Способ прямого синтаксического преобразования данных как средство минимизации объема данных о событиях и инцидентах информационной безопасности
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

A method of direct syntactic transformation of data as a means of minimizing the amount of data on information security events and incidents

idKorolev I.D., idMarkin D.I., idLitvinov E.S., idRogozin E.A.

UDC УДК 004.654
DOI: 10.26102/2310-6018/2021.34.3.024

  • Abstract
  • List of references
  • About authors

The relevance of the study is due to the need to improve the speed and quality of information exchange in information infrastructures protected by means of information security centers (security operation centers) during the period of active malicious impact on the communication channel, the use of high-load or low-speed (unstable) communication channels. In this regard, this article is aimed at identifying a method (or method) for compressing transmitted data in real time (or with minimal delays), working with minimal requirements for the resources involved and allowing you to achieve the highest possible level of data compression. The method to study this problem is to compare the capabilities and characteristics of various methods and methods of data compression under specified conditions. This approach allows you to comprehensively consider the advantages and disadvantages of each of the proposed methods and methods, as well as to select and evaluate the most appropriate one. The article presents a large number of different methods and methods of data compression, reveals the main advantages of the chosen method of data compression by direct syntactic replacement, identifies its advantages and disadvantages, and justifies the need to use this method for compressing transmitted data about identified events and incidents of information security. The materials of the article are of practical value for specialists and developers working in the field of information security, as well as theoretical value for researchers conducting their research both in the field of information security and in the field of information technology in general.

1. Weissman D., Jayasumana A. Integrating IoT monitoring for security operation center. Global Internet Things Summit (GIoTS). 2020:1-6.

2. Kwon T., Song J.-S., Choi S., Lee Y. , Park J. VISNU: A novelvisualization methodology of security events optimized for a centralizedSOC. 13th Asia Joint Conf. Inf. Secur. (AsiaJCIS). 2018:1–7.

3. Plachkinova M., Maurer C. Security Breach at Target. Journal of Information Systems Education. 2018;29:11-20.

4. Choong-Hee H., Soon-Tai P., Sang-Joonc L. The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system. International Journal of Critical Infrastructure Protection. 2019;24:3-12.

5. David Janos F., HuuPhuoc Dai N. Security concerns towardssecurity operations centers inProc. IEEE 12th Int. Symp. Appl.Comput. Intell. Informat. (SACI). 2018;273–278.

6. Mihaela Oprea A., Li Z., Norris R., D Bowers K., MADE: Security Analytics for Enterprise Threat Detection. Proceedings of the 34th Annual Computer Security Applications ConferenceDecember. 2018:124–136.

7. Achmadi D., Suryanto Y., Ramli K. On developing information security management system (isms) framework for iso 27001-based data center. 2018 International Workshop on Big Data and Information Security (IWBIS). 2018:149-157.

8. Petrenko S. Security Operations Center (SOC) Key Role. Cyber security innovation for the digital economy. 2018:150-162.

9. Miloslavskaya N. Developing a Network Security Intelligence Center. Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2018 (Ninth Annual Meeting of the BICA Society). 2018:359-364.

10. Alali M., Almogren A., Mehedi Hassan M., Rassan I.A.L., BhuiyanMd.Z.A. Improving risk assessment model of cyber security using fuzzy logic inference system. Computers & Security. 2018:323-339.

11. Ganesan R., Shah A. A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. 2018:206-226.

12. Mutemwa M., Mtsweni J., Zimba L. Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). 2018:1-6.

13. Kuypers M.A., Maillart T., Pate-Cornell E. An empirical analysis of cyber security incidents at a large organization. Department of Management Science and Engineering. 2016:231-236.

14. Tanenbaum E., Weatherall D. Computer networks. 2012:555-559.

15. Vatolin D. S. Data compression methods. 2003:57-114.

16. K.R. Rao, P.X. Yip. The Transform and Data Compression Handbook. 2001:234-237.

17. Rissanen, J. A universal data compression system. IEEE Trans. Inform. TheoryI. 1983;29:656-664.

18. Iri N., Kosut O. Universal coding with point type classes. 51st Annual Conference on Information Sciences and Systems. 2017:1-6.

19. Abdulmunem A.A., Mohammed D.J., Hassan A.K. Non-linear data structure for data coding for size compression. 1st International Conference of Pure and Engineering Sciences, ICPES 2020. 2020.

20. Zhang Y., Lieven N.A.J., Nunez-Yanez J., Hutchinson P. Optimal compression of vibration data with lifting wavelet transform and context-based arithmetic coding. 25th EuropeanSignalProcessingConference, EUSIPCO 2017. 2017;25:1996-2000.

21. He L., Dai B., Zhang D. Data compression for optical spectrum-encoding imaging system. QiangjiguangYuLizishu. 2018;30(9):99002.

22. Shurigin V.A., Makarov V.V., Vavrenyuk A.B., Starikovskiy A.V. Use of universal coding with binary thirds for information compression and its security. International Journal of Soft Computing. 2015;10(6):383-390.

Korolev Igor Dmitrievich
doctor of technical sciences, professor

ORCID |

Krasnodar Higher Military School

Krasnodar, Russian Federation

Markin Denis Igorevich

ORCID |

Krasnodar Higher Military School

Krasnodar, Russian Federation

Litvinov Evgeny Sergeevich

ORCID |

Krasnodar Higher Military School

Krasnodar, Russian Federation

Rogozin Evgeny Alekseevich
Doctor of Technical Sciences, professor

ORCID |

Military Training and Research Center of the Air Force "Air Force Academy named after Professor N. E. Zhukovsky and Yu. A. Gagarin"

Voronezh, Russian Federation

Keywords: database, coding, compression, database management system, information security events and incidents, communication channels

For citation: Korolev I.D., Markin D.I., Litvinov E.S., Rogozin E.A. A method of direct syntactic transformation of data as a means of minimizing the amount of data on information security events and incidents. Modeling, Optimization and Information Technology. 2021;9(3). URL: https://moitvivt.ru/ru/journal/pdf?id=1002 DOI: 10.26102/2310-6018/2021.34.3.024 (In Russ).

478

Full text in PDF

Received 11.06.2021

Revised 26.09.2021

Accepted 27.09.2021

Published 30.09.2021