Development of decision support system using OLAP-technologies for information security monitoring systems
Abstract
The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on OLAP (Online Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected incidents in ISM systems.
Prombles in programming 2022; 3-4: 403-408
Keywords
Full Text:
PDFReferences
GRAHAM D. (2010). Cyber threats and the law of war. J. Nat'l Sec. L. & Pol'y Т. 4. P. 87.
АLGULIEV R. et al. (2014). Analysis of methods for network security monitoring. Problems of Information Technology. P. 60-68.
MUZALEVSKIY F. Information security monitoring. (in Russian). Available from: https://rtmtech.ru/articles/monitoring-informatsionnoj- bezopasnosti. [Accessed 14/04/2022].
LITTLEWORT G. et al. (2011). The computer expression recognition toolbox (CERT). IEEE International Conference on Automatic Face & Gesture Recognition (FG). IEEE. P. 298-305.
https://doi.org/10.1109/FG.2011.5771414
Software Engineering Institute. Available from: https://www.sei.cmu.edu/about/divisions/cert/index.cfm [Accessed 04/03/2020].
YAZOV YU. K. & SOLOVYOV S. V. (2015). Protection of information in information systems from unauthorized access. Kvarta. P. 357-440. (in Russian)
BARRINGER H. et al. (2010). Formal analysis of log files. Journal of aerospace computing, information, and communication. Т. 7. No. 11. P. 365-390.
https://doi.org/10.2514/1.49356
HOLM H. (2012). Performance of automated network vulnerability scanning at remediating security issues. Computers & Security. Т. 3. No. 2. P. 164-175.
https://doi.org/10.1016/j.cose.2011.12.014
CôRTES H. & SANTOS P. & DA SILVA. & FILHO J. I. (2022). Monitoring electrical systems data-network equipment by means of Fuzzy and Paraconsistent Annotated Logic. Expert Systems with Applications. P. 115865.
https://doi.org/10.1016/j.eswa.2021.115865
LETHBRIDGE T. C. & SIM S. E. & Singer J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical software engineering. Т. 10. No. 3. P. 311-341.
https://doi.org/10.1007/s10664-005-1290-x
KARLZEN H. (2009). An Analysis of Security Information and Event Management Systems: The Use of SIEMs for Log Collection. Management. and Analysis. P. 45
BERNASCHINA C. et al. A big data analysis framework for model-based web user behavior analytics. International Conference on Web Engineering. Springer. Cham. P. 98-114.
https://doi.org/10.1007/978-3-319-60131-1_6
SHASHANKA M. & SHEN M. Y. & WANG J. (2016). User and entity behavior analytics for enterprise security. IEEE International Conference on Big Data (Big Data). IEEE. P. 1867-1874.
https://doi.org/10.1109/BigData.2016.7840805
KUFEL L. (2012). Security event monitoring in a distributed systems environment. IEEE security & privacy. Т. 11. No. 1. P. 36-43.
https://doi.org/10.1109/MSP.2012.61
CODD E. F. & CODD S. B. & SALLEY C. T. (1993). Providing Olap. On-line Analytical Processing to User-Analists: An IT Mandate. Associates. Т. 19.
KRZYSZTOF. J. CIOS. (2007). Data Mining: A Knowledge Discovery Approach. Springer. P. 123.
NABIBAYOVA G. (2011). About an application of OLAP-technology in decision making support systems. 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE. P. 1-4.
https://doi.org/10.1109/ICAICT.2011.6110934
DOI: https://doi.org/10.15407/pp2022.03-04.403
Refbacks
- There are currently no refbacks.