Development of a system for collecting, processing, analyzing, identifying and correlating events in the information infrastructure of the enterprise

Andrey S. Streltsov, G. Frantsuzova, Evgeniy A. Basinya
{"title":"Development of a system for collecting, processing, analyzing, identifying and correlating events in the information infrastructure of the enterprise","authors":"Andrey S. Streltsov, G. Frantsuzova, Evgeniy A. Basinya","doi":"10.17212/2782-2001-2023-1-101-113","DOIUrl":null,"url":null,"abstract":"A system for collecting, processing, analyzing, and identifying correlation of events of the enterprise information infrastructure known as SIEM, is proposed for consideration. With the development of corporate information systems, the number of threats related to the violation of accessibility, integrity, and confidentiality in them has increased tenfold. Ensuring information security is a complex task of responding, investigating, and eliminating the consequences of information security incidents (IS). The paper proposes a formalized description of the data that the proposed system uses. In addition, the general architecture and algorithm of functioning are highlighted. Special attention is paid to a detailed description of one of the main parts of the system (data collection agents). The information collection subsystem is characterized by the type of information collected: data on the operation of the application, host, and network or on inter-network interactions. A subsystem of this class accumulates heterogeneous data on a system or network to further analyze them for signs of computer attacks. To collect data, special modules -sensors and agents -are used, Tthe former are usually used to monitor network activity, and the latter are used to monitor and analyze actions in a particular system. The practical application of the improved model is possible both in the framework of research work and in automated information security control systems. The results obtained will be used in the further design of a complex system of continuous monitoring of the enterprise infrastructure. It is planned to consider the data storage subsystem. Subsequent work on the topic will allow us to specify the architecture and algorithm of functioning.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Analysis and data processing systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2001-2023-1-101-113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A system for collecting, processing, analyzing, and identifying correlation of events of the enterprise information infrastructure known as SIEM, is proposed for consideration. With the development of corporate information systems, the number of threats related to the violation of accessibility, integrity, and confidentiality in them has increased tenfold. Ensuring information security is a complex task of responding, investigating, and eliminating the consequences of information security incidents (IS). The paper proposes a formalized description of the data that the proposed system uses. In addition, the general architecture and algorithm of functioning are highlighted. Special attention is paid to a detailed description of one of the main parts of the system (data collection agents). The information collection subsystem is characterized by the type of information collected: data on the operation of the application, host, and network or on inter-network interactions. A subsystem of this class accumulates heterogeneous data on a system or network to further analyze them for signs of computer attacks. To collect data, special modules -sensors and agents -are used, Tthe former are usually used to monitor network activity, and the latter are used to monitor and analyze actions in a particular system. The practical application of the improved model is possible both in the framework of research work and in automated information security control systems. The results obtained will be used in the further design of a complex system of continuous monitoring of the enterprise infrastructure. It is planned to consider the data storage subsystem. Subsequent work on the topic will allow us to specify the architecture and algorithm of functioning.
开发用于收集、处理、分析、识别和关联企业信息基础设施中的事件的系统
提出了一个用于收集、处理、分析和识别企业信息基础设施事件相关性的系统(称为SIEM),以供考虑。随着企业信息系统的发展,与违反可访问性、完整性和保密性相关的威胁数量增加了十倍。确保信息安全是一项复杂的任务,包括响应、调查和消除信息安全事件的后果。本文提出了系统所使用的数据的形式化描述。此外,还重点介绍了系统的总体结构和功能实现算法。特别注意对系统的一个主要部分(数据收集代理)的详细描述。信息收集子系统的特征在于收集的信息类型:关于应用程序、主机和网络的操作或网络间交互的数据。这类子系统在系统或网络上积累异构数据,以进一步分析它们以寻找计算机攻击的迹象。为了收集数据,使用了特殊的模块——传感器和代理,前者通常用于监视网络活动,后者用于监视和分析特定系统中的操作。改进后的模型可以在研究工作框架和自动化信息安全控制系统中实际应用。所获得的结果将用于进一步设计对企业基础设施进行连续监控的复杂系统。计划考虑数据存储子系统。关于该主题的后续工作将允许我们指定功能的体系结构和算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信