Graph-analytical method for analysing information security events

Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above methods in identifying information secu...

Full description

Bibliographic Details
Main Authors: S.L. Zefirov, A.N. Akkuratnov
Format: Article
Language:English
Published: Penza State University Publishing House 2024-03-01
Series:Известия высших учебных заведений. Поволжский регион:Технические науки
Subjects:
_version_ 1797279184415883264
author S.L. Zefirov
A.N. Akkuratnov
author_facet S.L. Zefirov
A.N. Akkuratnov
author_sort S.L. Zefirov
collection DOAJ
description Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above methods in identifying information security incidents and to develop a method that eliminates the identified shortcomings. Materials and methods. The analysis of information security events was carried out using the methods of signature analysis, digital profiling and a new graphic-analytical method proposed in the framework of the study. Results. The shortcomings of the methods of signature analysis and profiling of information security events are determined. Identified types of information security incidents that are not included in the visibility of the above methods. The application of the proposed graphic-analytical method makes it possible to eliminate the identified shortcomings, identify unknown types of information security incidents, and expand the functionality of information security monitoring systems in general. Conclusions. The use of the proposed graphic-analytical method for analyzing information security events makes it possible to identify information security incidents that are not included in the visibility zone of signature methods and profiling methods, and also to use them to gain knowledge about the system under study, which is impossible with a visual analysis of the journal itself. The results of applying the method can be further used to identify information security incidents in real time.
first_indexed 2024-03-07T16:21:38Z
format Article
id doaj.art-514924664dd846918a719170a4ab5581
institution Directory Open Access Journal
issn 2072-3059
language English
last_indexed 2024-03-07T16:21:38Z
publishDate 2024-03-01
publisher Penza State University Publishing House
record_format Article
series Известия высших учебных заведений. Поволжский регион:Технические науки
spelling doaj.art-514924664dd846918a719170a4ab55812024-03-04T06:19:49ZengPenza State University Publishing HouseИзвестия высших учебных заведений. Поволжский регион:Технические науки2072-30592024-03-01410.21685/2072-3059-2023-4-5Graph-analytical method for analysing information security eventsS.L. Zefirov0A.N. Akkuratnov1Penza State UniversityScientific and Production Company “Kristall”Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above methods in identifying information security incidents and to develop a method that eliminates the identified shortcomings. Materials and methods. The analysis of information security events was carried out using the methods of signature analysis, digital profiling and a new graphic-analytical method proposed in the framework of the study. Results. The shortcomings of the methods of signature analysis and profiling of information security events are determined. Identified types of information security incidents that are not included in the visibility of the above methods. The application of the proposed graphic-analytical method makes it possible to eliminate the identified shortcomings, identify unknown types of information security incidents, and expand the functionality of information security monitoring systems in general. Conclusions. The use of the proposed graphic-analytical method for analyzing information security events makes it possible to identify information security incidents that are not included in the visibility zone of signature methods and profiling methods, and also to use them to gain knowledge about the system under study, which is impossible with a visual analysis of the journal itself. The results of applying the method can be further used to identify information security incidents in real time.information securityinformation security eventsevent correlationinformation security incidentdigital profileoriented graphanalysis of numerical series
spellingShingle S.L. Zefirov
A.N. Akkuratnov
Graph-analytical method for analysing information security events
Известия высших учебных заведений. Поволжский регион:Технические науки
information security
information security events
event correlation
information security incident
digital profile
oriented graph
analysis of numerical series
title Graph-analytical method for analysing information security events
title_full Graph-analytical method for analysing information security events
title_fullStr Graph-analytical method for analysing information security events
title_full_unstemmed Graph-analytical method for analysing information security events
title_short Graph-analytical method for analysing information security events
title_sort graph analytical method for analysing information security events
topic information security
information security events
event correlation
information security incident
digital profile
oriented graph
analysis of numerical series
work_keys_str_mv AT slzefirov graphanalyticalmethodforanalysinginformationsecurityevents
AT anakkuratnov graphanalyticalmethodforanalysinginformationsecurityevents