Abstract
Information security monitoring in a highly distributed environment requires gathering and processing data describing state of its components. To allow successful interpretation of that data, they cannot be acquired in any form – numerous meta languages and description schemes are available, but usually only one or few of them is supported by a given data source. A set of those schemes supported by a given device or program is defined by its manufacturer, and because of utilization of proprietary formats, usually it is impossible to apply a single scheme to all data sources. As a consequence, it is necessary to apply data conversion scheme, transforming various incompatible messages to a chosen data scheme, supported by the main repository and the analytic subsystem. Only then it is possible to process data to determine the current state of security of the whole information system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aktung, I., Naliuka, K.: ConSpec – a formal language for policy specification. Electron. Notes Theor. Comput. Sci. 197, 45–58 (2008)
Dhouha, A., Muhammad, A., David, L.-J.: An event processing aproach for threats monitoring of service compositions. In: Internetional Conference on Risks and Security of Internet and Systems (2013)
Bai, X., et al.: Model-based monitoring and policy enforcement of services. Simul. Model. Pract. Theory 17, 1399–1412 (2009)
Battery Report. http://schemas.microsoft.com/battery/2012
Bodenham, A., Niall, M.A.: Continuous monitoring of a computer network using multivariate adaptive estimation. In: 2013 IEEE 13th International Conference on Data Mining Workshops, pp. 311–318 (2013)
Brdys, M.A.: Integrated monitoring, control and security of critical infrastructure systems. Ann. Rev Control 2014(38), 47–70 (2014)
Luca, C., Pierre, G., Achim, B.D.: Business process compliance via security validation as a service. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST), pp. 455–462 (2013)
Du, S., et al.: Towards an analysis of software supply chain risk management. In: World Congress on Engineering and Computer Science, WCECS 2012, Vol. 1. Lecture Notes in Engineering and Computer Science, pp. 162–167 (2013)
El Fray, I.: Metoda określająca zaufanie do system informacyjnego w oparciu o process szacowania i postępowania z ryzykiem. Wydział Informatyki, Zachodniopomorski Uniwersytet Technologiczny w Szczecinie, Szczecin (2013)
Han, S., et al.: Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Syst. J. 8, 4 (2014)
Hussein, A.A., Ghoneim, A., Dumke, R.R.: An approach for securing and validating business processes based on a defined enterprise security ontology criteria. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds.) Digital Information Processing and Communications, Part 1. Communications in Computer and Information Science, pp. 54–66. Springer, Heidelberg (2011)
Klasa, T.: Information systems security description proposal. In: Swacha, J., Szyjewski, Z. (eds.) Project Management Selected Issues. Uniwersytet Szczeciński, Wydział Nauk Ekonomicznych i Zarządzania, Szczecin (2010)
Klasa, T.: Evaluation of influence of identified changes in the state of the information system on information security grade. Found. Comput. Decis. Sci. 36(3–4), 229–242 (2011)
Klasa, T.: Model gromadzenia danych monitorowania bezpieczeństwa informacji w organizacji wirtualnej. Zeszyty Naukowe Studia Informatica 2015(38), 49–64 (2015)
Kwiatkowski, J., Juszczyszyn, K., Kolaczek, G.: An environment for service composition, execution and resource allocation. In: Manninen, P., Öster, P. (eds.) PARA. LNCS, vol. 7782, pp. 77–91. Springer, Heidelberg (2013)
Malinowski, T., Arciuch, A.: The procedure for monitoring and maintaining a network of distributed resources. ACSIS 2, 947–954 (2014)
Michalek, P.: Dissecting application security XML schemas, AVDL, WAS, OVAL – state of the XML security standards report. Inf. Secur. Tech. Rep. 9(3), 66–76 (2004)
Microsoft. Configuring Audit Policies. Technet (2015). https://technet.microsoft.com/en-us/library/dd277403.aspx
Margherita, P., Irene, S.: Increasing security and efficiency in supply chains: a five-step approach. Int. J. Shipping Transp. Logistics 6(3), 257–279 (2014)
Potter, B.: Security automation. Netw. Secur. 9(2007), 18–19 (2007)
Qin, T., et al.: Robust application identification methods for P2P and VoIP traffic classification in backbone networks. Knowl. Based Syst. 2015(82), 152–162 (2015)
SAP ECC 6 documentation, FICO module (2011)
Stallings, W.: Computer Networks Security (2011)
Stallings, W.: Operating Systems. Internals and Design. Prentice Hall, Upper Saddle River (2013)
Liu, T., Zhao, Y.: A decentralized information flow model for SaaS application security. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (2013)
Van Tan, V., Yi, M.-J.: Design issues and approach to internet-based monitoring and control systems. In: García-Pedrajas, N., Herrera, F., Fyfe, C., Benítez, J.M., Ali, M. (eds.) IEA/AIE 2010, Part I. LNCS, vol. 6096, pp. 478–488. Springer, Heidelberg (2010)
Wójcik, A.: System SCS Win. Zabezpieczenia, p. 5 (2009)
Wu, M.Z., et al.: Development and Validation on integrated dynamic security monitoring platform. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing (2012)
Wun-Young, L., et al.: SAP Security Configuration and Deployment. Syngress, Elsevier, Burlington (2008)
Zawoad, S., Mernik, M., Hasan, R.: FAL: a forensics aware language for secure logging. In: Ganzha, M., Maciaszek, L., Paprzycki, M. (eds.) 2013 Federated Conference on Computer Science and Information Systems. IEEE, Kraków, pp. 1567–1574 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Klasa, T., Fray, I.E. (2017). Data Scheme Conversion Proposal for Information Security Monitoring Systems. In: Kobayashi, Sy., Piegat, A., Pejaś, J., El Fray, I., Kacprzyk, J. (eds) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. ACS 2016. Advances in Intelligent Systems and Computing, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-48429-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-48429-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48428-0
Online ISBN: 978-3-319-48429-7
eBook Packages: EngineeringEngineering (R0)