FEATURES OF THE RULES OF FORMATION OF CENTRALIZATION OPTIONS FOR MULTICOMPUTARY SYSTEMS IN CORPORATE NETWORKS
DOI:
https://doi.org/10.31891/2219-9365-2024-80-46Keywords:
centralization, multicomputary systems, deceps, malicious software, computer attacks, baits, trapsAbstract
In order to identify malicious care and computer attacks, multi -computer systems of antivirus combined baits and traps must have mechanisms for restructuring its individual parts, the center of the system, and in general, the entire architecture alone without involving the administrator. The work analyzes the methods and systems that make it possible to restructure the architecture of systems. Particular attention is paid to the restructuring of the system center. This area of research is defined as promising.
The work details potentially possible variants of centralization in the architecture of multi -computer systems, which is given a model of the set of its elements and a column of communication between system components. The peculiarity of such a submission is to take into account the division of components into components with the center of the system and components without the center of the system. Also, possible topologies for the center center and determined the number of centralization options for each topology.
Further research will be the development on the basis of the topologies of the Center of Multicomputary Systems. Rights and the method of determining the next variant of centralization in systems that would ensure the functioning of systems in the restructuring of their architecture without involving the administrator.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Антоніна КАШТАЛЬЯН

This work is licensed under a Creative Commons Attribution 4.0 International License.