Запис Детальніше

Concept and model for cloud infrastructure protection by using containers

Електронний науковий архів Науково-технічної бібліотеки Національного університету "Львівська політехніка"

Переглянути архів Інформація
 
 
Поле Співвідношення
 
Title Concept and model for cloud infrastructure protection by using containers
 
Creator Stefinko, Yaroslav
Piskozub, Andrian
Banakh, Roman
 
Contributor Lviv Polytechnic National University
 
Subject security
cloud computing
scheme
containers
attacks
infrastructure
virtualization
docker
penetration test
 
Description According to current best practices in using containers we suggest an overview on using it in cloud and potential for using in security field. Interaction and attacks vectors used in virtual cloud systems are described. Built and analyzed conceptual scheme for penetration testing. Patterns of security improvements in cloud computing infrastructure are presented in following article.
 
Date 2018-04-11T12:54:49Z
2018-04-11T12:54:49Z
2016
 
Type Conference Abstract
 
Identifier Stefinko Ya. Concept and model for cloud infrastructure protection by using containers / Yaroslav Stefinko, Andrian Piskozub, Roman Banakh // Litteris et Artibus : proceedings of the 6th International youth science forum, November 24–26, 2016, Lviv, Ukraine / Lviv Polytechnic National University. – Lviv : Lviv Polytechnic Publishing House, 2016. – P. 81–82. – Bibliography: 6 titles.
http://ena.lp.edu.ua:8080/handle/ntb/40257
 
Language en
 
Relation [1] Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V. et al. Security Issues in Cloud Environments - A Survey: Int. J. Inf. Secur. (2014), Issue 2, pp 113–170. doi:10.1007/s10207-013-0208-7 [2] Y. Stefinko, A. Piskozub and R. Banakh, "Manual and automated penetration testing. Benefits and drawbacks. Modern tendency," 2016 13th Int. Conf. on Mod. Probl. of Radio Eng., Telecom. and Comp. Sc. (TCSET), Lviv, Ukraine, 2016, pp. 488-491. doi: 10.1109/TCSET.2016.7452095 [3] R. Banakh, A. Piskozub and Y. Stefinko, "External elements of honeypot for wireless network," 2016 13th Int. Conf. on Mod. Probl. of Radio Eng., Telecom. and Comp. Sc. (TCSET), Lviv, Ukraine, 2016, pp. 480-482. doi: 10.1109/TCSET.2016.7452093 [4] Pearson, S.: Privacy, Security and Trust in Cloud Computing. In: S. Pearson, G. Yee (eds.) Privacy and Security for Cloud Computing, pp. 3-42. Springer London (2013). DOI 10.1007/978-1-4471-4189-1_1 [5] NIST: The NIST Definition of Cloud Computing (2011).http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf Accessed Oct. 2016 [6] Internet Security Threat Report 2016- https:// www.symantec.com/security-center/threat-report Accessed Oct. 2016.
 
Format 81-82
application/pdf
 
Coverage UA
Lviv
 
Publisher Lviv Polytechnic Publishing House