Software for security event management: Development and utilization

We address the challenge to the information security coming from the lack of algorithmic machinery for managing the security events. We start with a mathematical formulation of the problem for a tabular processor by introducing an appropriate target function. Details of corresponding algorithm can b...

Full description

Bibliographic Details
Main Author: Aleksandr V. Kuznetcov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2017-11-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/277
_version_ 1797715984563306496
author Aleksandr V. Kuznetcov
author_facet Aleksandr V. Kuznetcov
author_sort Aleksandr V. Kuznetcov
collection DOAJ
description We address the challenge to the information security coming from the lack of algorithmic machinery for managing the security events. We start with a mathematical formulation of the problem for a tabular processor by introducing an appropriate target function. Details of corresponding algorithm can be found by following the provided links. We describe our original software module that implements the algorithm for determining the registered security events. The module is based on the tabular processor certified by the Russian Federal Service for Technical and Export Control. We present a control sample for testing the developed module. The sample has the dimension 30x20 and contains 14 choices for threshold values of security events number. The results of the tests comply with the specified boundary conditions and demonstrate a nonlinear dependence of the objective function on the number of registered security events, as well as a nonlinear dependence of the percentage of the detected security event on the total initial number of security events to be registered at the event source. The performance of the module specifically, the central processing unit usage is found acceptable (not exceeding 33%), which allows one to use the software for typical automated workplaces equipped with appropriate tabular processors. Our approach is universal with respect to the application areas.
first_indexed 2024-03-12T08:14:53Z
format Article
id doaj.art-71250f7b31fc42729f090527eb943b89
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T08:14:53Z
publishDate 2017-11-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-71250f7b31fc42729f090527eb943b892023-09-02T18:58:11ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362017-11-01244525910.26583/bit.2017.4.06273Software for security event management: Development and utilizationAleksandr V. Kuznetcov0Financial University under the Government of the Russian Federation (Financial University)We address the challenge to the information security coming from the lack of algorithmic machinery for managing the security events. We start with a mathematical formulation of the problem for a tabular processor by introducing an appropriate target function. Details of corresponding algorithm can be found by following the provided links. We describe our original software module that implements the algorithm for determining the registered security events. The module is based on the tabular processor certified by the Russian Federal Service for Technical and Export Control. We present a control sample for testing the developed module. The sample has the dimension 30x20 and contains 14 choices for threshold values of security events number. The results of the tests comply with the specified boundary conditions and demonstrate a nonlinear dependence of the objective function on the number of registered security events, as well as a nonlinear dependence of the percentage of the detected security event on the total initial number of security events to be registered at the event source. The performance of the module specifically, the central processing unit usage is found acceptable (not exceeding 33%), which allows one to use the software for typical automated workplaces equipped with appropriate tabular processors. Our approach is universal with respect to the application areas.https://bit.mephi.ru/index.php/bit/article/view/277security eventsecurity event managementSIEMevent sourcetabular processor
spellingShingle Aleksandr V. Kuznetcov
Software for security event management: Development and utilization
Безопасность информационных технологий
security event
security event management
SIEM
event source
tabular processor
title Software for security event management: Development and utilization
title_full Software for security event management: Development and utilization
title_fullStr Software for security event management: Development and utilization
title_full_unstemmed Software for security event management: Development and utilization
title_short Software for security event management: Development and utilization
title_sort software for security event management development and utilization
topic security event
security event management
SIEM
event source
tabular processor
url https://bit.mephi.ru/index.php/bit/article/view/277
work_keys_str_mv AT aleksandrvkuznetcov softwareforsecurityeventmanagementdevelopmentandutilization