Building an Adaptive System for Collecting and Preparing Data for Security Monitoring (original) (raw)
REFERENCES
Vvedenie v problemu kiberbezopasnosti avtomatizirovannykh sistem upravleniya tekhnologicheskimi protsessami. Sbornik statei (Introduction to the Problem of Cybersecurity of Automated Control Systems for Technological Processes. Collection of Articles), Zegzhda, D.P., Ed., St. Petersburg, 2018. Google Scholar
Semenov, V.V., Salakhuddinova, K.I., Lebedev, I.S., and Sukhoparov, M.E., Identification of abnormal deviations in the functioning of cyber-physical systems devices, Prikl. Inf., 2019, no. 6, pp. 114–122.
Burlov, V.G., et al., Industry 4.0. Threats and requirements for the process of managing information security of cyberphysical systems, Inf. Tekhnol. Sist.: Upr. Ekon. Transp. Pravo, 2019, no. 3, pp. 126–129.
Coletta, A. and Armando, A., Security monitoring for industrial control systems, Security of Industrial Control Systems and Cyber Physical Systems, First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015; Lect. Notes Comput. Sci., 2016, vol. 9588, pp. 48–62.
Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956. Article Google Scholar
Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://doi.org/10.1145/2947626.2947639
Lavrova, D.S. and Vasil’ev, Y.S., An ontological model of the domain of applications for the Internet of Things in analyzing information security, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 817–823. Article Google Scholar
Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834. Article Google Scholar
Sanfelice, R.G., Analysis and design of cyber-physical systems: A hybrid control systems approach, in Cyber-Physical Systems, CRC Press, 2015, pp. 3–31. Google Scholar
Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917. Article Google Scholar
Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958. Article Google Scholar
Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability,WorldS4, 2019, pp. 129–135. Google Scholar
Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https://doi.org/10.1109/RUSAUTOCON.2018.8501783
Zegzhda, D., Lavrova, D., and Khushkeev, A., Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series, Proceedings – 2019 IEEE International Conference on Industrial Cyber Physical Systems, ICPS, 2019, pp. 780–784.
Petrenko, S.A., Review of methods of immune protection of anticipation of disturbances on the cyber systems of Industry 4.0, Zashch. Inf., INSIDE, 2019, no. 5, pp. 36–48.
Lomako, A.G., Ovcharov, V.A., and Petrenko, S.A., A method for investigating security incidents using behavior profiles of network objects, Distantsionnye obrazovatel’nye tekhnologii. Materialy III Vserossiiskoi nauchno-prakticheskoi konferentsii (Distance Educational Technologies. Proc. III All-Russian Scientific and Practical Conference), Yalta, 2018, pp. 366–373.
Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64. Google Scholar
Lavrova, D., Poltavtseva, M., Shtyrkina, A., and Zegzhda, P., Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic, SHS Web Conf., 2018, vol. 44, p. 00051. https://doi.org/10.1051/shsconf/20184400051
Saenko, I.B., Kushnerevich, A.G., and Kotenko, I.V., Implementation of a distributed parallel computing platform for collecting and preprocessing large monitoring data in cyber-physical systems, Mezhdunarodnyi kongress po informatike: informatsionnye sistemy i tekhnologii (CSIST-2016). Materialy mezhdunarodnogo nauchnogo kongressa (International Congress on Informatics: Information Systems and Technologies (CSIST-2016). Materials of the International Scientific Congress), Minsk, 2016, pp. 641–645.
Klasa, T. and El Fray, I., Load-balanced integrated information security monitoring system, Ann. Comput. Sci. Inf. Syst., 2017, vol. 13, pp. 213–221. Google Scholar
Marchal, S., Jiang, X., State, R., and Engel, T., A big data architecture for large scale security monitoring, 2014 IEEE International Congress on Big Data, 2014, pp. 56–63. https://doi.org/10.1109/BigData.Congress.2014.18
Manogaran, G., et al., A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system, Future Gener. Comput. Syst., 2018, vol. 82, pp. 375–387. https://doi.org/10.1016/j.future.2017.10.045 Article Google Scholar
Kazarin, O.V., Sharyapov, R.A., and Yashchenko, V.V., Multifactorial classification of threats to information security of cyber-physical systems, Vestn. RGGU Inf. Inf. Bezop., Mat., 2019, no. 1, pp. 39–55.
Poltavtseva, M.A., Support for the inference mechanism of access control systems based on ontologies in a relational server, Metody Tekh. Sredstva Obespecheniya Bezop. Inf., 2016, no. 25, pp. 109–111.
Biryukov, D.N. and Lomako, A.G., An approach to the construction of information security systems capable of synthesizing scenarios of proactive behavior in an information conflict, Zashch. Inf., INSIDE, 2014, no. 6, pp. 42–50.
Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 785–789. https://doi.org/10.1109/ICPHYS.2019.8780193
Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672. Article Google Scholar
Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344. Article Google Scholar
Poltavtseva, M.A., Zegzhda, P.D., and Pankov, I.D., The hierarchial data aggregation method in backbone traffic streaming analyzing to ensure digital systems information security, 11th International Conference “Management of Large-Scale System Development,” MLSD, 2018, pp. 1–5.