Graph-analytical method for analysing information security events
Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above methods in identifying information secu...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penza State University Publishing House
2024-03-01
|
Series: | Известия высших учебных заведений. Поволжский регион:Технические науки |
Subjects: |
_version_ | 1797279184415883264 |
---|---|
author | S.L. Zefirov A.N. Akkuratnov |
author_facet | S.L. Zefirov A.N. Akkuratnov |
author_sort | S.L. Zefirov |
collection | DOAJ |
description | Background. The object of the research is information security event logs. The
subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above
methods in identifying information security incidents and to develop a method that eliminates
the identified shortcomings. Materials and methods. The analysis of information security
events was carried out using the methods of signature analysis, digital profiling and a
new graphic-analytical method proposed in the framework of the study. Results. The shortcomings
of the methods of signature analysis and profiling of information security events
are determined. Identified types of information security incidents that are not included in
the visibility of the above methods. The application of the proposed graphic-analytical
method makes it possible to eliminate the identified shortcomings, identify unknown types
of information security incidents, and expand the functionality of information security monitoring
systems in general. Conclusions. The use of the proposed graphic-analytical method
for analyzing information security events makes it possible to identify information security
incidents that are not included in the visibility zone of signature methods and profiling
methods, and also to use them to gain knowledge about the system under study, which is
impossible with a visual analysis of the journal itself. The results of applying the method
can be further used to identify information security incidents in real time. |
first_indexed | 2024-03-07T16:21:38Z |
format | Article |
id | doaj.art-514924664dd846918a719170a4ab5581 |
institution | Directory Open Access Journal |
issn | 2072-3059 |
language | English |
last_indexed | 2024-03-07T16:21:38Z |
publishDate | 2024-03-01 |
publisher | Penza State University Publishing House |
record_format | Article |
series | Известия высших учебных заведений. Поволжский регион:Технические науки |
spelling | doaj.art-514924664dd846918a719170a4ab55812024-03-04T06:19:49ZengPenza State University Publishing HouseИзвестия высших учебных заведений. Поволжский регион:Технические науки2072-30592024-03-01410.21685/2072-3059-2023-4-5Graph-analytical method for analysing information security eventsS.L. Zefirov0A.N. Akkuratnov1Penza State UniversityScientific and Production Company “Kristall”Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose of the research is to identify the shortcomings of the above methods in identifying information security incidents and to develop a method that eliminates the identified shortcomings. Materials and methods. The analysis of information security events was carried out using the methods of signature analysis, digital profiling and a new graphic-analytical method proposed in the framework of the study. Results. The shortcomings of the methods of signature analysis and profiling of information security events are determined. Identified types of information security incidents that are not included in the visibility of the above methods. The application of the proposed graphic-analytical method makes it possible to eliminate the identified shortcomings, identify unknown types of information security incidents, and expand the functionality of information security monitoring systems in general. Conclusions. The use of the proposed graphic-analytical method for analyzing information security events makes it possible to identify information security incidents that are not included in the visibility zone of signature methods and profiling methods, and also to use them to gain knowledge about the system under study, which is impossible with a visual analysis of the journal itself. The results of applying the method can be further used to identify information security incidents in real time.information securityinformation security eventsevent correlationinformation security incidentdigital profileoriented graphanalysis of numerical series |
spellingShingle | S.L. Zefirov A.N. Akkuratnov Graph-analytical method for analysing information security events Известия высших учебных заведений. Поволжский регион:Технические науки information security information security events event correlation information security incident digital profile oriented graph analysis of numerical series |
title | Graph-analytical method for analysing information security events |
title_full | Graph-analytical method for analysing information security events |
title_fullStr | Graph-analytical method for analysing information security events |
title_full_unstemmed | Graph-analytical method for analysing information security events |
title_short | Graph-analytical method for analysing information security events |
title_sort | graph analytical method for analysing information security events |
topic | information security information security events event correlation information security incident digital profile oriented graph analysis of numerical series |
work_keys_str_mv | AT slzefirov graphanalyticalmethodforanalysinginformationsecurityevents AT anakkuratnov graphanalyticalmethodforanalysinginformationsecurityevents |