автоматичне масштабування

Methods and Means of Analyzing Application Security via Distributed Tracing

Summary The article describes methods and means of digital security that are utilizing distributed tracing to detect, investigate, and prevent security incidents. The described methods and means are applicable to solutions of any scale – from large enterprises to pet projects; of any domain – healthcare, banking, government, retail, etc. The article takes a comprehensive approach to digital security including identification, alerting, prevention, investigation, and audit of existing security incidents.

DEVELOPMENT OF A MODEL OF A CYBER THREATS DETECTION SYSTEM WITH SUPPORT AND UPDATE OF ATTACK DETECTION RULES

The article addresses the issue of data protection in information and communication systems amid the growing volume of traffic and the increasing number of cyber threats, necessitating improvements in the effectiveness of intrusion detection and prevention systems. Various types of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), their advantages, and disadvantages are considered. The methods of threat detection are analyzed, including signature-based methods, anomaly detection methods, and machine learning-based methods.

DEVELOPMENT OF A PLATFORM FOR RESEARCHING AUTOMATIC CONTAINER SCALING AND LOAD BALANCING IN DISTRIBUTED SYSTEMS

Quality of Service (QoS) is identified as a key task for distributed systems because meeting user needs is an important aspect of their successful functioning. Most container autoscaling solutions focus on resource optimization and cost management. However, these solutions often do not consider the dynamic user requirements for Quality of Service (QoS), resulting in delays in resource allocation and a decrease in service quality. Existing autoscaling and load balancing algorithms inadequately account for load dynamics, which is a significant issue.