Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2019

01-12-2019

Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems

Authors: E. A. Zaitseva, D. P. Zegzhda, M. A. Poltavtseva

Published in: Automatic Control and Computer Sciences | Issue 8/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We propose an approach to assess the security of computer systems based on case analysis. To implement case analysis, it is proposed to use the graph representation in combination with the advanced bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.
Literature
1.
go back to reference Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.CrossRef Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.CrossRef
2.
go back to reference Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959–964.CrossRef Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959–964.CrossRef
3.
go back to reference Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef
4.
go back to reference Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proceedings of the 8th International Conference on Security of Information and Networks, ACM, 2015, pp. 142–149. Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proceedings of the 8th International Conference on Security of Information and Networks, ACM, 2015, pp. 142–149.
5.
go back to reference Moskvin, D.A. and Myasnikov, A.V., Optimization of the penetration testing process using machine learning technologies, Sb. Materialov 27-i nauchno-tekhnicheskoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii” (Proc. 27th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), St. Petersburg, 2018, pp. 44–45. Moskvin, D.A. and Myasnikov, A.V., Optimization of the penetration testing process using machine learning technologies, Sb. Materialov 27-i nauchno-tekhnicheskoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii” (Proc. 27th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), St. Petersburg, 2018, pp. 44–45.
6.
go back to reference Borges, J., Martins, J., Andrade, J., dos Santos, H., and Militar-Cinamil, A., Design of a case-based reasoner for information security in military organizations, ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015, 2015, p. 26. Borges, J., Martins, J., Andrade, J., dos Santos, H., and Militar-Cinamil, A., Design of a case-based reasoner for information security in military organizations, ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015, 2015, p. 26.
7.
go back to reference Fei Jiang, Tianlong Gu, Liang Chang, and Zhoubo Xu, Case retrieval for network security emergency response based on description logic, 8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China, 2014, pp. 284–293. Fei Jiang, Tianlong Gu, Liang Chang, and Zhoubo Xu, Case retrieval for network security emergency response based on description logic, 8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China, 2014, pp. 284–293.
8.
go back to reference Chun, E., Han, J., and Han, H., Risk identification using case based reasoning in software project, J. Software, 2017, vol. 12, no. 9, pp. 744–751. Chun, E., Han, J., and Han, H., Risk identification using case based reasoning in software project, J. Software, 2017, vol. 12, no. 9, pp. 744–751.
9.
go back to reference Micarelli, A. and Sansonetti, G., A case-based approach to anomaly intrusion detection, Lect. Notes Comput. Sci., 2007, vol. 4571, pp. 434-448.CrossRef Micarelli, A. and Sansonetti, G., A case-based approach to anomaly intrusion detection, Lect. Notes Comput. Sci., 2007, vol. 4571, pp. 434-448.CrossRef
10.
go back to reference Zakaria, W.Z.A. and Mat Kiah, M.L., Implementing a CBR recommender for dynamic honeypot using jCOLIBRI, 3rd International Conference on Computer Science and Computational Mathematics, Langkawi, Kedah, Malaysia, 2014. Zakaria, W.Z.A. and Mat Kiah, M.L., Implementing a CBR recommender for dynamic honeypot using jCOLIBRI, 3rd International Conference on Computer Science and Computational Mathematics, Langkawi, Kedah, Malaysia, 2014.
11.
go back to reference Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Security control in information systems using the analysis of the graph of events obtained as a result of monitoring, Probl. Inf. Bezop., Komp’yut. Sist., 2017, pp. 31–38. Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Security control in information systems using the analysis of the graph of events obtained as a result of monitoring, Probl. Inf. Bezop., Komp’yut. Sist., 2017, pp. 31–38.
12.
go back to reference Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.CrossRef Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.CrossRef
13.
go back to reference Lavrova, D.S., An approach to developing the siem system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.CrossRef Lavrova, D.S., An approach to developing the siem system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.CrossRef
14.
go back to reference Aleksandrova, E.B. and Pendrikova, O.N., Application of isogeny graphs to check the supersingularity of elliptic curves, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 3, pp. 63–69. Aleksandrova, E.B. and Pendrikova, O.N., Application of isogeny graphs to check the supersingularity of elliptic curves, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 3, pp. 63–69.
15.
go back to reference Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 918–930.CrossRef Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 918–930.CrossRef
Metadata
Title
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Authors
E. A. Zaitseva
D. P. Zegzhda
M. A. Poltavtseva
Publication date
01-12-2019
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2019
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619080327

Other articles of this Issue 8/2019

Automatic Control and Computer Sciences 8/2019 Go to the issue