Skip to main content

Data Scheme Conversion Proposal for Information Security Monitoring Systems

  • Conference paper
  • First Online:
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (ACS 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 534))

Included in the following conference series:

Abstract

Information security monitoring in a highly distributed environment requires gathering and processing data describing state of its components. To allow successful interpretation of that data, they cannot be acquired in any form – numerous meta languages and description schemes are available, but usually only one or few of them is supported by a given data source. A set of those schemes supported by a given device or program is defined by its manufacturer, and because of utilization of proprietary formats, usually it is impossible to apply a single scheme to all data sources. As a consequence, it is necessary to apply data conversion scheme, transforming various incompatible messages to a chosen data scheme, supported by the main repository and the analytic subsystem. Only then it is possible to process data to determine the current state of security of the whole information system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aktung, I., Naliuka, K.: ConSpec – a formal language for policy specification. Electron. Notes Theor. Comput. Sci. 197, 45–58 (2008)

    Article  MATH  Google Scholar 

  2. Dhouha, A., Muhammad, A., David, L.-J.: An event processing aproach for threats monitoring of service compositions. In: Internetional Conference on Risks and Security of Internet and Systems (2013)

    Google Scholar 

  3. Bai, X., et al.: Model-based monitoring and policy enforcement of services. Simul. Model. Pract. Theory 17, 1399–1412 (2009)

    Article  Google Scholar 

  4. Battery Report. http://schemas.microsoft.com/battery/2012

  5. Bodenham, A., Niall, M.A.: Continuous monitoring of a computer network using multivariate adaptive estimation. In: 2013 IEEE 13th International Conference on Data Mining Workshops, pp. 311–318 (2013)

    Google Scholar 

  6. Brdys, M.A.: Integrated monitoring, control and security of critical infrastructure systems. Ann. Rev Control 2014(38), 47–70 (2014)

    Article  Google Scholar 

  7. Luca, C., Pierre, G., Achim, B.D.: Business process compliance via security validation as a service. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST), pp. 455–462 (2013)

    Google Scholar 

  8. Du, S., et al.: Towards an analysis of software supply chain risk management. In: World Congress on Engineering and Computer Science, WCECS 2012, Vol. 1. Lecture Notes in Engineering and Computer Science, pp. 162–167 (2013)

    Google Scholar 

  9. El Fray, I.: Metoda określająca zaufanie do system informacyjnego w oparciu o process szacowania i postępowania z ryzykiem. Wydział Informatyki, Zachodniopomorski Uniwersytet Technologiczny w Szczecinie, Szczecin (2013)

    Google Scholar 

  10. Han, S., et al.: Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Syst. J. 8, 4 (2014)

    Article  Google Scholar 

  11. Hussein, A.A., Ghoneim, A., Dumke, R.R.: An approach for securing and validating business processes based on a defined enterprise security ontology criteria. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds.) Digital Information Processing and Communications, Part 1. Communications in Computer and Information Science, pp. 54–66. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Klasa, T.: Information systems security description proposal. In: Swacha, J., Szyjewski, Z. (eds.) Project Management Selected Issues. Uniwersytet Szczeciński, Wydział Nauk Ekonomicznych i Zarządzania, Szczecin (2010)

    Google Scholar 

  13. Klasa, T.: Evaluation of influence of identified changes in the state of the information system on information security grade. Found. Comput. Decis. Sci. 36(3–4), 229–242 (2011)

    Google Scholar 

  14. Klasa, T.: Model gromadzenia danych monitorowania bezpieczeństwa informacji w organizacji wirtualnej. Zeszyty Naukowe Studia Informatica 2015(38), 49–64 (2015)

    Article  Google Scholar 

  15. Kwiatkowski, J., Juszczyszyn, K., Kolaczek, G.: An environment for service composition, execution and resource allocation. In: Manninen, P., Öster, P. (eds.) PARA. LNCS, vol. 7782, pp. 77–91. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Malinowski, T., Arciuch, A.: The procedure for monitoring and maintaining a network of distributed resources. ACSIS 2, 947–954 (2014)

    Google Scholar 

  17. Michalek, P.: Dissecting application security XML schemas, AVDL, WAS, OVAL – state of the XML security standards report. Inf. Secur. Tech. Rep. 9(3), 66–76 (2004)

    Article  Google Scholar 

  18. Microsoft. Configuring Audit Policies. Technet (2015). https://technet.microsoft.com/en-us/library/dd277403.aspx

  19. Margherita, P., Irene, S.: Increasing security and efficiency in supply chains: a five-step approach. Int. J. Shipping Transp. Logistics 6(3), 257–279 (2014)

    Article  Google Scholar 

  20. Potter, B.: Security automation. Netw. Secur. 9(2007), 18–19 (2007)

    Google Scholar 

  21. Qin, T., et al.: Robust application identification methods for P2P and VoIP traffic classification in backbone networks. Knowl. Based Syst. 2015(82), 152–162 (2015)

    Article  Google Scholar 

  22. SAP ECC 6 documentation, FICO module (2011)

    Google Scholar 

  23. Stallings, W.: Computer Networks Security (2011)

    Google Scholar 

  24. Stallings, W.: Operating Systems. Internals and Design. Prentice Hall, Upper Saddle River (2013)

    Google Scholar 

  25. Liu, T., Zhao, Y.: A decentralized information flow model for SaaS application security. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (2013)

    Google Scholar 

  26. Van Tan, V., Yi, M.-J.: Design issues and approach to internet-based monitoring and control systems. In: García-Pedrajas, N., Herrera, F., Fyfe, C., Benítez, J.M., Ali, M. (eds.) IEA/AIE 2010, Part I. LNCS, vol. 6096, pp. 478–488. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  27. Wójcik, A.: System SCS Win. Zabezpieczenia, p. 5 (2009)

    Google Scholar 

  28. Wu, M.Z., et al.: Development and Validation on integrated dynamic security monitoring platform. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing (2012)

    Google Scholar 

  29. Wun-Young, L., et al.: SAP Security Configuration and Deployment. Syngress, Elsevier, Burlington (2008)

    Google Scholar 

  30. Zawoad, S., Mernik, M., Hasan, R.: FAL: a forensics aware language for secure logging. In: Ganzha, M., Maciaszek, L., Paprzycki, M. (eds.) 2013 Federated Conference on Computer Science and Information Systems. IEEE, Kraków, pp. 1567–1574 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomasz Klasa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Klasa, T., Fray, I.E. (2017). Data Scheme Conversion Proposal for Information Security Monitoring Systems. In: Kobayashi, Sy., Piegat, A., Pejaś, J., El Fray, I., Kacprzyk, J. (eds) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. ACS 2016. Advances in Intelligent Systems and Computing, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-48429-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48429-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48428-0

  • Online ISBN: 978-3-319-48429-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics