Журнал «Современная Наука»

Russian (CIS)English (United Kingdom)
MOSCOW +7(495)-142-86-81

Approaches to the formation of security in microservice architecture

Irbitskiy Ilya Sergeevich  (Postgraduate student, Moscow Aviation Institute (National Research University))

Romanenkov Alexander Mikhailovich  (Candidate of Technical Sciences, Associate Professor, Moscow Aviation Institute (National Research University); Senior Researcher, FITZ IU RAS)

Stulnikov Kirill Timurovich  (Moscow Aviation Institute (National Research University))

Udalov Nikita N.  (Moscow Aviation Institute (National Research University))

The rapid development and spread of network cloud services by the early 2010s led to disappointment in the classic, so-called monolithic version of the application architecture. Due to the complexity of individual modules, often representing entire software systems, as well as due to the need to ensure compatibility between them through standard protocols, making any changes and additions has become a non-trivial task that takes too much time. As an answer to this challenge, the architecture of microservices was proposed as a distributed system of the simplest and easily replaceable modules that perform, if possible, a single elementary function. At the same time, the microservice system has a symmetrical, peer-to-peer, rather than hierarchical organization, which eliminates the need for a complex organization of relationships. Services communicate with each other and with clients using lightweight protocols, for example, via HTTP or text messages. As a result, a system is created that is easy to deploy and upgrade with automatic development and update functions. By 2021, microservice architecture is in the center of attention of specialists and not only: it is written about in blogs, in social networks, discussed in the press and at various conferences. The successful implementation of microservices is announced by representatives of Amazon, Google, Netflix and Twitter. In Russia, the experience of switching to microservices was reported by large banks, as well as, for example, M.Video-Eldorado and MegaFon.

Keywords:microservice, architecture, development, server, high-load software, attack, DDoS.

 

Read the full article …



Citation link:
Irbitskiy I. S., Romanenkov A. M., Stulnikov K. T., Udalov N. N. Approaches to the formation of security in microservice architecture // Современная наука: актуальные проблемы теории и практики. Серия: Естественные и Технические Науки. -2022. -№03. -С. 91-99 DOI 10.37882/2223-2966.2022.03.16
LEGAL INFORMATION:
Reproduction of materials is permitted only for non-commercial purposes with reference to the original publication. Protected by the laws of the Russian Federation. Any violations of the law are prosecuted.
© ООО "Научные технологии"