RUS  ENG
Full version
JOURNALS // Program Systems: Theory and Applications

Program Systems: Theory and Applications, 2011, Volume 2, Issue 4, Pages 17–31 (Mi ps44)

Problems and prospects analysis for cloud computing network attacks detection and prevention intelligent system creation
Yu. G. Emel'yanova, V. P. Fralenko

References

1. GDV Data Protection Blog http://www.globaldatavault.com/blog/for-magnolia-not-so-well-done/
2. Materialy WindowSecurity.com http://www.windowsecurity.com/search.asp?s=cloud
3. Zegzhda D. P., Ivashko A. M., Kak postroit zaschischennuyu informatsionnuyu sistemu, Mir i semya, SPb, 1997, 312 pp.
4. Press Release. Major Standards Development Organizations Collaborate to Further Adoption of Cloud Standards http://cloud-standards.org/wiki/index.php?title=Press_Release
5. Cloud Standards Summit. OMG Standards in Government & NGO's Workshop http://www.omg.org/news/meetings/GOV-WS/css/index.htm
6. Cloud Security Alliance https://cloudsecurityalliance.org/
7. Organization for the Advancement of Structured Information Standards http://www.oasis-open.org/org/  zmath
8. Open Data Center Alliance http://www.opendatacenteralliance.org/
9. National Institute of Standards and Technology http://www.nist.go/
10. CNews Cloud. Opublikovany dva dokumenta, napravlennykh na standartizatsiyu oblachnoi bezopasnosti, http://cloud.cnews.ru/news/line/index.shtml?2011/06/09/443475
11. Cloud-in-a-Box http://newsroom.intel.com/docs/DOC-2194
12. Cloud Security Platform http://itnews.com.ua/60064.html
13. Virtual desktop malware defence, http://www.dennistechnologylabs.com/reports/security/anti-malware/symantec/DTL_SYM_VDI.pdf
14. Symantec Endpoint Protection 12.1, http://www.symantec.com/content/ru/ru/enterprise/fact_sheets/ru-Symantec_Endpoint_Protection_SEP_Datasheet.pdf
15. Cisco vypustila resheniya dlya obespecheniya bezopasnosti cloud-servisov, http://www.securitylab.ru/news/378170.php
16. IBM Security NetworkIntrusion Prevention System http://public.dhe.ibm.com/common/ssi/ecm/en/wgd03002usen/WGD03002USEN.PDF  zmath
17. Oblachnye servisy na platforme HP CloudSystem, http://storagenews.ru/46/HP_CloudService_46.pdf
18. Russkaya gruppa polzovatelei Snort http://www.snortgroup.ru/
19. Fifth ACM SIGKDD International Conference on Knowledge Discovery & Data Mining http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
20. Fralenko V. P., “Neirosetevoe shifrovanie s primeneniem arkhitektury «koder/dekoder»”, Neirokompyutery: razrabotka i primenenie, 2010, no. 5, 11–16
21. Fralenko V. P., “Neirosetevaya tekhnologiya obnaruzheniya setevykh atak na informatsionnye resursy”, Aktualnye problemy raketno-kosmicheskogo priborostroeniya i informatsionnykh tekhnologii, III Vserossiiskaya nauchno-tekhnicheskaya konferentsiya, Izd-vo Radiotekhnika, M., 2011, 479–488
22. Modul monitoringa anomalnoi setevoi aktivnosti na osnove iskusstvennykh neironnykh setei — «Egida-NS», Svidetelstvo o gosudarstvennoi registratsii programmy dlya EVM № 2011611277
23. Emelyanova Yu. G., Talalaev A. A., Tischenko I. P., Fralenko V. P., “Neirosetevaya tekhnologiya obnaruzheniya setevykh atak na informatsionnye resursy”, Programmnye sistemy: teoriya i prilozheniya, 2:3(7) (2011), 3–15 http://psta.psiras.ru/read/psta2011_3_3-15.pdf  mathnet
24. Talalaev A. A., Tischenko I. P., Khachumov V. M., Fralenko V. P., “Razrabotka neirosetevogo modulya monitoringa anomalnoi setevoi aktivnosti”, Neirokompyutery: razrabotka i primenenie, 2011, no. 7, 32–38


© Steklov Math. Inst. of RAS, 2025