluation of intrusion prevention system efficiency was proved to be based on errors’ numbers and scalability. Thereby it should include accuracy, robustness, performance and scalability parameters. Main prevention systems which show model of detection systems interaction with monitored environment events were discussed. Specifically detection strategy based classification which includes cyber- attack signatures analysis, anomalies analysis, hybrid strategy, detection system behavior based classification which includes active behavior, passive behavior, monitored environment based classification which includes local network, global network, hybrid environment, detection system architecture based classification which includes centralized architecture, distributed architecture, hierarchical architecture, detection system performance based classification which includes real time analysis, offline analysis were analyzed. It was mentioned that anomaly-based systems development has to be supervised by operators and adapted to the parameters of the Data Center network. They were divided to three groups: statistical modeling, knowledge based modeling and modeling based on machine learning techniques. It was mentioned that cyber-threats could be modeled as process of transmission of data in hidden channel that change state of some functional node of Data Center. Unified mathematical model of intrusion detection system work which includes states of the infrastructure functional nodes, events involved in a system and transition between the states caused by those events was proposed.
Authors and Affiliations
A. V. KROPACHEV, D. O. ZUEV
CONTENT OF CHLOROPLASTS IN THE LEAVES OF PLANTS SPRING DURUM WHEAT IN DEPENDING OF MINERAL NUTRITION
Shown results of the three-years study (2012-2014 gg.). For determination dynamics of formation pigments of photosynthesis in spring durum wheat plants with actions of different fertilizing options. Was established a sig...
STARTING MATERIAL TO CREATE FODDER MILLET VARIETIES
Cultivation of high-quality forage crops, among which millet takes a lead, is a pre-requisite for growth in green forage production for the livestock sector. However, despite the considerable economic importance as a for...
JUSTIFICATION OF THE LOSS FACTOR OF ROOT VEGETABLES OF CHICORY IN THE PROCESS OF DIGGING OUT
One of the most important prerequisites for the development of working organs for digging up root crops is the agrobiological and physico-mechanical properties of root crops and the soil environment. They substantially c...
PHYSICAL AND CHEMICAL INDICATORS OF LIPOVA HONEY DIFFERENT WAYS OF TREATMENT OF PEELS FLORPHENICOL
The study of the quality of honey on organoleptic and physico-chemical parameters was carried out in accordance with the methods specified in GSTU 4497: 2005 “Natural honey. Technical conditions. Investigated such indica...
PRECEDING CROP AND TERM OF SOWING AS A FACTOR OF VARIETAL CULTIVATION TECHNOLOGY OF SPRING WHEAT IN SOUTHERN PART OF THE RIGHT-BANK FOREST-STEPPE
The article is devoted to the technology of cultivation of spring wheat in the southern part of right-Bank Forest-Steppe of Ukraine. In result of studies it is established that the level of productivity of middle-ripenin...