Development of decision support system using OLAP-technologies for information security monitoring systems

K.Q. Dashdamirova

Abstract


The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on OLAP (Online Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected incidents in ISM systems.

Prombles in programming 2022; 3-4: 403-408


Keywords


Information Security; Information Security Monitoring; SIEM; UBA; OLAP; Data warehouse

Full Text:

PDF

References


GRAHAM D. (2010). Cyber threats and the law of war. J. Nat'l Sec. L. & Pol'y Т. 4. P. 87.

АLGULIEV R. et al. (2014). Analysis of methods for network security monitoring. Problems of Information Technology. P. 60-68.

MUZALEVSKIY F. Information security monitoring. (in Russian). Available from: https://rtmtech.ru/articles/monitoring-informatsionnoj- bezopasnosti. [Accessed 14/04/2022].

LITTLEWORT G. et al. (2011). The computer expression recognition toolbox (CERT). IEEE International Conference on Automatic Face & Gesture Recognition (FG). IEEE. P. 298-305.

https://doi.org/10.1109/FG.2011.5771414

Software Engineering Institute. Available from: https://www.sei.cmu.edu/about/divisions/cert/index.cfm [Accessed 04/03/2020].

YAZOV YU. K. & SOLOVYOV S. V. (2015). Protection of information in information systems from unauthorized access. Kvarta. P. 357-440. (in Russian)

BARRINGER H. et al. (2010). Formal analysis of log files. Journal of aerospace computing, information, and communication. Т. 7. No. 11. P. 365-390.

https://doi.org/10.2514/1.49356

HOLM H. (2012). Performance of automated network vulnerability scanning at remediating security issues. Computers & Security. Т. 3. No. 2. P. 164-175.

https://doi.org/10.1016/j.cose.2011.12.014

CôRTES H. & SANTOS P. & DA SILVA. & FILHO J. I. (2022). Monitoring electrical systems data-network equipment by means of Fuzzy and Paraconsistent Annotated Logic. Expert Systems with Applications. P. 115865.

https://doi.org/10.1016/j.eswa.2021.115865

LETHBRIDGE T. C. & SIM S. E. & Singer J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical software engineering. Т. 10. No. 3. P. 311-341.

https://doi.org/10.1007/s10664-005-1290-x

KARLZEN H. (2009). An Analysis of Security Information and Event Management Systems: The Use of SIEMs for Log Collection. Management. and Analysis. P. 45

BERNASCHINA C. et al. A big data analysis framework for model-based web user behavior analytics. International Conference on Web Engineering. Springer. Cham. P. 98-114.

https://doi.org/10.1007/978-3-319-60131-1_6

SHASHANKA M. & SHEN M. Y. & WANG J. (2016). User and entity behavior analytics for enterprise security. IEEE International Conference on Big Data (Big Data). IEEE. P. 1867-1874.

https://doi.org/10.1109/BigData.2016.7840805

KUFEL L. (2012). Security event monitoring in a distributed systems environment. IEEE security & privacy. Т. 11. No. 1. P. 36-43.

https://doi.org/10.1109/MSP.2012.61

CODD E. F. & CODD S. B. & SALLEY C. T. (1993). Providing Olap. On-line Analytical Processing to User-Analists: An IT Mandate. Associates. Т. 19.

KRZYSZTOF. J. CIOS. (2007). Data Mining: A Knowledge Discovery Approach. Springer. P. 123.

NABIBAYOVA G. (2011). About an application of OLAP-technology in decision making support systems. 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE. P. 1-4.

https://doi.org/10.1109/ICAICT.2011.6110934




DOI: https://doi.org/10.15407/pp2022.03-04.403

Refbacks

  • There are currently no refbacks.