Abstract
A model of threats has been proposed that makes it possible to identify potential vulnerabilities of the cloud computing environment, including the actions related to system task scheduler malfunction in a timely manner and, thus, efficiently block information action channels beyond the control of guest operating systems or application software.
Similar content being viewed by others
References
Lukashin, A.A. and Zaborovsky, V.S., The system of protection of information services in cloud computing, Inf. Obraz. Nauki, 2013, no. 2 (18), pp. 39–53.
Zaborovsky, V.S. and Lukashin, A.A., Network-centric model and methods to control access to information resources in cloud computing, Nauchno-Tekh. Vedomosti Sankt-Peterb. Gos. Politekh. Univ., Inf. Telekommun. Uprav., 2012, no. 2, p. 183.
Zaborovsky, V.S. and Lukashin, A.A., High performance protected cloud, Otkrytye Sist., SUBD, 2013, no. 6, pp. 10–13.
Molyakov, A.S., Investigation of new models and methods of information security management tools to counteract the means of hidden impact, Informatsionnaya bezopasnost' regionov Rossii (IBRR2013). VIII SanktPeterburgskaya mezhregional’naya konferentsiya. Materialy konferentsii (Proc. VIII St.Petersburg Interregional Conference on Information Security of Russian Regions (IBRR-2013)), St. Petersburg, 2013, p. 151. http://www.spoisu.ru/files/ibrr/ibrr2013/ibrr2013_materials.pdf
Eisymont, L.K. and Molyakov, A.S., An overview of modern domestic and foreign supercomputer computing systems. Problems of information security, in Nauchno-tekhnicheskaya konferentsiya nauchnykh spetsialistov FGU NII Kvant: Materialy otcheta (Proc. Sci.-Tech. Conf. of Sci. Experts of FGU NII Kvant), Moscow, 2012.
Molyakov, A.S., KPROCESSOR_CID_TABLE factoring–a new method in the theory of computer analysis of the virus code and search for software beetles, Probl. Inf. Bezop., Komp. Sist., 2009, no. 1, pp. 7–18.
Molyakov, A.S., Research of hidden control mechanisms in OSon various platforms, Izv. Yuzhnogo Fed. Univ., Ser. Tekh. Nauki, 2007, no. 1.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.S. Molyakov, V.S. Zaborovsky, A.A. Lukashin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Molyakov, A.S., Zaborovsky, V.S. & Lukashin, A.A. Model of hidden IT security threats in the cloud computing environment. Aut. Control Comp. Sci. 49, 741–744 (2015). https://doi.org/10.3103/S0146411615080295
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080295