Current Tasks in Identifying Invalid Events in Critical Information Infrastructure

The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the concepts of taxonomy and categorization. The approach aims to improve the efficiency of identifying, classifying, and managing information securi...

Full description

Saved in:
Bibliographic Details
Published inOtkrytoe Obrazovanie Vol. 28; no. 4; pp. 33 - 42
Main Authors Evdokimova, D. A., Mikryukov, A. A.
Format Journal Article
LanguageEnglish
Published Plekhanov Russian University of Economics 01.09.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the concepts of taxonomy and categorization. The approach aims to improve the efficiency of identifying, classifying, and managing information security (IS) incidents. The article addresses the current tasks of ensuring the required level of CII protection and minimizing the negative consequences of information security incidents resulting from invalid events. The identification of these events is associated with the complexity of detecting such events, the need to process large volumes of data, insufficient speed in detecting IS events, as well as technological limitations.The relevance of identifying and classifying invalid events in information security, especially for CII, is driven by the need for timely detection and response to incidents that could lead to negative consequences. Understanding the nature and characteristics of such events allows for effective system protection and prevention of significant damage. To enhance the effectiveness of ensuring security, it is necessary to identify the class of invalid events among the numerous information security events by considering the characteristics that define invalid events.The novelty of the proposed approach lies in solving the task of identifying the class of invalid information security events based on taxonomy methods, involving the use of event categorization tools with the attributes of invalid events. Materials and methods . The approach to identifying invalid events in CII, based on the principles of information security event taxonomy, was used to solve the task. It was shown that identifying invalid information security events is directly related to solving the problem of searching for and analyzing their attributes, which represent the characteristics or parameters used to describe and classify security incidents. Based on the key principles of taxonomy, a model of the structure of the set of invalid events was developed to determine the characteristics that can be the basis for classifying invalid events. The process of identifying invalid information security events includes a sequence of stages: taxonomy, categorization, and classification, with appropriate methods and tools implemented at each stage. Results. Approaches to identifying invalid events in CII have been analyzed. Problems related to large data volumes, the complexity of event processing, the considerable time required for their detection, and technological limitations were considered. It was shown that the concept of taxonomy and categorization allows for effective identification and classification of information security incidents, ensuring efficient processing and response. The feasibility of applying taxonomy for describing and identifying the attributes of invalid events was justified, contributing to the development of effective protection strategies and improving security levels. A generalized scheme for processing invalid events was proposed, including a set of interconnected stages of identification, categorization, impact assessment, response, documentation, and analysis. An algorithm for structured description and classification of incidents was developed, allowing for more accurate and timely responses to information security threats. Conclusion. The results obtained increase the effectiveness of solving the task of classifying information security incidents by identifying invalid events, which reduces the level of negative consequences of incidents and enhances the security of CII objects.
AbstractList The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the concepts of taxonomy and categorization. The approach aims to improve the efficiency of identifying, classifying, and managing information security (IS) incidents. The article addresses the current tasks of ensuring the required level of CII protection and minimizing the negative consequences of information security incidents resulting from invalid events. The identification of these events is associated with the complexity of detecting such events, the need to process large volumes of data, insufficient speed in detecting IS events, as well as technological limitations.The relevance of identifying and classifying invalid events in information security, especially for CII, is driven by the need for timely detection and response to incidents that could lead to negative consequences. Understanding the nature and characteristics of such events allows for effective system protection and prevention of significant damage. To enhance the effectiveness of ensuring security, it is necessary to identify the class of invalid events among the numerous information security events by considering the characteristics that define invalid events.The novelty of the proposed approach lies in solving the task of identifying the class of invalid information security events based on taxonomy methods, involving the use of event categorization tools with the attributes of invalid events. Materials and methods . The approach to identifying invalid events in CII, based on the principles of information security event taxonomy, was used to solve the task. It was shown that identifying invalid information security events is directly related to solving the problem of searching for and analyzing their attributes, which represent the characteristics or parameters used to describe and classify security incidents. Based on the key principles of taxonomy, a model of the structure of the set of invalid events was developed to determine the characteristics that can be the basis for classifying invalid events. The process of identifying invalid information security events includes a sequence of stages: taxonomy, categorization, and classification, with appropriate methods and tools implemented at each stage. Results. Approaches to identifying invalid events in CII have been analyzed. Problems related to large data volumes, the complexity of event processing, the considerable time required for their detection, and technological limitations were considered. It was shown that the concept of taxonomy and categorization allows for effective identification and classification of information security incidents, ensuring efficient processing and response. The feasibility of applying taxonomy for describing and identifying the attributes of invalid events was justified, contributing to the development of effective protection strategies and improving security levels. A generalized scheme for processing invalid events was proposed, including a set of interconnected stages of identification, categorization, impact assessment, response, documentation, and analysis. An algorithm for structured description and classification of incidents was developed, allowing for more accurate and timely responses to information security threats. Conclusion. The results obtained increase the effectiveness of solving the task of classifying information security incidents by identifying invalid events, which reduces the level of negative consequences of incidents and enhances the security of CII objects.
Author Mikryukov, A. A.
Evdokimova, D. A.
Author_xml – sequence: 1
  givenname: D. A.
  orcidid: 0009-0003-1387-3177
  surname: Evdokimova
  fullname: Evdokimova, D. A.
  organization: Plekhanov Russian University of Economics
– sequence: 2
  givenname: A. A.
  surname: Mikryukov
  fullname: Mikryukov, A. A.
  organization: Plekhanov Russian University of Economics
BookMark eNo9UNtKw0AQXaSCtfYbzA-s7i2bzaOEqoGCIPV5mWQnZTVNZDct9O_dttKnOZfhMHPuyWwYByTkkbMnwbXRz9xwQ5VQkgomFFVUykRvyFywoqR5KcsZmV-X7sgyRt8wpYo8FyWbk89qHwIOU7aB-BMzP2S1S9R3Rz9ss3o4QO9dtjok7exWwU--hT5Z3Rh2MPlxOOEAcQr7dtoHfCC3HfQRl_9zQb5eV5vqna4_3urqZU1bzpWmWjiNxjWcJ8SMyJlhgqFKf5iy1E0roDEdSwhUmRcCMeeKta7jGgzvUC5Ifcl1I3zb3-B3EI52BG_Pwhi2FkI6tkfrtHbYSFAcnQIhAaVWuSqAad4i6pRVXLLaMMYYsLvmcWbPTdtTifZUoj01bZWVMlH5B9x0cx0
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.21686/1818-4243-2024-4-33-42
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Education
EISSN 2079-5939
EndPage 42
ExternalDocumentID oai_doaj_org_article_d66deb3a41ed4a23ae364547a061cee6
10_21686_1818_4243_2024_4_33_42
GroupedDBID 5VS
AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c1146-62d6e8db1162d082508020e42028996bc2ab8f096ba49572ee5140cdf16a81fe3
IEDL.DBID DOA
ISSN 1818-4243
IngestDate Mon Oct 21 19:39:06 EDT 2024
Thu Sep 26 20:26:46 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1146-62d6e8db1162d082508020e42028996bc2ab8f096ba49572ee5140cdf16a81fe3
ORCID 0009-0003-1387-3177
OpenAccessLink https://doaj.org/article/d66deb3a41ed4a23ae364547a061cee6
PageCount 10
ParticipantIDs doaj_primary_oai_doaj_org_article_d66deb3a41ed4a23ae364547a061cee6
crossref_primary_10_21686_1818_4243_2024_4_33_42
PublicationCentury 2000
PublicationDate 2024-09-01
PublicationDateYYYYMMDD 2024-09-01
PublicationDate_xml – month: 09
  year: 2024
  text: 2024-09-01
  day: 01
PublicationDecade 2020
PublicationTitle Otkrytoe Obrazovanie
PublicationYear 2024
Publisher Plekhanov Russian University of Economics
Publisher_xml – name: Plekhanov Russian University of Economics
References ref8
ref7
ref12
ref9
ref4
ref3
ref6
ref11
ref5
ref10
ref2
ref1
References_xml – ident: ref1
– ident: ref4
– ident: ref2
– ident: ref3
– ident: ref5
– ident: ref6
– ident: ref7
– ident: ref9
– ident: ref8
– ident: ref10
– ident: ref11
– ident: ref12
SSID ssib044755290
ssib015894855
ssj0001862428
Score 2.3127906
Snippet The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the...
SourceID doaj
crossref
SourceType Open Website
Aggregation Database
StartPage 33
SubjectTerms critical information infrastructure
event categorization
incident classification
information security incident response
invalid events
taxonomy
Title Current Tasks in Identifying Invalid Events in Critical Information Infrastructure
URI https://doaj.org/article/d66deb3a41ed4a23ae364547a061cee6
Volume 28
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxbEU5SXPLBa9StuPAJqVZBgQK3UzbJrR6qQAmph5bdzZ4eqnVhYIseJouS7S-4uvvuOkFvwcnkjhGJKG820kENmgxWgy5Xl3giTmpwg-2ImM_00r-Zbrb4wJ6zQAxfgBtGYCAGf1yJF7aXySWUSKg-GCD7whWyb261gCjRJVPUO6wmy2lWyWw_Kf19yXUSukwOLxbTUqiR_SWFqM9hMghJJeASmFNNyx3RtMfxnUzQ-JAedD0nvyr0fkb3UHmP75S5V44S8dqxLdOrXb2u6bGmpx801TfSxBe1aRjrCVMd89LffAe2Kk_AqOF75Qi_7tUqnZDYeTR8mrGuewBZYaMyMjCbVMQgBI4wDsaiWJy1xadGasJA-1A0EMMFDjDSUKYHrxBexEcbXoknqjPTa9zadE2qiTV5W8O5DLGist5p71SgRVFMPg7V9wn9xcR-FI8NBbJGhdAilQygdQum0Uwp2--Qe8ducjiTXeQJE7zrRu79Ef_EfF7kk-1nGOW3sivQA1nQNfsZnuMkqBdvn79EPlHXHrg
link.rule.ids 315,783,787,867,2109,27938,27939
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Current+Tasks+in+Identifying+Invalid+Events+in+Critical+Information+Infrastructure&rft.jtitle=Otkrytoe+Obrazovanie&rft.au=Evdokimova%2C+D.+A.&rft.au=Mikryukov%2C+A.+A.&rft.date=2024-09-01&rft.issn=1818-4243&rft.eissn=2079-5939&rft.volume=28&rft.issue=4&rft.spage=33&rft.epage=42&rft_id=info:doi/10.21686%2F1818-4243-2024-4-33-42&rft.externalDBID=n%2Fa&rft.externalDocID=10_21686_1818_4243_2024_4_33_42
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1818-4243&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1818-4243&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1818-4243&client=summon