Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems

verfasst von: P. D. Zegzhda, M. A. Poltavtseva, A. I. Pechenkin, D. S. Lavrova, E. A. Zaitseva

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

This paper is devoted to solving the problem of developing a case-based decision support system for information security problems. The source data can be described as heterogeneous semistructured objects and formalized as property vectors. An approach to constructing a knowledge base for such problems using a two-level representation (the level of case-objects and the use case structure level) is given. The authors consider a use case modeling method for preparing a basic data set. Methods for assessing the similarity of heterogeneous semistructured objects and higher-level use cases are proposed. Results of experimental approbation of the described solutions and the architecture of the corresponding decision support system are presented.
Literatur
1.
Zurück zum Zitat Dua, S. and Du, X., Data Mining and Machine Learning in Cybersecurity, Taylor and Francis Group, LLC, 2011.CrossRefMATH Dua, S. and Du, X., Data Mining and Machine Learning in Cybersecurity, Taylor and Francis Group, LLC, 2011.CrossRefMATH
2.
Zurück zum Zitat Lee, W., Stolfo, S.J. and Mok, K.W., Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., 2000, vol. 14, no. 6, pp. 533–567. doi 10.1023/A:1006624031083CrossRefMATH Lee, W., Stolfo, S.J. and Mok, K.W., Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., 2000, vol. 14, no. 6, pp. 533–567. doi 10.1023/A:1006624031083CrossRefMATH
3.
Zurück zum Zitat Dasgupta, D. and Gonzalez, F.A., An intelligent decision support system for intrusion detection and response, Information Assurance in Computer Networks. MMM-ACNS 2001; Lect. Notes Comput. Sci., 2001, vol 2052. Dasgupta, D. and Gonzalez, F.A., An intelligent decision support system for intrusion detection and response, Information Assurance in Computer Networks. MMM-ACNS 2001; Lect. Notes Comput. Sci., 2001, vol 2052.
4.
Zurück zum Zitat Eremenko, N.N. and Kokoulin, A.N., Study of penetration testing methods in information systems, Master’s J., 2016, no. 2, pp. 181–186. Eremenko, N.N. and Kokoulin, A.N., Study of penetration testing methods in information systems, Master’s J., 2016, no. 2, pp. 181–186.
5.
Zurück zum Zitat Bertoglio, D.D. and Zorzo, A.F., Overview and open issues on penetration test, J. Braz. Comput. Soc., 2017, no. 23, p. 2. Bertoglio, D.D. and Zorzo, A.F., Overview and open issues on penetration test, J. Braz. Comput. Soc., 2017, no. 23, p. 2.
6.
Zurück zum Zitat Tumanov, S.A., Means of penetration testing of information systems, Dokl. Tomsk. Gos. Univ. Sist. Upr. Radioelektron., 2015, no. 2, pp. 73–79. Tumanov, S.A., Means of penetration testing of information systems, Dokl. Tomsk. Gos. Univ. Sist. Upr. Radioelektron., 2015, no. 2, pp. 73–79.
7.
Zurück zum Zitat Zhukov, V.G. and Shalyapin, A.A., Precedent analysis of information security incidents, Sib. Zh. Nauki Tekhnol., 2013, no. 2. Zhukov, V.G. and Shalyapin, A.A., Precedent analysis of information security incidents, Sib. Zh. Nauki Tekhnol., 2013, no. 2.
8.
Zurück zum Zitat Richter, M.M. and Weber, R., Case-Based Reasoning, Springer-Verlag Berlin Heidelberg, 2013. https://doi.org/ 10.1007/978-3-642-40167-1 Richter, M.M. and Weber, R., Case-Based Reasoning, Springer-Verlag Berlin Heidelberg, 2013. https://​doi.​org/​ 10.1007/978-3-642-40167-1
9.
Zurück zum Zitat Poltavtseva, M.A. and Pechenkin, A.I., Intelligent data analysis in decision support systems for penetration tests, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 985–991.CrossRef Poltavtseva, M.A. and Pechenkin, A.I., Intelligent data analysis in decision support systems for penetration tests, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 985–991.CrossRef
10.
Zurück zum Zitat Vasil’ev, V.I., Pestrikov, V.A., and Kras’ko, A.S., Intelligent support of decision-making in extreme situations based on the conclusion by precedents, Izv. Yuzhn. Fed. Univ., Tekh. Nauki, 2008, no. 8, pp. 7–14. Vasil’ev, V.I., Pestrikov, V.A., and Kras’ko, A.S., Intelligent support of decision-making in extreme situations based on the conclusion by precedents, Izv. Yuzhn. Fed. Univ., Tekh. Nauki, 2008, no. 8, pp. 7–14.
11.
Zurück zum Zitat Nikolaichuk, O.A., Knowledge modeling for studying the dynamics of the technical state of unique objects, Probl. Upr., 2009, no. 4, pp. 58–65. Nikolaichuk, O.A., Knowledge modeling for studying the dynamics of the technical state of unique objects, Probl. Upr., 2009, no. 4, pp. 58–65.
12.
Zurück zum Zitat Desktop Operating System Market Share Worldwide. http://gs.statcounter.com/os-market-share/desktop/ worldwide. Accessed February 2, 2018. Desktop Operating System Market Share Worldwide. http://​gs.​statcounter.​com/​os-market-share/​desktop/​ worldwide. Accessed February 2, 2018.
13.
Zurück zum Zitat OS Platform Statistics. https://www.w3schools.com/browsers/browsers_os.asp. Accessed February 2, 2018. OS Platform Statistics. https://​www.​w3schools.​com/​browsers/​browsers_​os.​asp.​ Accessed February 2, 2018.
14.
Zurück zum Zitat Market Share Statistics for Internet Technologies. Operating System Share by Version. https://netmarketshare.com/ operating-system-market-share.aspx. Accessed February 2, 2018. Market Share Statistics for Internet Technologies. Operating System Share by Version. https://​netmarketshare.​com/​ operating-system-market-share.aspx. Accessed February 2, 2018.
15.
Zurück zum Zitat Security TechCenter. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0262. Accessed February 2, 2018. Security TechCenter. https://​portal.​msrc.​microsoft.​com/​en-US/​security-guidance/​advisory/​CVE-2017-0262.​ Accessed February 2, 2018.
16.
Zurück zum Zitat Security TechCenter. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0263. Accessed February 2, 2018. Security TechCenter. https://​portal.​msrc.​microsoft.​com/​en-US/​security-guidance/​advisory/​CVE-2017-0263.​ Accessed February 2, 2018.
17.
Zurück zum Zitat Neely, L., SANS Institute InfoSec Reading Room. Exploits at the Endpoint: SANS 2016 Threat Landscape Survey. https://www.sans.org/reading-room/whitepapers/analyst/exploits-endpoint-2016-threat-landscape-survey-37157. Accessed February 2, 2018. Neely, L., SANS Institute InfoSec Reading Room. Exploits at the Endpoint: SANS 2016 Threat Landscape Survey. https://​www.​sans.​org/​reading-room/​whitepapers/​analyst/​exploits-endpoint-2016-threat-landscape-survey-37157.​ Accessed February 2, 2018.
18.
Zurück zum Zitat Thomas, H., International OpenOffice market shares. https://www.webmasterpro.de/portal/news/2010/ 02/05/international-openoffice-market-shares.html. Accessed February 2, 2018. Thomas, H., International OpenOffice market shares. https://​www.​webmasterpro.​de/​portal/​news/​2010/​ 02/05/international-openoffice-market-shares.html. Accessed February 2, 2018.
19.
Zurück zum Zitat Joachims, T., Learning to Classify Text Using Support Vector Machines: Methods, Theory and Algorithms, Kluwer Academic Publ., 2002.CrossRef Joachims, T., Learning to Classify Text Using Support Vector Machines: Methods, Theory and Algorithms, Kluwer Academic Publ., 2002.CrossRef
20.
Zurück zum Zitat Wallach, H.M., Topic modeling: Beyond bag-of-words, Proc. of the 23rd Int. Conf. on Machine Learning. ACM, 2006, pp. 977–984. Wallach, H.M., Topic modeling: Beyond bag-of-words, Proc. of the 23rd Int. Conf. on Machine Learning. ACM, 2006, pp. 977–984.
Metadaten
Titel
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
verfasst von
P. D. Zegzhda
M. A. Poltavtseva
A. I. Pechenkin
D. S. Lavrova
E. A. Zaitseva
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080278

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt