Abstract
We propose an approach to assess the security of computer systems based on case analysis. To implement case analysis, it is proposed to use the graph representation in combination with the advanced bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.
Similar content being viewed by others
REFERENCES
Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.
Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959–964.
Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.
Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proceedings of the 8th International Conference on Security of Information and Networks, ACM, 2015, pp. 142–149.
Moskvin, D.A. and Myasnikov, A.V., Optimization of the penetration testing process using machine learning technologies, Sb. Materialov 27-i nauchno-tekhnicheskoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii” (Proc. 27th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), St. Petersburg, 2018, pp. 44–45.
Borges, J., Martins, J., Andrade, J., dos Santos, H., and Militar-Cinamil, A., Design of a case-based reasoner for information security in military organizations, ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015, 2015, p. 26.
Fei Jiang, Tianlong Gu, Liang Chang, and Zhoubo Xu, Case retrieval for network security emergency response based on description logic, 8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China, 2014, pp. 284–293.
Chun, E., Han, J., and Han, H., Risk identification using case based reasoning in software project, J. Software, 2017, vol. 12, no. 9, pp. 744–751.
Micarelli, A. and Sansonetti, G., A case-based approach to anomaly intrusion detection, Lect. Notes Comput. Sci., 2007, vol. 4571, pp. 434-448.
Zakaria, W.Z.A. and Mat Kiah, M.L., Implementing a CBR recommender for dynamic honeypot using jCOLIBRI, 3rd International Conference on Computer Science and Computational Mathematics, Langkawi, Kedah, Malaysia, 2014.
Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Security control in information systems using the analysis of the graph of events obtained as a result of monitoring, Probl. Inf. Bezop., Komp’yut. Sist., 2017, pp. 31–38.
Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.
Lavrova, D.S., An approach to developing the siem system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.
Aleksandrova, E.B. and Pendrikova, O.N., Application of isogeny graphs to check the supersingularity of elliptic curves, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 3, pp. 63–69.
Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 918–930.
Funding
The work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by G. Dedkov
About this article
Cite this article
Zaitseva, E.A., Zegzhda, D.P. & Poltavtseva, M.A. Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems. Aut. Control Comp. Sci. 53, 937–947 (2019). https://doi.org/10.3103/S0146411619080327
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619080327