Development of decision support system using OLAP-technologies for information security monitoring systems
The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have bee...
Gespeichert in:
| Datum: | 2023 |
|---|---|
| 1. Verfasser: | |
| Format: | Artikel |
| Sprache: | Englisch |
| Veröffentlicht: |
PROBLEMS IN PROGRAMMING
2023
|
| Schlagworte: | |
| Online Zugang: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/541 |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Назва журналу: | Problems in programming |
| Завантажити файл: | |
Institution
Problems in programming| _version_ | 1859510319040167936 |
|---|---|
| author | Dashdamirova, K.Q. |
| author_facet | Dashdamirova, K.Q. |
| author_sort | Dashdamirova, K.Q. |
| baseUrl_str | https://pp.isofts.kiev.ua/index.php/ojs1/oai |
| collection | OJS |
| datestamp_date | 2023-06-25T08:02:24Z |
| description | The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on OLAP (Online Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected incidents in ISM systems.Prombles in programming 2022; 3-4: 403-408 |
| first_indexed | 2025-07-17T09:41:21Z |
| format | Article |
| fulltext |
403
Захист інформації
УДК 681.3 http://doi.org/10.15407/pp2022.03-04.403
DEVELOPMENT OF DECISION SUPPORT SYSTEM
USING OLAP-TECHNOLOGIES FOR INFORMATION
SECURITY MONITORING SYSTEMS
Konul Dashdamirova
У статті висвітлено необхідність постійного моніторингу комп’ютерних мереж з метою забезпечення інформаційної безпеки та
проаналізовано джерела даних для моніторингу інформаційної безпеки . Досліджено методи збору даних з різних джерел, до-
сліджено категорії систем моніторингу інформаційної безпеки. Запропоновано архітектурно-технологічну модель системи під-
тримки прийняття рішень на основі OLAP (Online Analytical Processing) і сховища даних для швидкого реагування на інциденти
безпеки та виявлені інциденти в системах моніторингу інформаційної безпеки.
Ключові слова: інформаційна безпека, моніторинг інформаційної безпеки, SIEM, UBA, OLAP, сховище даних
The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the
sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and
categories of ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on
OLAP (Online Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected
incidents in ISM systems.
Keywords: Information Security, Information Security Monitoring, SIEM, UBA, OLAP, Data warehouse
Introduction
The rapid development of the global Internet network and Information Communication Technology (ICT)
has led to the formation of an information environment that affects all spheres of human activity. The emergence
of local and global CNs facilitated the rapid dissemination of information and created new opportunities for
information exchange. New technologies increase the efficiency of production processes and contribute to the
expansion of business relations. However, despite the intensive development of ICT, the vulnerability of modern
information systems and the CN does not decrease, and the dependence of the information technologies used by
society on the degree of security is increasing. Modern methods of processing, transmission and collection of
information lead to the emergence of threats related to the loss, distortion and disclosure of information. The CN
is constantly exposed to various types of cyber threats. These threats can be hacker attacks, malicious programs,
outdated or faulty network equipment and operating systems, mobile and public cloud computing, third-party
service providers, and so on [1]. In an environment where cyber threats are widespread and unavoidable, rapid
detection of cyber threats and rapid response to possible incidents are of great importance to ensure the uninter-
rupted and reliable operation of the CN. The need for continuous monitoring of the information security of the
CN becomes urgent. ISM is the process of collecting, systematizing and analyzing information about the status
of the network and the behavior of its users [2]. Modern ISM systems operate in a continuous, automatic mode,
allowing timely detection of threats and the preparation of appropriate notifications. Serves to prevent security
risks promptly.
Analysis of sources on which ISM systems are based
Information security is monitored by the process of checking all security incidents obtained from various
sources. The source of incidents can be CERTs, antivirus systems located in the infrastructure of various organiza-
tions, operating system logs, scanners for security analysis of information infrastructure, network equipment, and other
sources (Fig. 1.) [3].
Інформаційні системи
© K.Q. Dashdamirova, 2022
ISSN 1727-4907. Проблеми програмування. 2022. №3-4. Спеціальний випуск
УДК 681.3 http://doi.org/10.15407/pp2022.03-04...
DEVELOPMENT OF DECISION SUPPORT SYSTEM USING OLAP-
TECHNOLOGIES FOR INFORMATION SECURITY MONITORING
SYSTEMS
Konul Dashdamirova
У статті висвітлено необхідність постійного моніторингу комп'ютерних мереж з метою забезпечення інформаційної безпеки та
проаналізовано джерела даних для моніторингу інформаційної безпеки. Досліджено методи збору даних з різних джерел, дослі-
джено категорії систем моніторингу інформаційної безпеки. Запропоновано архітектурно-технологічну модель системи підтримки
прийняття рішень на основі OLAP (Online Analytical Processing) і сховища даних для швидкого реагування на інциденти безпеки та
виявлені інциденти в системах моніторингу інформаційної безпеки.
Ключові слова: інформаційна безпека, моніторинг інформаційної безпеки, SIEM, UBA, OLAP, сховище даних
The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources
of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of
ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on OLAP (Online
Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected incidents in ISM
systems.
Keywords: Information Security, Information Security Monitoring, SIEM, UBA, OLAP, Data warehouse
Introduction
The rapid development of the global Internet network and Information Communication Technology (ICT) has
led to the formation of an information environment that affects all spheres of human activity. The emergence of local
and global CNs facilitated the rapid dissemination of information and created new opportunities for information
exchange. New technologies increase the efficiency of production processes and contribute to the expansion of business
relations. However, despite the intensive development of ICT, the vulnerability of modern information systems and the
CN does not decrease, and the dependence of the information technologies used by society on the degree of security is
increasing. Modern methods of processing, transmission and collection of information lead to the emergence of threats
related to the loss, distortion and disclosure of information. The CN is constantly exposed to various types of cyber
threats. These threats can be hacker attacks, malicious programs, outdated or faulty network equipment and operating
systems, mobile and public cloud computing, third-party service providers, and so on [1]. In an environment where
cyber threats are widespread and unavoidable, rapid detection of cyber threats and rapid response to possible incidents
are of great importance to ensure the uninterrupted and reliable operation of the CN. The need for continuous
monitoring of the information security of the CN becomes urgent. ISM is the process of collecting, systematizing and
analyzing information about the status of the network and the behavior of its users [2]. Modern ISM systems operate in
a continuous, automatic mode, allowing timely detection of threats and the preparation of appropriate notifications.
Serves to prevent security risks promptly.
Analysis of sources on which ISM systems are based
Information security is monitored by the process of checking all security incidents obtained from various
sources. The source of incidents can be CERTs, antivirus systems located in the infrastructure of various organizations,
operating system logs, scanners for security analysis of information infrastructure, network equipment, and other
sources (Fig. 1.) [3].
Fig. 1. Sources for information security monitoring
CERT (Computer Emergency Response Team) is a group of computer security experts involved in collecting,
monitoring, classifying, and neutralizing incident information. The main purpose of CERT is to analyze incidents sent
by users (phishing, social engineering), suspicious files, viruses, as well as network traffic sessions, to respond quickly
to new threats, inform users and develop security recommendations [4].
СERT Antivirus
systems OS logs Security
scanners
Network
equipment
Fig. 1. Sources for information security monitoring
CERT (Computer Emergency Response Team) is a group of computer security experts involved in collecting,
monitoring, classifying, and neutralizing incident information. The main purpose of CERT is to analyze incidents sent
© К. Дашдамірова, 2022
ISSN 1727-4907. Проблеми програмування. 2022. № 3-4. Спеціальний випуск
404
Захист інформації
by users (phishing, social engineering), suspicious files, viruses, as well as network traffic sessions, to respond quickly
to new threats, inform users and develop security recommendations [4].
The first CERT group was formed at Carnegie Mellon University in 1988 after thousands of servers were
infected with the Morris worm. The group currently has the status of a CERT coordination center and licenses and
coordinates the activities of information security incident response centers around the world. National, regional or
industrial CERTs can be established in coordination with Carnegie Mellon University. Currently, many companies
around the world also create CERTs, but not all of them receive official status [5]. In total, there exist currently about
250 CERT teams in various countries around the world. Analysis of data collected in CERTs can allow for the timely
detection and prevention of cyber threats and the assessment of the level of information security within a country to
ensure the social security of society.
Today, computer viruses and malware are a real source of danger for any enterprise, organization, and others
that use information technology in their activities. The widespread use of these global networks can be explained by the
insufficient attention to network security issues in a large number of local computer networks. Computers are increasingly
infected with malicious software when working with Internet resources or through email messages. The target of viruses
can be any user’s computer, global or local computer networks. The damage can lead to the failure of the computer and
all computer networks in general, the violation of data integrity, accessibility, and confidentiality.
Every year, the creation of new types of viruses that can bypass traditional protection methods raises the issue
of protecting computer networks from malware. An important way to fight computer viruses is to prevent them in time.
Timely detection of infected files or disks, and complete destruction of detected viruses on each computer help to prevent
the spread of the virus epidemic to other computers and computer networks. Antivirus software is a special program that
is used to detect computer viruses, as well as undesirable (considered harmful) programs, recover infected (modified) files
by these programs, and prevent infection (modification) of files or operating systems with malicious code. Network anti-
virus programs carry out monitoring of servers, network computers, and installed software, allow you to monitor e-mail,
data of allowed network protocols (HTTP, FTP), file servers, external carriers (floppy disks, flashcards, CDs, DVDs), as
well as all channels through which computer viruses and malicious programs can penetrate [6].
The essence of the antivirus monitoring method is that the antivirus program is constantly in the computer’s
memory and monitors all suspicious actions performed by other programs. Antivirus monitoring allows you to check
all running programs, created, opened, and saved documents, programs, and files received via the Internet. The antivi-
rus monitor will inform the user if any program tries to perform potentially dangerous actions.
Log files found in the logs of operating systems or web servers contain system information about the operation
of the server or computer and information about the user behavior. The purpose of log files is to record all operations
performed on the webserver or computer for monitoring by the administrator. This information is of great importance
in the event of security incidents. Regular monitoring of logs and analysis of log files allows to identify errors in the
operation of a particular system or site, diagnose malicious activity, identify threats, threats, collect information about
user behavior, as well as evaluate according to various criteria [7].
Weaknesses in information systems, infrastructure nodes, and elements of the information security complex cre-
ate great problems for information security. To identify vulnerabilities, companies need to analyze the security of their
information infrastructure. As a rule, vulnerability scanners are used for security analysis from automatic instruments
operating in static and dynamic scanning modes. At present, this class of tools allows you to solve a wide range of prob-
lems. A vulnerability scanner is a program that identifies and creates a registry of all systems connected to the network
(servers, computers, virtual machines, containers, firewalls, switches, and printers). The program allows you to identify
each device, the operating system and installed programs on this device, as well as other attributes such as open ports
and user accounts and passwords, as well as track other elements that pose a potential threat to information security [8].
Faults in the hardware or software of the CN, slowing down or stopping the operation of important network services
can lead to unpleasant consequences. A modern network equipment monitoring system is a complex information system that
monitors servers, hosting, processes, and services on users’ computers, as well as files, folders, and databases. It consists of
the following components.
̶ network device indicators (CPU, temperature, device availability, packet loss, interface errors, available
throughput, etc.) are critical parameters that need to be monitored;
̶ monitoring – the process of collecting, assembling, and analyzing indicators to improve the understanding
of the characteristics and behavior of the components of the system. The data collected as a result of the
monitoring can be visualized and drawn in the form of various graphs, diagrams, and histograms.
̶ the warning system is an important component that takes action when changes occur in the values of the
observed indicators. When the critical value is reached, the metric value can try to solve the problem itself ac-
cording to the developed scenario or send an alert to the responsible person using SMS, email, and so on [1, 2].
The network equipment monitoring system allows receiving timely information about the fault, controlling the
situation, to eliminate the fault with minimal time loss [10]. During ISM, the monitoring information can be collected
from various sources using both automated and non-automated tools. Primary data collection is used to analyze the
state of information security and conduct various types of assessments. The following methods can be applied to obtain
primary data during the use of automated monitoring tools (Fig. 2):
̶ agent-based data collection (agents for security incident monitoring);
̶ data collection without agent;
̶ questionnaires (forms);
̶ software.
405
Захист інформації
Інформаційні системи
̶ questionnaires (forms);
̶ software.
Fig. 2. Methods for collecting information from different sources
A security monitoring agent is software installed on information infrastructure components and information
system nodes to gather the necessary information directly from a source. Monitoring agents can be used to collect
information on security incidents, software effectiveness, user behavior, and other information.
The method of collecting data without agents involves the receipt of data from sources over the network without
installing additional software for monitoring. Non-Agent data collection methods include:
̶ Read data directly from security log files or databases;
̶ Receiving information from sources using standard protocols for transmitting information about security
events;
̶ Data collection by connecting to the program interface or the web service of the data source.
By the usage of agent-free data collection method, data collection can be carried out about security incidents, the
operability of the software, and other information that the source can provide.
The collection of data on security incidents using questionnaires (forms) is carried out by filling in special
electronic (paper) forms and then transferring them to information security monitoring personnel.
Data collection method using software includes information management systems on information security
threats, security control systems, inventory means of software and technical means, software and information protection
tools, and so on [10].
Categories of ISM systems
All currently established and used ISM Systems can fall into one of the following categories.
SIEM (Security Information and Event Management) is a system that allows analyzing data obtained from
various sources in real-time. SIEM is a combination of Information Security Management and security event
management systems into a single security management system. The results of the analysis carried out by SIEM are
presented in a single interface, accessible to security analysts. This also facilitates the study of the corresponding
characteristic features of security events and allows analyzing the events that occur in order to respond to security
threats in real-time (Fig. 3). Sources of information for SIEM systems can be antivirus programs, authorization and
authentication systems, network screens, security walls, logs of network equipment, servers and workstations, intrusion
detection and prevention systems (IDS / IPS), information leakage prevention systems (DLP) and other programs [11].
Agent based Without agent Questionnaires
(forms) Software
Log Analysis
Log Collection
Event Correlation
Log Forensics
IT Compliance
App Log Monitoring
Object Access Auditing
Real-Time
User Activity Monitoring
Dashboards
Reporting
File Integrity Monitoring
Sistem & Device Log
Monitoring
Log Retention
SIEM
Fig. 2. Methods for collecting information from different sources
A security monitoring agent is software installed on information infrastructure components and information
system nodes to gather the necessary information directly from a source. Monitoring agents can be used to collect in-
formation on security incidents, software effectiveness, user behavior, and other information.
The method of collecting data without agents involves the receipt of data from sources over the network with-
out installing additional software for monitoring. Non-Agent data collection methods include:
̶ Read data directly from security log files or databases;
̶ Receiving information from sources using standard protocols for transmitting information about security
events;
̶ Data collection by connecting to the program interface or the web service of the data source.
By the usage of agent-free data collection method, data collection can be carried out about security incidents, the
operability of the software, and other information that the source can provide.
The collection of data on security incidents using questionnaires (forms) is carried out by filling in special electronic
(paper) forms and then transferring them to information security monitoring personnel.
Data collection method using software includes information management systems on information security
threats, security control systems, inventory means of software and technical means, software and information protec-
tion tools, and so on [10].
Categories of ISM systems
All currently established and used ISM Systems can fall into one of the following categories.
SIEM (Security Information and Event Management) is a system that allows analyzing data obtained from
various sources in real-time. SIEM is a combination of Information Security Management and security event manage-
ment systems into a single security management system. The results of the analysis carried out by SIEM are presented
in a single interface, accessible to security analysts. This also facilitates the study of the corresponding characteristic
features of security events and allows analyzing the events that occur in order to respond to security threats in real-
time (Fig. 3). Sources of information for SIEM systems can be antivirus programs, authorization and authentication
systems, network screens, security walls, logs of network equipment, servers and workstations, intrusion detection and
prevention systems (IDS / IPS), information leakage prevention systems (DLP) and other programs [11].
Інформаційні системи
̶ questionnaires (forms);
̶ software.
Fig. 2. Methods for collecting information from different sources
A security monitoring agent is software installed on information infrastructure components and information
system nodes to gather the necessary information directly from a source. Monitoring agents can be used to collect
information on security incidents, software effectiveness, user behavior, and other information.
The method of collecting data without agents involves the receipt of data from sources over the network without
installing additional software for monitoring. Non-Agent data collection methods include:
̶ Read data directly from security log files or databases;
̶ Receiving information from sources using standard protocols for transmitting information about security
events;
̶ Data collection by connecting to the program interface or the web service of the data source.
By the usage of agent-free data collection method, data collection can be carried out about security incidents, the
operability of the software, and other information that the source can provide.
The collection of data on security incidents using questionnaires (forms) is carried out by filling in special
electronic (paper) forms and then transferring them to information security monitoring personnel.
Data collection method using software includes information management systems on information security
threats, security control systems, inventory means of software and technical means, software and information protection
tools, and so on [10].
Categories of ISM systems
All currently established and used ISM Systems can fall into one of the following categories.
SIEM (Security Information and Event Management) is a system that allows analyzing data obtained from
various sources in real-time. SIEM is a combination of Information Security Management and security event
management systems into a single security management system. The results of the analysis carried out by SIEM are
presented in a single interface, accessible to security analysts. This also facilitates the study of the corresponding
characteristic features of security events and allows analyzing the events that occur in order to respond to security
threats in real-time (Fig. 3). Sources of information for SIEM systems can be antivirus programs, authorization and
authentication systems, network screens, security walls, logs of network equipment, servers and workstations, intrusion
detection and prevention systems (IDS / IPS), information leakage prevention systems (DLP) and other programs [11].
Agent based Without agent Questionnaires
(forms) Software
Log Analysis
Log Collection
Event Correlation
Log Forensics
IT Compliance
App Log Monitoring
Object Access Auditing
Real-Time
User Activity Monitoring
Dashboards
Reporting
File Integrity Monitoring
Sistem & Device Log
Monitoring
Log Retention
SIEM
Fig. 3. Security Information and Event Management
406
Захист інформації
UBA (User Behavioral Analytics) – systems that collect and analyze all behaviors, including managed data,
used to manage fraudulent activities at the expense of financial threats with internal threats [12].
UEBA (User and Entity Behavioral Analytics) – systems aimed at searching for and detecting anomalies
in the behavior of users and various systems. A class of behavioral analysis systems has been established because
companies use many different data collection systems to ensure information security. At the same time, employees
are not always able to review all the information received and respond to potential events in a timely manner. UEBA
systems increase efficiency by compiling profiles and ensuring timely response to possible data leaks [13].
Employee monitoring and time recording systems are systems that allow the organization to analyze the
activities of employees and monitor the use of working time in the workplace, as well as control business processes,
solve several tasks related to confidential information leaks, and further investigate of incidents [14].
Different types of attack detection and detection systems are aimed at improving the overall protection of
the corporate network [14].
The architecture of the decision support system in information security monitoring systems
To ensure the efficiency of decision-making is necessary in order to quickly respond to security breaches
and incidents in information security monitoring systems. In order to support decision-makers and improve ana-
lytical activities in this area, the development of a system that supports decision-making in information security
monitoring systems is proposed.
A decision support system is a computer system that allows decision-makers to make more reasonable
and correct decisions based on analytical recommendations provided to them. The decision support system can be
created on the basis of various technologies, including OLAP (Online Analytical Processing) and Data Warehouse
(DW) (Fig. 4.) [15]. The OLAP concept was described in 1993 by Edgar Codd, a well-known database researcher
and author of the relational data model. OLAP is a key component of the database. This is a technology that collects,
stores, and analyzes multidimensional data. Performs multidimensional, operational, and analytical data processing
in real-time. For the preparation of reports, the construction of forecast scenarios, and statistical calculations based
on large information systems with a complex structure are intended [16]. Through OLAP technology, the original
data is converted into information that can be used for decision-making. We can visualize the results of the analysis
and present the data in the form of graphs.
A warehouse is a place where all analytical information is collected for decision-making. ETL (Extract,
Transform, Load) is a three-step process called extraction, conversion, and loading that collects data from multiple
sources in a single parent repository.
̶ Extraction - extraction of data from external sources in an understandable format;
̶ Transformation - the conversion of primary data into suitable structures for the establishment of an
analytical system;
̶ Loading - uploading data to the warehouse.ETL processing is usually done by software, but can also be
done manually by system operators. Unnecessary data is cleaned up on the basis of statistical or expert
methods [17].
Figure 4 presents the architectural-technological model of the system that supports decision-making
for IMS.
At the first level, data sources are identified for ISM. The source of the data can be CERTs created within
an organization, a region, a country, network antiviruses, OS logs, security scanners, network equipment, and so on.
At the second level, the process of collecting primary data from various sources should be carried out for
the ISM system. Data can be collected from sources within an organization, a region, or a country. Data collection
can be done with agent programs, without agents, questionnaires (paper or electronic), or software. To ensure the
high quality of the data before it falls into a single Database, this may be necessary to clean it and delete unneces-
sary data. Therefore, in the intermediate stage, during the transition to the third level, the data enters the field of data
purification, and the ETL process is carried out as an intermediate stage.
Depending on the issue set at the third level, data on security incidents collected from sources within an
organization, region, or country by means of data collection methods (one or some of them may be) is collected in
the form of a separate database (DB) in one DW. Based on the data collected in each DB, reports are prepared for
analysis using OLAP technology.
On the fourth level, reports prepared for analysis on the basis of a separate database are collected in DW.
OLAP technology prepares reports for analysis by decision-makers on surveys sent to the data warehouse. Analysis
of security incidents collected from different sources within one organization, one region, or one country allow to
determine and assess the state of information security within an organization, one region, or one country, and to
identify the sources of threats.
Conclusion and Future Scope
The rapid development of the global Internet and ICT, and the impact on all areas of human activity,
raises the information security problem in CNs. The article analyzes ISM systems rapidly to detect cyber threats
and respond quickly to possible incidents for CNs to operate smoothly and reliably. Sources of primary data for
ISM systems were investigated, and categories of ISM systems were analyzed. As a result of the analysis, to en-
407
Захист інформації
sure the speed of decision-making for rapid response to security breaches and incidents was determined. In order
to support decision-makers and improve analytical activities in this area, a system has been developed to support
OLAP and data warehouse decision-making in ISM systems.
Інформаційні системи
investigated, and categories of ISM systems were analyzed. As a result of the analysis, to ensure the speed of decision-
making for rapid response to security breaches and incidents was determined. In order to support decision-makers and
improve analytical activities in this area, a system has been developed to support OLAP and data warehouse decision-
making in ISM systems.
/
Fig. 4. Architectural-technological model of Decision Support System for ISM systems
References
1. GRAHAM D. (2010). Cyber threats and the law of war. J. Nat'l Sec. L. & Pol'y Т. 4. P. 87.
2. АLGULIEV R. et al. (2014). Analysis of methods for network security monitoring. Problems of Information Technology. P. 60-68.
3. MUZALEVSKIY F. Information security monitoring. (in Russian). Available from: https://rtmtech.ru/articles/monitoring-informatsionnoj-
bezopasnosti. [Accessed 14/04/2022].
4. LITTLEWORT G. et al. (2011). The computer expression recognition toolbox (CERT). IEEE International Conference on Automatic Face
& Gesture Recognition (FG). IEEE. P. 298-305.
5. Software Engineering Institute. Available from: https://www.sei.cmu.edu/about/divisions/cert/index.cfm [Accessed 04/03/2020].
6. YAZOV YU. K. & SOLOVYOV S. V. (2015). Protection of information in information systems from unauthorized access. Kvarta. P. 357-
440. (in Russian)
Data Warehouse
Data sources
СERT Antivirus
systems OS logs
Security
scanners
Network
equipment ...
Data collection methods
Data processing and storage
Agent based Without agent Questionnaires
(forms) Software
DB1 Data Warehouse
...
Inquiry, report, analysis
OLAP
Visualization of
analysis results
DB2 DBn
Inquiry, report, analysis
OLAP
Inquiry, report, analysis
OLAP
Inquiry, report, analysis
OLAP
ETL, Data Cleaning
Fig. 4. Architectural-technological model of Decision Support System for ISM systems
References
1. GRAHAM D. (2010). Cyber threats and the law of war. J. Nat’l Sec. L. & Pol’y Т. 4. P. 87.
2. АLGULIEV R. et al. (2014). Analysis of methods for network security monitoring. Problems of Information Technology. P. 60-68.
3. MUZALEVSKIY F. Information security monitoring. (in Russian). Available from: https://rtmtech.ru/articles/monitoring-informatsionnoj-
bezopasnosti. [Accessed 14/04/2022].
4. LITTLEWORT G. et al. (2011). The computer expression recognition toolbox (CERT). IEEE International Conference on Automatic Face
& Gesture Recognition (FG). IEEE. P. 298-305.
5. Software Engineering Institute. Available from: https://www.sei.cmu.edu/about/divisions/cert/index.cfm [Accessed 04/03/2020].
6. YAZOV YU. K. & SOLOVYOV S. V. (2015). Protection of information in information systems from unauthorized access. Kvarta. P.
357-440. (in Russian)
7. BARRINGER H. et al. (2010). Formal analysis of log files. Journal of aerospace computing, information, and communication. Т. 7. No. 11. P.
365-390.
8. HOLM H. (2012). Performance of automated network vulnerability scanning at remediating security issues. Computers & Security. Т. 3.
No. 2. P. 164-175.
9. CôRTES H. & SANTOS P. & DA SILVA. & FILHO J. I. (2022). Monitoring electrical systems data-network equipment by means of
Fuzzy and Paraconsistent Annotated Logic. Expert Systems with Applications. P. 115865.
10. LETHBRIDGE T. C. & SIM S. E. & Singer J. (2005). Studying software engineers: Data collection techniques for software field
studies. Empirical software engineering. Т. 10. No. 3. P. 311-341.
11. KARLZEN H. (2009). An Analysis of Security Information and Event Management Systems: The Use of SIEMs for Log Collection. Manage-
ment. and Analysis. P. 45
12. BERNASCHINA C. et al. A big data analysis framework for model-based web user behavior analytics. International Conference on Web En-
gineering. Springer. Cham. P. 98-114.
13. SHASHANKA M. & SHEN M. Y. & WANG J. (2016). User and entity behavior analytics for enterprise security. IEEE International
Conference on Big Data (Big Data). IEEE. P. 1867-1874.
408
Захист інформації
14. KUFEL L. (2012). Security event monitoring in a distributed systems environment. IEEE security & privacy. Т. 11. No. 1. P. 36-43.
15. CODD E. F. & CODD S. B. & SALLEY C. T. (1993). Providing Olap. On-line Analytical Processing to User-Analists: An IT Man-
date. Associates. Т. 19.
16. KRZYSZTOF. J. CIOS. (2007). Data Mining: A Knowledge Discovery Approach. Springer. P. 123.
17. NABIBAYOVA G. (2011). About an application of OLAP-technology in decision making support systems. 5th International Conference on
Application of Information and Communication Technologies (AICT). IEEE. P. 1-4.
Received 17.07.2022
About the authors:
Dashdamirova Konul Qadim
PhD student and senior researcher
Institute of Information Technologies
Azerbaijan National Academy of Science
senior research associate.
Publications in foreign journals – 4
http://orcid.org/0000-0003-0365-6139
Place of work:
Institute of Information Technologies
Azerbaijan National Academy of Science
Azerbaijan Republic, Baku, B.Vahabzade str., 9A
Phone: (994 12) 539 01 67
E-mail: konulahmed@gmail.com
Прізвища та ініціали авторів і назва доповіді англійською мовою:
K.Q. Dashdamirova
Development of decision support system using
OLAP-technologies for information security
monitoring systems
Прізвища та ініціали авторів і назва доповіді українською мовою:
K.К. Дашдамірова
Розвиток системи підтримки рішень з використанням
OLAP-технологій для системи моніторингу інформаційної безпеки
|
| id | pp_isofts_kiev_ua-article-541 |
| institution | Problems in programming |
| keywords_txt_mv | keywords |
| language | English |
| last_indexed | 2025-07-17T09:41:21Z |
| publishDate | 2023 |
| publisher | PROBLEMS IN PROGRAMMING |
| record_format | ojs |
| resource_txt_mv | ppisoftskievua/4c/4394bbb5a542adc6ad718fbe4d0f1a4c.pdf |
| spelling | pp_isofts_kiev_ua-article-5412023-06-25T08:02:24Z Development of decision support system using OLAP-technologies for information security monitoring systems Розвиток системи підтримки рішень з використанням OLAP-технологій для системи моніторингу інформаційної безпеки Dashdamirova, K.Q. Information Security; Information Security Monitoring; SIEM; UBA; OLAP; Data warehouse UDC 681.3 інформаційна безпека; моніторинг інформаційної безпеки; SIEM; UBA; OLAP, сховище даних УДК 681.3 The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have been studied. The architectural-technological model of the system supporting decision-making based on OLAP (Online Analytical Processing) and data warehouse has been proposed for quick response to security-related incidents and detected incidents in ISM systems.Prombles in programming 2022; 3-4: 403-408 У статті висвітлено необхідність постійного моніторингу комп’ютерних мереж з метою забезпечення інформаційної безпеки та проаналізовано джерела даних для моніторингу інформаційної безпеки. Досліджено методи збору даних з різних джерел, досліджено категорії систем моніторингу інформаційної безпеки. Запропоновано архітектурно-технологічну модель системи підтримки прийняття рішень на основі OLAP (Online Analytical Processing) і сховища даних для швидкого реагування на інциденти безпеки та виявлені інциденти в системах моніторингу інформаційної безпеки.Prombles in programming 2022; 3-4: 403-408 PROBLEMS IN PROGRAMMING ПРОБЛЕМЫ ПРОГРАММИРОВАНИЯ ПРОБЛЕМИ ПРОГРАМУВАННЯ 2023-01-23 Article Article application/pdf https://pp.isofts.kiev.ua/index.php/ojs1/article/view/541 10.15407/pp2022.03-04.403 PROBLEMS IN PROGRAMMING; No 3-4 (2022); 403-408 ПРОБЛЕМЫ ПРОГРАММИРОВАНИЯ; No 3-4 (2022); 403-408 ПРОБЛЕМИ ПРОГРАМУВАННЯ; No 3-4 (2022); 403-408 1727-4907 10.15407/pp2022.03-04 en https://pp.isofts.kiev.ua/index.php/ojs1/article/view/541/594 Copyright (c) 2023 PROBLEMS IN PROGRAMMING |
| spellingShingle | Information Security Information Security Monitoring SIEM UBA OLAP Data warehouse UDC 681.3 Dashdamirova, K.Q. Development of decision support system using OLAP-technologies for information security monitoring systems |
| title | Development of decision support system using OLAP-technologies for information security monitoring systems |
| title_alt | Розвиток системи підтримки рішень з використанням OLAP-технологій для системи моніторингу інформаційної безпеки |
| title_full | Development of decision support system using OLAP-technologies for information security monitoring systems |
| title_fullStr | Development of decision support system using OLAP-technologies for information security monitoring systems |
| title_full_unstemmed | Development of decision support system using OLAP-technologies for information security monitoring systems |
| title_short | Development of decision support system using OLAP-technologies for information security monitoring systems |
| title_sort | development of decision support system using olap-technologies for information security monitoring systems |
| topic | Information Security Information Security Monitoring SIEM UBA OLAP Data warehouse UDC 681.3 |
| topic_facet | Information Security Information Security Monitoring SIEM UBA OLAP Data warehouse UDC 681.3 інформаційна безпека; моніторинг інформаційної безпеки; SIEM; UBA; OLAP сховище даних УДК 681.3 |
| url | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/541 |
| work_keys_str_mv | AT dashdamirovakq developmentofdecisionsupportsystemusingolaptechnologiesforinformationsecuritymonitoringsystems AT dashdamirovakq rozvitoksistemipídtrimkiríšenʹzvikoristannâmolaptehnologíjdlâsistemimonítoringuínformacíjnoíbezpeki |