Keywords: database, coding, compression, database management system, information security events and incidents, communication channels
A method of direct syntactic transformation of data as a means of minimizing the amount of data on information security events and incidents
UDC УДК 004.654
DOI: 10.26102/2310-6018/2021.34.3.024
The relevance of the study is due to the need to improve the speed and quality of information exchange in information infrastructures protected by means of information security centers (security operation centers) during the period of active malicious impact on the communication channel, the use of high-load or low-speed (unstable) communication channels. In this regard, this article is aimed at identifying a method (or method) for compressing transmitted data in real time (or with minimal delays), working with minimal requirements for the resources involved and allowing you to achieve the highest possible level of data compression. The method to study this problem is to compare the capabilities and characteristics of various methods and methods of data compression under specified conditions. This approach allows you to comprehensively consider the advantages and disadvantages of each of the proposed methods and methods, as well as to select and evaluate the most appropriate one. The article presents a large number of different methods and methods of data compression, reveals the main advantages of the chosen method of data compression by direct syntactic replacement, identifies its advantages and disadvantages, and justifies the need to use this method for compressing transmitted data about identified events and incidents of information security. The materials of the article are of practical value for specialists and developers working in the field of information security, as well as theoretical value for researchers conducting their research both in the field of information security and in the field of information technology in general.
1. Weissman D., Jayasumana A. Integrating IoT monitoring for security operation center. Global Internet Things Summit (GIoTS). 2020:1-6.
2. Kwon T., Song J.-S., Choi S., Lee Y. , Park J. VISNU: A novelvisualization methodology of security events optimized for a centralizedSOC. 13th Asia Joint Conf. Inf. Secur. (AsiaJCIS). 2018:1–7.
3. Plachkinova M., Maurer C. Security Breach at Target. Journal of Information Systems Education. 2018;29:11-20.
4. Choong-Hee H., Soon-Tai P., Sang-Joonc L. The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system. International Journal of Critical Infrastructure Protection. 2019;24:3-12.
5. David Janos F., HuuPhuoc Dai N. Security concerns towardssecurity operations centers inProc. IEEE 12th Int. Symp. Appl.Comput. Intell. Informat. (SACI). 2018;273–278.
6. Mihaela Oprea A., Li Z., Norris R., D Bowers K., MADE: Security Analytics for Enterprise Threat Detection. Proceedings of the 34th Annual Computer Security Applications ConferenceDecember. 2018:124–136.
7. Achmadi D., Suryanto Y., Ramli K. On developing information security management system (isms) framework for iso 27001-based data center. 2018 International Workshop on Big Data and Information Security (IWBIS). 2018:149-157.
8. Petrenko S. Security Operations Center (SOC) Key Role. Cyber security innovation for the digital economy. 2018:150-162.
9. Miloslavskaya N. Developing a Network Security Intelligence Center. Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2018 (Ninth Annual Meeting of the BICA Society). 2018:359-364.
10. Alali M., Almogren A., Mehedi Hassan M., Rassan I.A.L., BhuiyanMd.Z.A. Improving risk assessment model of cyber security using fuzzy logic inference system. Computers & Security. 2018:323-339.
11. Ganesan R., Shah A. A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. 2018:206-226.
12. Mutemwa M., Mtsweni J., Zimba L. Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). 2018:1-6.
13. Kuypers M.A., Maillart T., Pate-Cornell E. An empirical analysis of cyber security incidents at a large organization. Department of Management Science and Engineering. 2016:231-236.
14. Tanenbaum E., Weatherall D. Computer networks. 2012:555-559.
15. Vatolin D. S. Data compression methods. 2003:57-114.
16. K.R. Rao, P.X. Yip. The Transform and Data Compression Handbook. 2001:234-237.
17. Rissanen, J. A universal data compression system. IEEE Trans. Inform. TheoryI. 1983;29:656-664.
18. Iri N., Kosut O. Universal coding with point type classes. 51st Annual Conference on Information Sciences and Systems. 2017:1-6.
19. Abdulmunem A.A., Mohammed D.J., Hassan A.K. Non-linear data structure for data coding for size compression. 1st International Conference of Pure and Engineering Sciences, ICPES 2020. 2020.
20. Zhang Y., Lieven N.A.J., Nunez-Yanez J., Hutchinson P. Optimal compression of vibration data with lifting wavelet transform and context-based arithmetic coding. 25th EuropeanSignalProcessingConference, EUSIPCO 2017. 2017;25:1996-2000.
21. He L., Dai B., Zhang D. Data compression for optical spectrum-encoding imaging system. QiangjiguangYuLizishu. 2018;30(9):99002.
22. Shurigin V.A., Makarov V.V., Vavrenyuk A.B., Starikovskiy A.V. Use of universal coding with binary thirds for information compression and its security. International Journal of Soft Computing. 2015;10(6):383-390.
Keywords: database, coding, compression, database management system, information security events and incidents, communication channels
For citation: Korolev I.D., Markin D.I., Litvinov E.S., Rogozin E.A. A method of direct syntactic transformation of data as a means of minimizing the amount of data on information security events and incidents. Modeling, Optimization and Information Technology. 2021;9(3). URL: https://moitvivt.ru/ru/journal/pdf?id=1002 DOI: 10.26102/2310-6018/2021.34.3.024 (In Russ).
Received 11.06.2021
Revised 26.09.2021
Accepted 27.09.2021
Published 30.09.2021