Skip to main content

2020 | OriginalPaper | Buchkapitel

New Methods of the Cybersecurity Knowledge Management Analytics

verfasst von : Sergey Petrenko, Krystina Makoveichuk, Alexander Olifirov

Erschienen in: Convergent Cognitive Information Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The article discusses the possibilities of using Master Data Management (MDM) technology to solve the problem of developing a corporate (institutional) state system segment to detect, prevent and eliminate the cyber - attack consequences (hereinafter - SOPKA). Typical objectives of semantic cyber security MDM is identified in article. The semantic cyber security MDM means a data management system that operates rules of the object behavior and interaction in cyberspace to solve the SOPKA problems in order to prevent the protected critical infrastructure transition to catastrophic states. Cyber security ontology (meta-ontology) as the knowledge presentation way about qualitative characteristics and quantitative patterns of information confrontation is proposed. Shown, that by combining cyber security data from various external and internal information sources and corresponding rules to detect, prevent, and eliminate the cyber-attacks consequences into a single semantic domain model, it is possible to build the required intellectual (and, in the future, cognitive) information space, then to develop the appropriate artificial cognitive agents and the corresponding intelligent “semantic cyber security MDM” software and hardware complex to support SOPKA operations as a whole. The basic development principles of the “semantic cyber security MDM” software and hardware complex are formulated. The possible architecture of the “Warning-2016” software and hardware complex that is intended for early cyber-attack warning on corporate and institutional information resources of the Russian Federation is shown. It is based on SAP HANA, and the required semantic MDM is implemented on the basis of SAP NetWeaver Master Data Management (SAP NW MDM).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Zaŝita informacii. Inside 5(71), 37–43 (2016). (in Russian) Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Zaŝita informacii. Inside 5(71), 37–43 (2016). (in Russian)
2.
Zurück zum Zitat Massel, A.G., Tyuryumin, V.O.: Events ontologies and their application for description of energy security threats. In: Proceedings of the Microwave & Telecommunication Technology (CriMiCo), 24th International Crimean Conference, pp. 443–444 (2014). https://doi.org/10.1109/crmico.2014.6959470 Massel, A.G., Tyuryumin, V.O.: Events ontologies and their application for description of energy security threats. In: Proceedings of the Microwave & Telecommunication Technology (CriMiCo), 24th International Crimean Conference, pp. 443–444 (2014). https://​doi.​org/​10.​1109/​crmico.​2014.​6959470
5.
Zurück zum Zitat Vorobiev, E.G., Petrenko, S.A., Kovaleva, I.V., Abrosimov, I.K.: Organization of the entrusted calculations in crucial objects of informatization under uncertainty. In: Proceedings of the 20th IEEE International Conference on Soft Computing and Measurements, SCM, St. Petersburg, Russia, 24–26 May 2017, pp. 299–300 (2017). https://doi.org/10.1109/scm.2017.7970566 Vorobiev, E.G., Petrenko, S.A., Kovaleva, I.V., Abrosimov, I.K.: Organization of the entrusted calculations in crucial objects of informatization under uncertainty. In: Proceedings of the 20th IEEE International Conference on Soft Computing and Measurements, SCM, St. Petersburg, Russia, 24–26 May 2017, pp. 299–300 (2017). https://​doi.​org/​10.​1109/​scm.​2017.​7970566
6.
Zurück zum Zitat Kotenko, I., Polubelova, O., Saenko, I., Doynikova, E.: The ontology of metrics for security evaluation and decision support in SIEM systems. In: Proceedings of the 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany, pp. 638–645 (2013). https://doi.org/10.1109/ares.2013.84 Kotenko, I., Polubelova, O., Saenko, I., Doynikova, E.: The ontology of metrics for security evaluation and decision support in SIEM systems. In: Proceedings of the 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany, pp. 638–645 (2013). https://​doi.​org/​10.​1109/​ares.​2013.​84
7.
Zurück zum Zitat Kotenko, I.V.: Intelligent mechanisms of cybersecurity management, in risk and security management. Proc. Inst. Syst. Anal. Russ. Acad. Sci. 41, 74–103 (2009). (in Russian) Kotenko, I.V.: Intelligent mechanisms of cybersecurity management, in risk and security management. Proc. Inst. Syst. Anal. Russ. Acad. Sci. 41, 74–103 (2009). (in Russian)
9.
Zurück zum Zitat Massel, L.V.: Problems of smart grid creation in Russia from the perspective of information technologies and cyber security. In: Proceedings of the All-Russian Seminar with International Participation, Methodological Issues of Research into the Reliability of Large Energy Systems, Reliability of Energy Systems: Achievements, Problems, Prospects, vol. 64, pp. 171–181. ISEM SB RAS, Irkutsk (2014). (in Russian) Massel, L.V.: Problems of smart grid creation in Russia from the perspective of information technologies and cyber security. In: Proceedings of the All-Russian Seminar with International Participation, Methodological Issues of Research into the Reliability of Large Energy Systems, Reliability of Energy Systems: Achievements, Problems, Prospects, vol. 64, pp. 171–181. ISEM SB RAS, Irkutsk (2014). (in Russian)
13.
Zurück zum Zitat Guarino, N.: Services as activities: towards a unified definition for (public) services. In: 2017 IEEE 21st International Proceedings of the Enterprise Distributed Object Computing Workshop (EDOCW), Quebec City, QC, Canada, 10–13 October 2017, pp. 102–105 (2017). https://doi.org/10.1109/edocw.2017.25 Guarino, N.: Services as activities: towards a unified definition for (public) services. In: 2017 IEEE 21st International Proceedings of the Enterprise Distributed Object Computing Workshop (EDOCW), Quebec City, QC, Canada, 10–13 October 2017, pp. 102–105 (2017). https://​doi.​org/​10.​1109/​edocw.​2017.​25
14.
Zurück zum Zitat Petrenko, S.A., Makoveichuk, K.A.: Ontology of cyber security of self-recovering smart GRID. In: Proceedings of the VIII All-Russian Scientific and Technical Conference on Secure Information Technologies (BIT 2017), Bauman Moscow State Technical University, Moscow, Russia, 6–7 December 2017, vol. 2081, pp. 98–106. CEUR Workshop Proceedings (2017). http://ceur-ws.org/Vol-2081/paper21.pdf. Accessed 21 Sept 2018 Petrenko, S.A., Makoveichuk, K.A.: Ontology of cyber security of self-recovering smart GRID. In: Proceedings of the VIII All-Russian Scientific and Technical Conference on Secure Information Technologies (BIT 2017), Bauman Moscow State Technical University, Moscow, Russia, 6–7 December 2017, vol. 2081, pp. 98–106. CEUR Workshop Proceedings (2017). http://​ceur-ws.​org/​Vol-2081/​paper21.​pdf. Accessed 21 Sept 2018
18.
Zurück zum Zitat Vorozhtsova, T.N.: Ontology as the basis for the development of intelligent cybersecurity systems. Ontol. Des. 4(14), 69–77 (2014). (in Russian) Vorozhtsova, T.N.: Ontology as the basis for the development of intelligent cybersecurity systems. Ontol. Des. 4(14), 69–77 (2014). (in Russian)
20.
Zurück zum Zitat Tarasov, V.B.: From multiagent systems to intellectual organizations. Editorial URSS, Moscow, Russia (2002). (in Russian) Tarasov, V.B.: From multiagent systems to intellectual organizations. Editorial URSS, Moscow, Russia (2002). (in Russian)
21.
Zurück zum Zitat Uschold, M., King, M.: Towards a methodology for building ontologies. In: Workshop on Basic Ontological Issues in Knowledge Sharing (1995) Uschold, M., King, M.: Towards a methodology for building ontologies. In: Workshop on Basic Ontological Issues in Knowledge Sharing (1995)
30.
Zurück zum Zitat Nayhanova, L.V.: Osnovnye aspekty postroeniya ontologiy verkhnego urovnya i predmetnoy oblasti [Main aspects of construction of high level ontologies and subject area]. In: Internet Portals: Content and Technologies, pp. 452–479. Informika, Prosveshchenie (2005). (in Russian) Nayhanova, L.V.: Osnovnye aspekty postroeniya ontologiy verkhnego urovnya i predmetnoy oblasti [Main aspects of construction of high level ontologies and subject area]. In: Internet Portals: Content and Technologies, pp. 452–479. Informika, Prosveshchenie (2005). (in Russian)
32.
Zurück zum Zitat Fedotova, V., Tarasov, V.B.: Development and interpretation of spiral lifecycle’s model: a granular computing approach. Part 1. Lifecycle granulation and spiral representation. In: Proceedings of the Seventh International Conference on Soft Computing, Computing with words and Perceptions in System Analysis, Decision and Control (ICSCCW 13), pp. 431–440, September 2013 Fedotova, V., Tarasov, V.B.: Development and interpretation of spiral lifecycle’s model: a granular computing approach. Part 1. Lifecycle granulation and spiral representation. In: Proceedings of the Seventh International Conference on Soft Computing, Computing with words and Perceptions in System Analysis, Decision and Control (ICSCCW 13), pp. 431–440, September 2013
Metadaten
Titel
New Methods of the Cybersecurity Knowledge Management Analytics
verfasst von
Sergey Petrenko
Krystina Makoveichuk
Alexander Olifirov
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37436-5_27