Cyber threats to the Private Academic Cloud

被引:0
|
作者
Lakhno, Valerii [1 ]
Akhmetov, Bakhytzhan [2 ]
Kryvoruchko, Olena [3 ]
Chubaievskyi, Vitalyi [3 ]
Desiatko, Alona [3 ]
Bereke, Madina [2 ]
Shalabaeva, Maria [4 ]
机构
[1] Natl Univ Life & Environm Sci Ukraine, Kiev, Ukraine
[2] Abai Kazakh Natl Pedag Univ, Alma Ata, Kazakhstan
[3] State Univ Trade & Econ, Kiev, Ukraine
[4] Kazakh Univ Ways Commun, Alma Ata, Kazakhstan
关键词
information security; private academic cloud; cyber threats;
D O I
10.24425/ijet.2024.149560
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection methods. This paper introduces a Threat Analyzer Software (TAS) and predictive algorithm rooted in both an operational model and discrete threat recognition procedures (DTRPs). These tools aid in identifying the functional layers that attackers could exploit to embed malware in guest operating systems (OS) and the PAC hypervisor. The solutions proposed herein play a crucial role in ensuring countermeasures against malware introduction into the PAC. Various hypervisor components are viewed as potential threat sources to the PAC's information security (IS). Such threats may manifest through the distribution of malware or the initiation of processes that compromise the PAC's security. The demonstrated counter-threat method, which is founded on the operational model and discrete threat recognition procedures, facilitates the use of mechanisms within the HIPV to quickly identify cyber attacks on the PAC, especially those employing "rootkit" technologies. This prompt identification empowers defenders to take swift and appropriate actions to safeguard the PAC.
引用
收藏
页码:413 / 420
页数:8
相关论文
共 50 条
  • [1] A Study of Security Threats in the Private Cloud
    Satimowa, Yelena
    Bytleuowa, Assel
    [J]. MEETING SECURITY CHALLENGES THROUGH DATA ANALYTICS AND DECISION SUPPORT, 2016, 47 : 331 - 335
  • [2] Trust Issues That Create Threats for Cyber Attacks in Cloud Computing
    Khorshed, Md Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    [J]. 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 900 - 905
  • [3] Cyber security threats, challenges and defence mechanisms in cloud computing
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. IET COMMUNICATIONS, 2020, 14 (07) : 1185 - 1191
  • [4] The Threats of Security on o Virt Private Cloud Computing Platform
    Fan, ZhengLe
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 419 - 421
  • [5] EduCloud : a private cloud tool for academic environments
    Cemim, Paolo
    Jersak, Luis Carlos
    Lopes, Giuseppe Alves
    De Mello Junior, Jair
    Ferreto, Tiago
    [J]. 2012 IEEE LATIN AMERICA CONFERENCE ON CLOUD COMPUTING AND COMMUNICATIONS (LATINCLOUD), 2012, : 66 - 71
  • [6] Vulnerability of Saudi Private Sector Organisations to Cyber Threats and Methods to Reduce the Vulnerability
    Shafie, Emad
    [J]. PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2022, 30 (03): : 1909 - 1926
  • [7] Physical threats vs Cyber threats
    Setola, Roberto
    [J]. International Journal of Critical Infrastructure Protection, 2024, 47
  • [8] Cyber-threats Information Sharing in Cloud Computing: A game Theoretic Approach
    Kamhoua, Charles
    Martin, Andrew
    Tosh, Deepak K.
    Kwiat, Kevin A.
    Heitzenrater, Chad
    Sengupta, Shamik
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 382 - 389
  • [9] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [10] Prepare for cyber threats
    Gill, Suzanne
    [J]. Control Engineering, 2019, 66 (10)