THE METHODOLOGY FOR PROTECTING GRID ENVIRONMENTS FROM MALICIOUS CODE DURING THE EXECUTION OF COMPUTATIONAL TASKS
DOI:
https://doi.org/10.28925/2663-4023.2025.27.710Keywords:
Grid environment; malicious code; risks of malicious interference; code verification; static and dynamic analysis; machine learning; memory security; protection architecture; adaptive security policy managementAbstract
The article is dedicated to the protection of Grid environments from malicious code that can be integrated during the execution of computational tasks. The main issues are identified, including high risks of malicious interference that could disrupt the operation of computational nodes or paralyze the entire system. The problem of spreading malicious code, which can disable nodes, is considered separately. A protection methodology based on automatic source code verification is proposed, allowing the detection of harmful programs before execution without significant impact on performance. Approaches to threat detection, including static and dynamic code analysis, as well as the use of machine learning algorithms for attack prediction, are discussed. The integration of such methodologies will enhance the security of Grid environments and promote their application in science and industry. The memory management model describes cells that can be in the states of free, allocated, or erroneous, and considers the need to protect memory from unauthorized access. Transitions between states are made through defined operations that ensure data security. The protection architecture includes a secure library, a dynamic verification module, and an access monitor, allowing effective monitoring and protection of the system from malicious software. The security strategy is based on adaptive policy management and static verification to prevent threats, enhancing resilience to cyber threats in real time.
Downloads
References
Sharma, R., & Shahi, M. (2019). Neural Network Models for Cyber Risk Assessment. Springer.
Chen, M., & Zhang, H. (2020). Integrating Fuzzy Logic in Information Security Risk Assessment. Journal of Risk Analysis, 31(4), 202–211.
Gupta, R., & Soni, A. (2020). Evaluation of Risk Factors in Information Security Using Fuzzy Logic. International Journal of Computer Science and Information Security, 18(4), 191–198.
Li, Z., & Yang, J. (2021). A Comparative Study of Risk Management Frameworks in Cybersecurity. Journal of Cybersecurity Research, 8(2), 157–168.
Wang, P., & Chen, H. (2021). Fuzzy Cognitive Maps in Information Risk Management. International Journal of Intelligent Systems, 36(4), 1234–1252.
Ravichandran, V., & Kumar, A. (2021). Cybersecurity Risk Management and Mitigation Strategies. Elsevier.
Bensoussan, A. M., & Green, M. D. (2018). Security in Grid computing environments. IEEE Transactions on Cloud Computing, 6(4), 976–989.
Curtis, R. M., & Chen, M. J. (2020). Risk Management in Information Security for Distributed Systems. Journal of Computer Security, 28(1), 65–77.
Chen, A. P., & Zhang, S. C. (2019). A secure Grid computing system design using cryptographic techniques. International Journal of Network Security, 17(3), 301–315.
Zhang, X., Liu, L., & Zhou, Y. (2021). Grid Security: A Comprehensive Survey. Future Generation Computer Systems, 109, 156–169.
Tan, L. M., Zhou, T. B., & Song, W. X. (2020). Enhancing security in grid computing systems using adaptive trust models. Journal of Grid Computing, 18(2), 237–249.
Wang, T., Chen, S. H., & Zhao, L. H. (2020). A survey on grid security and related frameworks. Computers & Security, 96.
Li, J., & Zhang, Y. (2019). Intrusion detection and prevention in Grid computing systems. International Journal of Information Security, 18(1), 29–41.
Kostiuk, Y. V., & Voytkevich, A. A. (2024). Research on Technologies for Detection and Identification of Intruders for Corporate Network Protection. “Science and Technology Today” (Series “Pedagogy”, Series “Law”, Series “Economics”, Series “Physical and Mathematical Sciences”, Series “Engineering”), 4(32), 1017–1032.
Yang, A. P., Liu, Y. S., & Xu, J. H. (2020). Grid Computing: Security challenges and solutions. Computer Science and Technology, 34(1), 33–45.
Zhao, L. L., & Li, J. T. (2021). Protection techniques for grid computing systems against malicious code. Journal of Computer Networks and Communications.
Kostiuk, Y. V., & Shapran, V. O. (2024). Technologies for Detection of Anomalous Events and Signatures in Real-Time. “Science and Technology Today” (Series “Pedagogy”, Series “Law”, Series “Economics”, Series “Physical and Mathematical Sciences”, Series “Engineering”), 4(32), 1069–1084.
Xu, P., Zhang, L., & Chen, J. (2022). The impact of malicious code on distributed systems and countermeasures. Journal of Information Security, 41(2), 156–170.
Dovzhenko, N., Mazur, N., Kostiuk, Y., & Rzaieva, S. (2024). Integration of IoT and Artificial Intelligence into Intelligent Transportation Systems. Electronic Scientific Journal “Cybersecurity: Education, Science, Technology”, 2(26), 430–444.
Kryvoruchko, O., Kostiuk, Y., & Desiatko, A. (2024). Systematization of signs of unauthorized access to corporate information based on application of cryptographic protection methods. Ukrainian Scientific Journal of Information Security, 30(1), 140–149.
Li, Q., & van der Schaar, M. (2004). Providing adaptive QoS to layered video over wireless local area networks through realtime retry limit adaptation. IEEE Transactions on Multimedia, 6(2), 278–290.
Kostiuk, Y., Bebeshko, B., Kryuchkova, L., Litvinov, V., Oksanych, I., Skladannyi, P., & Khorolska, K. (2024). Information Protection and Data Exchange Security in Wireless Mobile Networks with Authentication and Key Exchange Protocols. Electronic Professional Scientific Journal “Cybersecurity: Education, Science, Technology”, 1(25), 229–252.
Shen, H. P., Li, F., & Zhang, Z. (2021). AI-based approaches for intrusion detection in Grid computing. IEEE Transactions on Artificial Intelligence, 5(3), 256–270.
Zhang, Y. T., & Zhou, S. H. (2020). Risk assessment models for secure execution of computational tasks in grid environments. Journal of Cybersecurity Research, 7(4), 45–58.
Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Юлія Костюк, Надія Довженко, Наталія Мазур, Павло Складанний, Світлана Рзаєва Світлана

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.