Development of decision support system using OLAP-technologies for information security monitoring systems

K.Q. Dashdamirova


The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on OLAP (Online Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected incidents in ISM systems.

Prombles in programming 2022; 3-4: 403-408


Information Security; Information Security Monitoring; SIEM; UBA; OLAP; Data warehouse

Full Text:



GRAHAM D. (2010). Cyber threats and the law of war. J. Nat'l Sec. L. & Pol'y Т. 4. P. 87.

АLGULIEV R. et al. (2014). Analysis of methods for network security monitoring. Problems of Information Technology. P. 60-68.

MUZALEVSKIY F. Information security monitoring. (in Russian). Available from: bezopasnosti. [Accessed 14/04/2022].

LITTLEWORT G. et al. (2011). The computer expression recognition toolbox (CERT). IEEE International Conference on Automatic Face & Gesture Recognition (FG). IEEE. P. 298-305.

Software Engineering Institute. Available from: [Accessed 04/03/2020].

YAZOV YU. K. & SOLOVYOV S. V. (2015). Protection of information in information systems from unauthorized access. Kvarta. P. 357-440. (in Russian)

BARRINGER H. et al. (2010). Formal analysis of log files. Journal of aerospace computing, information, and communication. Т. 7. No. 11. P. 365-390.

HOLM H. (2012). Performance of automated network vulnerability scanning at remediating security issues. Computers & Security. Т. 3. No. 2. P. 164-175.

CôRTES H. & SANTOS P. & DA SILVA. & FILHO J. I. (2022). Monitoring electrical systems data-network equipment by means of Fuzzy and Paraconsistent Annotated Logic. Expert Systems with Applications. P. 115865.

LETHBRIDGE T. C. & SIM S. E. & Singer J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical software engineering. Т. 10. No. 3. P. 311-341.

KARLZEN H. (2009). An Analysis of Security Information and Event Management Systems: The Use of SIEMs for Log Collection. Management. and Analysis. P. 45

BERNASCHINA C. et al. A big data analysis framework for model-based web user behavior analytics. International Conference on Web Engineering. Springer. Cham. P. 98-114.

SHASHANKA M. & SHEN M. Y. & WANG J. (2016). User and entity behavior analytics for enterprise security. IEEE International Conference on Big Data (Big Data). IEEE. P. 1867-1874.

KUFEL L. (2012). Security event monitoring in a distributed systems environment. IEEE security & privacy. Т. 11. No. 1. P. 36-43.

CODD E. F. & CODD S. B. & SALLEY C. T. (1993). Providing Olap. On-line Analytical Processing to User-Analists: An IT Mandate. Associates. Т. 19.

KRZYSZTOF. J. CIOS. (2007). Data Mining: A Knowledge Discovery Approach. Springer. P. 123.

NABIBAYOVA G. (2011). About an application of OLAP-technology in decision making support systems. 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE. P. 1-4.



  • There are currently no refbacks.