Hide
Раскрыть

ISSN 2587-814X (print),
ISSN 2587-8158 (online)

Russian version: ISSN 1998-0663 (print),
ISSN 2587-8166 (online)

Marina Tumbinskaya 1, Bulat Bayanov2, Ruslan Rakhimov2, Nikita Kormiltcev2, Alexander Uvarov2
  • 1 Kazan National Research Technical University named after A.N. Tupolev, 10, Karl Marx Street, Kazan, 420111, Russian Federation
  • 2 Kazan National Research Technical University named after A.N. Tupolev, 10, Karl Marx Street, Kazan 420111 Russia

Analysis and forecast of undesirable cloud services traffic

2019. No. 1 Vol.13. P. 71–81 [issue contents]

      These days one of the main problems that must be solved to ensure information security in cloud services for corporations as well as for individual clients is to correctly identify and predict hacking in the network traffic. This paper presents statistics on information security threats, provides classification of information security threats for cloud services, identifies hackers’ goals, and proposes countermeasures.
      A vital task is to develop an effective method that could be used to protect cloud services from various network threats, as well as to analyze the network traffic. For these purposes, we chose a method based on an additive time series model, which allows us to predict the undesirable network traffic. To test this method, we obtained quantitative parameters for the undesirable traffic by simulating a network attack and collecting empirical data that describe this process. We used special software that simulates a network attack, and software that records and processes all the empirical data needed for the research.
      Using the data obtained, we analyzed the efficiency of the method based on the additive time series model. We demonstrated that this method is also applicable for research into the general dynamics of the number of network attacks in cyberspace. This method also allows us to reveal how the dynamics of the number of hacker network attacks depends on season, date, or time. The results show that, based on data describing the network traffic, one can identify and predict the undesirable hacker threats.

Citation:

Tumbinskaya M.V., Bayanov B.I., Rakhimov R.Zh., Kormiltcev N.V., Uvarov A.D. (2019) Analysis and forecast of undesirable cloud services traffic.Business Informatics, vol. 13, no 1, pp. 71–81   DOI: 10.17323/1998-0663.2019.1.71.81

BiBTeX
RIS
 
 
Rambler's Top100 rss