main| new issue| archive| editorial board| for the authors| publishing house|
Main page
New issue
Archive of articles
Editorial board
For the authors
Publishing house



No. 12. Vol. 24. 2018

DOI: 10.17587/it.24.791-798

R. R. Fatkieva, Senior Researcher, e-mail:, R. R. Ryzhkov, Engineer, e-mail:, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, 199178, St. Petersburg, Russian Federation

Assessment of Violations of Information Security Perimeter in the Cloud

The processes influencing the safety of the virtual environment of the client, from the moment of establishing the connection till obtaining the results, were investigated. It is proposed to use the Markov model to identify the most significant threats and to predict the state of the system. It is shown that due to the information security, not only the probability of successful regular workload is increased, but also the probability of collecting additional data by an intruder due to increased interest in the system. The analysis of the results of modeling the processes of security of the virtual environment of the client and the application of an integrated approach to ensuring information security, showed the following. Modern stereotypes to protect the processes of virtual environment are not fully ready to withstand current threats and new security challenges. In this regard, there is a strong need to improve the scientific and methodological apparatus. Using the example of a specific task with typical processes, the Markov model was used to identify the most significant threats, expedient measures for protecting and predicting the state of the system. A similar methodology can be used for other security models, for finding appropriate protection measures and predicting the state of the system. Application of the results obtained in the process of building, operating and upgrading the information security for cloud services leads to increased efficiency and quality of service and allows to effectively manage the information security.
Keywords: information security, dynamic perimeter, cloud environment, attacks on data

P. 791Ц798



To the contents