Computer Systems and Information Technologies=Комп'ютерні системи та інформаційні технології
Постійне посилання на фонд
Переглянути
Перегляд Computer Systems and Information Technologies=Комп'ютерні системи та інформаційні технології за Ключові слова "004.75"
Зараз показуємо 1 - 2 з 2
Результатів на сторінці
Налаштування сортування
Документ Advanced methods for maintaining and managing the life cycle of cloud environments: survey(Хмельницький національний університет, 2024) Lysenko, S.; Bondaruk, O.Resource management is a fundamental concept in cloud computing and virtualization, encompassing the allocation, release, coordination, and monitoring of cloud resources to optimize efficiency. The complexity arises from the virtualized, heterogeneous, and multi-user nature of these resources. Effective governance is challenging due to uncertainty, large-scale infrastructures, and unpredictable user states. This paper presents a comprehensive taxonomy of resource management technologies, offering a detailed analysis of design architecture, virtualization, and cloud deployment models, along with capabilities, objectives, methods, and mechanisms. In a cloud computing environment, deploying application-based resource management techniques necessitates understanding the system architecture and deployment model. This paper explores centralized and distributed resource management system architectures, providing a review of effective resource management techniques for both, accompanied by a comparative analysis. The evolution of cloud computing from a centralized to a distributed paradigm is examined, emphasizing the shift towards distributed cloud architectures to harness the computing power of smart connected devices at the network edge. These architectures address challenges like latency, energy consumption, and security, crucial for IoT-based applications. The literature proposes various methods for distributed resource management, aligning with the distributed nature of these architectures. Resource management in cloud computing involves discovery, provisioning, allocation, and monitoring functions, with sub-functions like mapping and scheduling. Integrated approaches to consolidation and resource management have been explored in numerous studies. This paper summarizes and analyzes existing research on resource management functions, focusing on identification, provisioning, allocation planning, and monitoring, based on their objectives and methodsДокумент Method for synthesis of a scalable architecture of a distributed computer systems, resistant to social engineering attacks(Хмельницький національний університет, 2025) Bokhonko, Oleksandr; Atamaniuk, OlhaSocial engineering continues to be one of the most dangerous classes of threats for modern distributed IT systems, where event processing, resource access, and protection mechanisms are performed on a large number of heterogeneous nodes. The growth of the scale of architectures, the emergence of multi-channel interaction scenarios, remote users, and a high level of dynamism create challenges for the synthesis of systems that are able to maintain resistance to social engineering attacks. The study proposes methods and tools for the synthesis of distributed systems focused on ensuring structural, behavioral, and functional resistance to such attacks. The basis of the approach is the use of a population multi-agent mean-field model, which allows considering a large number of nodes as a coordinated system of local detectors interacting through an aggregated state space. This makes it possible to describe the impact of attacks not on individual components, but on the entire distributed system as a whole, and to evaluate its response through integrated risk and resilience indicators. The study forms a generalized model of a distributed system, defines the roles of different types of nodes, protections and interaction channels, and also describes the methodology for architecture synthesis, which includes the classification of local actions, coordination mechanisms and evaluation criteria. Special attention is paid to the integration of protective measures - deception components, multifactor authentication, filtering and segmentation mechanisms - into the structure of a distributed system. Methods for optimizing the distribution of these measures at different levels of the architecture are proposed in accordance with the dynamics of the mean field and target requirements for stability. An iterative approach to architecture synthesis is developed, which combines the adaptation of local node strategies with the tuning of global system parameters. The results demonstrate that the use of the mean field concept allows to ensure scalability of solutions, consistency of node behavior, and also to increase the ability of a distributed system to counteract social engineering attacks in conditions of uncertainty and high variability of scenarios. The methodology can be used for the design, improvement and engineering synthesis of real distributed IT architectures operating in critical environments.