Skip to main content
Log in

Creating new-generation cybersecurity monitoring and management systems

  • From the Researcher’s Notebook
  • Published:
Herald of the Russian Academy of Sciences Aims and scope Submit manuscript

Abstract

Scientific and technological progress generates two interrelated trends: new machinery and technologies, on the one hand, open unprecedented opportunities in all practical spheres and, on the other, provoke numerous negative consequences that are often impossible to predict in advance. This is also true of information and communication technologies, whose rapid development in the past decades has called into existence the dangerous phenomena of cyberterrorism and cyberwars. As is the case with other threats associated with the use of scientific and technological achievements, society responds with technological improvements. A specific example of such improvements within a pan-European research project with the participation of Russian scientists is given below.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. MASSIF FP7 Project. Management of Security Information and Events in Service Infrastructures. http://massif-project.eu

  2. I. V. Kotenko and I. B. Saenko, “SIEM systems for security information and events management,” Zashchita Informatsii. Insaid, No. 5 (2012).

    Google Scholar 

  3. I. V. Kotenko, I. B. Saenko, O. V. Polubelova, and A. A. Chechulin, “Security information and event management technologies for computer network protection,” Probl. Inf. Bezopasnosti. Komp’yut. Sist., No. 2 (2012).

    Google Scholar 

  4. I. V. Kotenko, V. V. Vorontsov, A. A. Chechulin, and A. V. Ulanov, “Proactive mechanisms of network worm protection: Approach, implementation, and experimental results,” Inf. Tekhnol., No. 1 (2009).

    Google Scholar 

  5. I. Kotenko, O. Polubelova, and I. Saenko, “Data repository for security information and event management in service infrastructures,” in SECRYPT 2012—Proceedings of the International Conference on Security and Cryptography, Rome, Italy, July 24–27, 2012 (SciTePress, 2012), pp. 308–313.

  6. O. V. Polubelova, I. V. Kotenko, I. B. Saenko, and A. A. Chechulin, “Ontologies and logical inference for security information and event management,” Sist. Vysokoi Dostupnosti, No. 2 (2012).

    Google Scholar 

  7. I. Kotenko, O. Polubelova, and I. Saenko, “The ontological approach to SIEM data repository implementation,” in 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical, and Social Computing. GreenCom 2012 (IEEE Computer Society, Los Alamitos, California, 2012), pp. 761–766.

    Google Scholar 

  8. I. V. Kotenko, I. B. Saenko, O. V. Polubelova, and A. A. Chechulin, “Security information and event management technology for information protection in critical infrastructures,” in Proceedings of SPII RAS (Nauka, St. Petersburg, 2012), No. 1 [in Russian].

    Google Scholar 

  9. I. V. Kotenko, M. V. Stepashkin, D. I. Kotenko, and E. V. Doinikova, “Assessment of information system security based on plotting the trees of socioengineering attacks,” Izv. Vyssh. Uchebn. Zaved., Instrument Making, No. 12 (2011).

    Google Scholar 

  10. I. Kotenko, A. Chechulin, and E. Novikova, “Attack modelling and security evaluation for security information and event management,” in SECRYPT 2012—Proceedings of the International Conference on Security and Cryptography, Rome, Italy, July 24–27, 2012 (SciTePress, 2012), pp. 391–394.

    Google Scholar 

  11. I. Kotenko and A. Chechulin, “Common framework for attack modeling and security evaluation in SIEM systems,” in 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical, and Social Computing. GreenCom 2012 (IEEE Computer Society, Los Alamitos, California, 2012), pp. 94–101.

    Google Scholar 

  12. I. Kotenko and M. Stepashkin, “Network security evaluation based on the simulation of malefactor’s behavior,” in SECRYPT 2006—Proceedings of International Conference on Security and Cryptography, Setúbal, Portugal, August 7–10, 2006 (INSTICC, 2006), pp. 339–344.

    Google Scholar 

  13. I. V. Kotenko, M. V. Stepashkin, and V. S. Bogdanov, “Architectures and models of active security analysis components based on the simulation of malefactor actions,” Probl. Inf. Bezopasnosti. Komp’yut. Sist., No. 2 (2006).

    Google Scholar 

  14. J. F. Ruiz, R. Harjani, A. Mana, V. Desnitsky, I. Kotenko, and A. Chechulin, “A methodology for the analysis and modeling of security threats and attacks for systems of embedded components,” in Proceedings of 20th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2012 (Garching, 2012), pp. 261–268.

    Google Scholar 

  15. E. S. Novikova and I. V. Kotenko, “Visualization mechanisms in SIEM systems,” Sist. Vysokoi Dostupnosti, No. 2 (2012).

    Google Scholar 

  16. E. S. Novikova and I. V. Kotenko, “Visualization technologies for security information and event management,” in Proceedings of SPII RAS (Nauka, St. Petersburg, 2012), No. 4 [in Russian].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Vital’evich Kotenko.

Additional information

Original Russian Text © I.V. Kotenko, I.B. Saenko, 2014, published in Vestnik Rossiiskoi Akademii Nauk, 2014, Vol. 84, No. 11, pp. 993–1001.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kotenko, I.V., Saenko, I.B. Creating new-generation cybersecurity monitoring and management systems. Her. Russ. Acad. Sci. 84, 424–431 (2014). https://doi.org/10.1134/S1019331614060033

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1019331614060033

Keywords

Navigation