Monitoring of geoinformation system security incidents in performance supervision and management in industry

With a view to acceptable information security in industry, the information security control should be included in the management action plan of a whole production unit and should be based on the multifactor monitoring of the corporate information system security. The major problem in this regard is the quality of data on the security perimeter for the prompt response to a harmful effect. The issues of information security monitoring are addressed individually for each protective aspect. At the same time, toward the managerial decision-making supervision, the monitoring data should be presented in aggregation. The aim of this study is to elaborate a general criterion of an information security incident and correlation of monitoring data with different factors in industry. The study used the methods of probability theory, random process theory, modeling and systemic analysis. It is proposed to record information security events, then to identify them as incidents or not incidents, and, finally, to analyze them. The influence of the factor groups on the measurement accuracy of readings in the information security monitoring is determined. The monitoring flow is considered as a sequence of unit measurements of certain parameters at a certain frequency. The effect of random external factors, which lead to the measurement errors, on the probability of correct detection of incidents is illustrated.

Keywords: industry information security, security events, security event monitoring, monitoring data, information security incidents, measurement accuracy, geoinformation system of management, sensitivity analysis.
For citation:

Goncharenko S. N., Lachihina A. B. Monitoring of geoinformation system security incidents in performance supervision and management in industry. MIAB. Mining Inf. Anal. Bull. 2022;(3):108-116. [In Russ]. DOI: 10.25018/0236_1493_2022_3_0_108.

Acknowledgements:
Issue number: 3
Year: 2022
Page number: 108-116
ISBN: 0236-1493
UDK: 004.056.5:65.011.56
DOI: 10.25018/0236_1493_2022_3_0_108
Article receipt date: 24.11.2021
Date of review receipt: 10.12.2021
Date of the editorial board′s decision on the article′s publishing: 10.02.2022
About authors:

S.N. Goncharenko, Dr. Sci. (Eng.), Professor, National University of Science and Technology «MISiS», 119049, Moscow, Russia, e-mail: gsn@misis.ru, ORCID ID: 0000-0001-7783-3738.
A.B. Lachihina, Cand. Sci. (Eng.), Assistant Professor, N.E. Bauman Moscow State Technical University, Kaluga Branch, 248000, Kaluga, Russia, e-mail: lachikhinaab@bmstu.ru, ORCID ID: 0000-0001-7429-058X.

 

For contacts:

S.N. Goncharenko, e-mail: gsn@misis.ru.

Bibliography:

1. Korobets B. N., Minaev V. A., Sychev M. P. Information operations and modern information security culture challenges. Sistemy vysokoy dostupnosti. 2017, vol. 13, no. 3, pp. 38–46. [In Russ].

2. Lachikhina A. B., Petrakov A. A. Approaches and methods of information security control in industrial management. Voprosy radioelektroniki. 2017, no. 11, pp. 48–51. [In Russ].

3. Chen L., Xu L., Gao Z. On security analysis of proof-of-elapsed-time (PoET). International Symposium on Stabilization, Safety and Security of Distributed Systems. Springer, 2017, pp. 282–297. DOI: 10.1007/978-3-319-69084-1_19.

4. Zebari R. R., Zeebaree S. R. M., Jacksi K. Impact analysis of HTTP and SYN Flood DDoS Attacks on Apache 2 and IIS 10.0 Web Servers. International Conference on Advanced Science and Engineering (ICOASE). Duhok, Iraq, 2018, pp. 156–161.

5. Jucker A. H., Hausendorf H., Dürscheid C., Frick K., Hottiger C., Kesselheim W., Linke A., Meyer N., Steger A. Doing space in face-to-face interaction and on interactive multimodal platforms. Journal of Pragmatics. 2018, vol. 134, pp. 85–101.

6. Jiewu Leng, Hao Zhang, Douxi Yan, Qiang Liu, Xin Chen, Ding Zhang Digital twin-driven manufacturing cyber-physical system for parallel controlling of smart workshop. Journal of Ambient Intelligence and Humanized Computing. 2019, vol. 10, no. 3, pp. 1155–1166.

7. Nasir Q., Qasse I. A., Manar Abu Talib, Ali Bou Nassif Performance analysis of hyperledger fabric platforms. Security and Communication Networks. 2018, vol. 2018, article 3976093.

8. Vacca J. R. Computer and Information Security Handbook. Elsevier, 2017, 1280 p.

9. Samsonovich A., Klimov V., Miloslavskaya N. Stream data analytics for network attacks' prediction. Procedia Computer Science. 2020, vol. 169, pp. 57–62. DOI: 10.1016/j.procs.2020.02.114.

10. Miloslavskaya N. Information security management in SOCs and SICs. Journal of Intelligent & Fuzzy Systems. 2018, vol. 35, no. 3, pp. 2637– 2647. DOI: 10.3233/JIFS-169615.

11. Samsonovich A., Klimov V., Miloslavskaya N. Security zone infrastructure for network security intelligence centers. Procedia Computer Science. 2020, vol. 169, pp. 51–56. DOI: 10.1016/j.procs.2020.02.113.

12. Levonevskiy D. K., Vatamanyuk I. V., Malov D. A. Assurance of corporate intelligence services via the input data flow control. Programmnaya inzheneriya. 2019, vol. 10, no. 1, pp. 20—29. [In Russ]. DOI: 10.17587/рпп.10.20-29.

Our partners

Подписка на рассылку

Раз в месяц Вы будете получать информацию о новом номере журнала, новых книгах издательства, а также о конференциях, форумах и других профессиональных мероприятиях.