基于事件传感器的分布式数据库管理系统中事件监控的数学模型

Yaroslav Kornaga, Andrii Barabash
{"title":"基于事件传感器的分布式数据库管理系统中事件监控的数学模型","authors":"Yaroslav Kornaga, Andrii Barabash","doi":"10.36994/2788-5518-2023-01-05-17","DOIUrl":null,"url":null,"abstract":"Methods of increasing the effectiveness of threat detection in distributed databases using the event monitoring system are considered in the work. It is noted that the system works on the basis of the event monitoring model of heterogeneous distributed databases. This model involves three stages of event processing, which are based on appropriate methods. It is highlighted that the mechanisms underlying the functioning of the mentioned methods should be reduced to a single data format to eliminate the possible appearance of incorrect work in future calculations. The event processing method on the monitoring server allows for processing event matrices and transferring the function to control tools, on the basis of which appropriate decisions are made to improve reliability. The article develops a modified method of analyzing and monitoring events in non-relational distributed databases. Event monitoring options for lookup operations in distributed databases are offered. To confirm the theoretical results, mathematical modeling and experimental research on monitoring parameters and data processing speed on the event monitoring server were carried out. The number of detected incidents and the number of incorrectly identified events were studied, which in turn allowed for the protection of information from unauthorized actions or changes. Also, it should be emphasized that the model proposed in the work describes detailed monitoring of requests, transactions, and stored procedures in a database with information about possible incidents in real time and prompts intrusion warnings. In addition, the features of the proposed model make it possible to investigate and monitor the emergence of new vulnerable segments of the database and promptly respond to them, eliminating threats to access channels. The paper compares the speed of data processing based on files and database tables, which allows for fully performing experiments and confirming analytical data experimentally.","PeriodicalId":165726,"journal":{"name":"Інфокомунікаційні та комп’ютерні технології","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"MATHEMATICAL MODEL OF EVENTS MONITORING IN THE MANAGEMENT SYSTEM OF DISTRIBUTED DATABASES BASED ON EVENT SENSORS\",\"authors\":\"Yaroslav Kornaga, Andrii Barabash\",\"doi\":\"10.36994/2788-5518-2023-01-05-17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Methods of increasing the effectiveness of threat detection in distributed databases using the event monitoring system are considered in the work. It is noted that the system works on the basis of the event monitoring model of heterogeneous distributed databases. This model involves three stages of event processing, which are based on appropriate methods. It is highlighted that the mechanisms underlying the functioning of the mentioned methods should be reduced to a single data format to eliminate the possible appearance of incorrect work in future calculations. The event processing method on the monitoring server allows for processing event matrices and transferring the function to control tools, on the basis of which appropriate decisions are made to improve reliability. The article develops a modified method of analyzing and monitoring events in non-relational distributed databases. Event monitoring options for lookup operations in distributed databases are offered. To confirm the theoretical results, mathematical modeling and experimental research on monitoring parameters and data processing speed on the event monitoring server were carried out. The number of detected incidents and the number of incorrectly identified events were studied, which in turn allowed for the protection of information from unauthorized actions or changes. Also, it should be emphasized that the model proposed in the work describes detailed monitoring of requests, transactions, and stored procedures in a database with information about possible incidents in real time and prompts intrusion warnings. In addition, the features of the proposed model make it possible to investigate and monitor the emergence of new vulnerable segments of the database and promptly respond to them, eliminating threats to access channels. The paper compares the speed of data processing based on files and database tables, which allows for fully performing experiments and confirming analytical data experimentally.\",\"PeriodicalId\":165726,\"journal\":{\"name\":\"Інфокомунікаційні та комп’ютерні технології\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Інфокомунікаційні та комп’ютерні технології\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36994/2788-5518-2023-01-05-17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Інфокомунікаційні та комп’ютерні технології","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36994/2788-5518-2023-01-05-17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

研究了利用事件监控系统提高分布式数据库威胁检测效率的方法。该系统是在异构分布式数据库事件监控模型的基础上实现的。该模型涉及基于适当方法的事件处理的三个阶段。强调指出,应将上述方法运作的基础机制简化为单一数据格式,以消除在今后的计算中可能出现的不正确工作。监视服务器上的事件处理方法允许处理事件矩阵并将功能传递给控制工具,在此基础上做出适当的决策以提高可靠性。本文提出了一种改进的非关系型分布式数据库事件分析和监控方法。为分布式数据库中的查找操作提供了事件监视选项。为了验证理论结果,对事件监控服务器上的监控参数和数据处理速度进行了数学建模和实验研究。研究了检测到的事件数量和错误识别的事件数量,这反过来又允许保护信息免受未经授权的操作或更改。此外,应该强调的是,工作中提出的模型描述了对数据库中的请求、事务和存储过程的详细监控,并实时提供有关可能事件的信息,并提示入侵警告。此外,所提出的模型的特点使其能够调查和监测数据库中出现的新的易受攻击部分,并及时作出反应,从而消除对访问渠道的威胁。本文比较了基于文件和数据库表的数据处理速度,从而可以充分地进行实验和实验验证分析数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
MATHEMATICAL MODEL OF EVENTS MONITORING IN THE MANAGEMENT SYSTEM OF DISTRIBUTED DATABASES BASED ON EVENT SENSORS
Methods of increasing the effectiveness of threat detection in distributed databases using the event monitoring system are considered in the work. It is noted that the system works on the basis of the event monitoring model of heterogeneous distributed databases. This model involves three stages of event processing, which are based on appropriate methods. It is highlighted that the mechanisms underlying the functioning of the mentioned methods should be reduced to a single data format to eliminate the possible appearance of incorrect work in future calculations. The event processing method on the monitoring server allows for processing event matrices and transferring the function to control tools, on the basis of which appropriate decisions are made to improve reliability. The article develops a modified method of analyzing and monitoring events in non-relational distributed databases. Event monitoring options for lookup operations in distributed databases are offered. To confirm the theoretical results, mathematical modeling and experimental research on monitoring parameters and data processing speed on the event monitoring server were carried out. The number of detected incidents and the number of incorrectly identified events were studied, which in turn allowed for the protection of information from unauthorized actions or changes. Also, it should be emphasized that the model proposed in the work describes detailed monitoring of requests, transactions, and stored procedures in a database with information about possible incidents in real time and prompts intrusion warnings. In addition, the features of the proposed model make it possible to investigate and monitor the emergence of new vulnerable segments of the database and promptly respond to them, eliminating threats to access channels. The paper compares the speed of data processing based on files and database tables, which allows for fully performing experiments and confirming analytical data experimentally.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信