розподілені системи

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

DEVELOPMENT OF A MODEL OF A CYBER THREATS DETECTION SYSTEM WITH SUPPORT AND UPDATE OF ATTACK DETECTION RULES

The article addresses the issue of data protection in information and communication systems amid the growing volume of traffic and the increasing number of cyber threats, necessitating improvements in the effectiveness of intrusion detection and prevention systems. Various types of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), their advantages, and disadvantages are considered. The methods of threat detection are analyzed, including signature-based methods, anomaly detection methods, and machine learning-based methods.

DEVELOPMENT OF A PLATFORM FOR RESEARCHING AUTOMATIC CONTAINER SCALING AND LOAD BALANCING IN DISTRIBUTED SYSTEMS

Quality of Service (QoS) is identified as a key task for distributed systems because meeting user needs is an important aspect of their successful functioning. Most container autoscaling solutions focus on resource optimization and cost management. However, these solutions often do not consider the dynamic user requirements for Quality of Service (QoS), resulting in delays in resource allocation and a decrease in service quality. Existing autoscaling and load balancing algorithms inadequately account for load dynamics, which is a significant issue.

Distributed Transactions in Microservice Architecture: Informed Decision-making Strategies

The emergence of microservice architecture has revolutionized software development practices by decentralizing components, facilitating scalability, and enabling agility in system design and deployment. There are some benefits of incorporating microservices instead of a single server, however, distributed components introduce extra constraints and complexities in maintaining data consistency as well. As microservices interact independently, coordinating data updates across multiple services becomes challenging, particularly in scenarios where transactional integrity is required.

DEVELOPMENT OF NETWORK SIMULATION MODEL FOR EVALUATING THE EFFICIENCY OF DISTRIBUTED CONSENSUS TAKING INTO ACCOUNT THE INSTABILITY OF NETWORK CONNECTIONS

The dynamic and unpredictable nature of network environments poses a significant challenge for distributed systems, particularly those relying on consensus algorithms for state management and fault tolerance. To address this challenge, this article introduces a novel simulation model designed to study the impact of unstable network connections on clusters running consensus algorithms. The model is engineered to mimic varying degrees of network instability, including latency fluctuations and connection disruptions, which are characteristic of real-world distributed systems.

Maximal extractable value (MEV) in blockchain networks and its impact on blockchain ecosystem

The advent of smart contract technology in blockchain networks has ushered in a new era of possibilities for implementing complex decentralized finance protocols. Over time, these protocols have gained significant traction, reaching a Total Value Locked (TVL) of over 150 billion US dollars. While blockchain networks offer inherent benefits such as immutability, transparency, decentralization, and security, they still grapple with a critical challenge – the inability to ensure a predictable order of transactions within produced blocks.

Optimization of the infrastructure of the distributed information system of goods accounting

An existing goods accounting information system was assessed for possible infrastructure optimization. A various parts of the system were analyzed to improve infrastructure costs without having a significant degradation of non-functional requirements. Modeling of the optimized system was performed, and evaluation of the infrastructure costs was made. Several optimization directions were evaluated, analyzed and either recommended or rejected.