Skip to main content
Log in

Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

We propose an approach to assess the security of computer systems based on case analysis. To implement case analysis, it is proposed to use the graph representation in combination with the advanced bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.

Similar content being viewed by others

REFERENCES

  1. Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.

    Article  Google Scholar 

  2. Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959–964.

    Article  Google Scholar 

  3. Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.

    Article  Google Scholar 

  4. Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proceedings of the 8th International Conference on Security of Information and Networks, ACM, 2015, pp. 142–149.

  5. Moskvin, D.A. and Myasnikov, A.V., Optimization of the penetration testing process using machine learning technologies, Sb. Materialov 27-i nauchno-tekhnicheskoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii” (Proc. 27th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), St. Petersburg, 2018, pp. 44–45.

  6. Borges, J., Martins, J., Andrade, J., dos Santos, H., and Militar-Cinamil, A., Design of a case-based reasoner for information security in military organizations, ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015, 2015, p. 26.

  7. Fei Jiang, Tianlong Gu, Liang Chang, and Zhoubo Xu, Case retrieval for network security emergency response based on description logic, 8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China, 2014, pp. 284–293.

  8. Chun, E., Han, J., and Han, H., Risk identification using case based reasoning in software project, J. Software, 2017, vol. 12, no. 9, pp. 744–751.

    Google Scholar 

  9. Micarelli, A. and Sansonetti, G., A case-based approach to anomaly intrusion detection, Lect. Notes Comput. Sci., 2007, vol. 4571, pp. 434-448.

    Article  Google Scholar 

  10. Zakaria, W.Z.A. and Mat Kiah, M.L., Implementing a CBR recommender for dynamic honeypot using jCOLIBRI, 3rd International Conference on Computer Science and Computational Mathematics, Langkawi, Kedah, Malaysia, 2014.

  11. Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Security control in information systems using the analysis of the graph of events obtained as a result of monitoring, Probl. Inf. Bezop., Komp’yut. Sist., 2017, pp. 31–38.

    Google Scholar 

  12. Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.

    Article  Google Scholar 

  13. Lavrova, D.S., An approach to developing the siem system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.

    Article  Google Scholar 

  14. Aleksandrova, E.B. and Pendrikova, O.N., Application of isogeny graphs to check the supersingularity of elliptic curves, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 3, pp. 63–69.

  15. Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 918–930.

    Article  Google Scholar 

Download references

Funding

The work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to E. A. Zaitseva, D. P. Zegzhda or M. A. Poltavtseva.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by G. Dedkov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zaitseva, E.A., Zegzhda, D.P. & Poltavtseva, M.A. Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems. Aut. Control Comp. Sci. 53, 937–947 (2019). https://doi.org/10.3103/S0146411619080327

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411619080327

Keywords:

Navigation