Mucahit Kutsal, Bihter Das, Ziya Aşkar, Ali Necdet Güverci̇n, Resul Daş
{"title":"利用统计和机器学习算法检测影子 IT 事件,实现企业的集中 IT 管理","authors":"Mucahit Kutsal, Bihter Das, Ziya Aşkar, Ali Necdet Güverci̇n, Resul Daş","doi":"10.36222/ejt.1382461","DOIUrl":null,"url":null,"abstract":"Software as a Service (SaaS) is a software service where software solutions are offered to users via the internet, usually subscription-based or sometimes opened to access by selling a license key, distributed over the cloud, and updates are automatically delivered to users because they are distributed over the cloud. The number of SaaS provider companies is increasing day by day, and with this increase, unauthorized purchase of SaaS applications has become a problem for corporate-sized companies. Without the company's approval, SaaS software and hardware used by employees increase Shadow IT which means there is a potential risk of security breaches, data loss, and compliance issues as the IT department is unaware of the usage and unable to monitor and control the systems effectively. In this study, in order to avoid the problems that may be caused by Shadow IT, unauthorized SaaS applications in Arçelik Global have been detected by utilizing statistical and machine learning approaches. In the experiment, Interquartile Range, K-Means and Stabilization algorithms were used for the detection of unauthorized SaaS applications. Using all three algorithms, low, medium and high-risk shadow IT detection was made for Arçelik company. We see that the proposed stabilization approach explores unauthorized SaaS applications much more distinctively than the other two algorithms. The proposed approach can be used in the future to detect unauthorized software from other companies.","PeriodicalId":413929,"journal":{"name":"European Journal of Technic","volume":"230 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of Shadow IT Incidents for Centralized IT Management in Enterprises using Statistical and Machine Learning Algorithms\",\"authors\":\"Mucahit Kutsal, Bihter Das, Ziya Aşkar, Ali Necdet Güverci̇n, Resul Daş\",\"doi\":\"10.36222/ejt.1382461\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software as a Service (SaaS) is a software service where software solutions are offered to users via the internet, usually subscription-based or sometimes opened to access by selling a license key, distributed over the cloud, and updates are automatically delivered to users because they are distributed over the cloud. The number of SaaS provider companies is increasing day by day, and with this increase, unauthorized purchase of SaaS applications has become a problem for corporate-sized companies. Without the company's approval, SaaS software and hardware used by employees increase Shadow IT which means there is a potential risk of security breaches, data loss, and compliance issues as the IT department is unaware of the usage and unable to monitor and control the systems effectively. In this study, in order to avoid the problems that may be caused by Shadow IT, unauthorized SaaS applications in Arçelik Global have been detected by utilizing statistical and machine learning approaches. In the experiment, Interquartile Range, K-Means and Stabilization algorithms were used for the detection of unauthorized SaaS applications. Using all three algorithms, low, medium and high-risk shadow IT detection was made for Arçelik company. We see that the proposed stabilization approach explores unauthorized SaaS applications much more distinctively than the other two algorithms. The proposed approach can be used in the future to detect unauthorized software from other companies.\",\"PeriodicalId\":413929,\"journal\":{\"name\":\"European Journal of Technic\",\"volume\":\"230 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Journal of Technic\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36222/ejt.1382461\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Technic","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36222/ejt.1382461","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
软件即服务(SaaS)是一种通过互联网向用户提供软件解决方案的软件服务,通常以订阅为基础,有时也通过出售许可证密钥开放访问,通过云分发,更新会自动发送给用户,因为它们是通过云分发的。SaaS 提供商公司的数量与日俱增,随着数量的增加,未经授权购买 SaaS 应用程序已成为企业规模公司面临的一个问题。在未经公司批准的情况下,员工使用的 SaaS 软件和硬件增加了影子 IT,这意味着存在安全漏洞、数据丢失和合规问题的潜在风险,因为 IT 部门不了解使用情况,也无法有效监控系统。在本研究中,为了避免影子 IT 可能导致的问题,我们利用统计和机器学习方法检测了 Arçelik Global 未授权的 SaaS 应用程序。在实验中,使用了四分位距算法、K-Means 算法和稳定算法来检测未经授权的 SaaS 应用程序。使用这三种算法,对 Arçelik 公司进行了低、中、高风险的影子 IT 检测。我们发现,与其他两种算法相比,所提出的稳定化方法对未授权 SaaS 应用程序的检测更为明显。建议的方法将来可用于检测其他公司的未授权软件。
Detection of Shadow IT Incidents for Centralized IT Management in Enterprises using Statistical and Machine Learning Algorithms
Software as a Service (SaaS) is a software service where software solutions are offered to users via the internet, usually subscription-based or sometimes opened to access by selling a license key, distributed over the cloud, and updates are automatically delivered to users because they are distributed over the cloud. The number of SaaS provider companies is increasing day by day, and with this increase, unauthorized purchase of SaaS applications has become a problem for corporate-sized companies. Without the company's approval, SaaS software and hardware used by employees increase Shadow IT which means there is a potential risk of security breaches, data loss, and compliance issues as the IT department is unaware of the usage and unable to monitor and control the systems effectively. In this study, in order to avoid the problems that may be caused by Shadow IT, unauthorized SaaS applications in Arçelik Global have been detected by utilizing statistical and machine learning approaches. In the experiment, Interquartile Range, K-Means and Stabilization algorithms were used for the detection of unauthorized SaaS applications. Using all three algorithms, low, medium and high-risk shadow IT detection was made for Arçelik company. We see that the proposed stabilization approach explores unauthorized SaaS applications much more distinctively than the other two algorithms. The proposed approach can be used in the future to detect unauthorized software from other companies.