Skip to main content
Log in

Intelligent data analysis in decision support systems for penetration tests

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Intelligent data analysis is extensively applied in various fields of technology, including information security. The development of decision support systems (DSSs) for penetration tests is more complicated due to incomplete, undefined, and expandable unstructured data. This article suggests an approach to formalizing information from subject domains, quantitative relevance estimates of object characteristics, and estimates of object similarity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Xu, D., Tu, M., Sanford, M., Thomas, L., Woodraska, D., and Xu, W., Automated security test generation with formal threat models, IEEE Trans. Dependable Secure Comput., 2012, no. 4, pp. 526–540.

    Article  Google Scholar 

  2. Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 8, pp. 665–672.

    Article  Google Scholar 

  3. Lee, W., Stolfo, S.J., and Mok, K.W., Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., 2000, vol. 14, no. 6, pp 533–567. doi 10.1023/A:1006624031083

    Article  MATH  Google Scholar 

  4. Miller, S.T. and Busby-Earle, C., Multi-perspective machine learning a classifier ensemble method for intrusion detection (conference paper), ACM International Conference on Machine Learning and Soft Computing, ICMLSC 2017, Ho Chi Minh City, 2017, pp. 7–12.

    Chapter  Google Scholar 

  5. Alsadhan, T. and Park, J.S., Enhancing risk-based decisions by leveraging cyber security automation (Conference Paper), 7th European Intelligence and Security Informatics Conference, EISIC 2016, Uppsala, 2016, pp. 164–167.

    Chapter  Google Scholar 

  6. Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the internet of things, Autom. Control Comput. Sci., 2015, vol. 8, pp. 735–740.

    Article  Google Scholar 

  7. Dua, S. and Du, X., Data Mining and Machine Learning in Cybersecurity, Taylor and Francis Group, LLC, 2011.

    Book  MATH  Google Scholar 

  8. Dasgupta, D. and Gonzalez, F.A., An intelligent decision support system for intrusion detection and response, in Information Assurance in Computer Networks. MMM-ACNS 2001, Gorodetski, V.I., Skormin, V.A., and Popyack, L.J., Eds., Springer, Berlin, Heidelberg, 2011; Lect. Notes Comput. Sci., vol 2052, 2011.

    Google Scholar 

  9. Beresnevichiene, Y., Pym, D., and Shiu, S., Decision support for systems security investment, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, 2010, pp. 118–125.

    Chapter  Google Scholar 

  10. Eremenko, N.N. and Kokoulin, A.N., Investigation of testing methods for penetration in information systems, Master’s J., 2016, no. 2, pp. 181–186.

    Google Scholar 

  11. Dalalana Bertoglio, D. and Zorzo, A.F., Overview and open issues on penetration test, J. Braz. Comput. Soc., 2017, vol. 1.

    Google Scholar 

  12. Tumanov, S.A., Means of testing the information system for penetration, Dokl. Tomsk. Gos. Univ. Sist. Upr. Radioelektron., 2015, no. 2 (36), pp. 73–79.

    Google Scholar 

  13. Umnitsyn, M.Yu. and Sadovnikova, N.P., Formalization of the construction of scenarios of malicious influences on the information system, Izv. Volgograd. Gos. Tekh. Univ., 2016, no. 11, pp. 72–75.

    Google Scholar 

  14. Kosenko, M.Yu., Collection of information when testing for penetration, Vestn. UrFO, Bezop. Inf. Sfere, 2013, no. 3, pp. 11–15.

    Google Scholar 

  15. Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, ACM International Conference Proceeding Series 8th International Conference on Security of Information and Networks, 2015.

    Google Scholar 

  16. Kravchuk, A.V., A model of the process of remote analysis of the security of information systems and methods for increasing its effectiveness, Tr. SPIIRAN, 2015, vol. 38, pp. 75–93.

    Google Scholar 

  17. Zegzhda, P.D., Zegzhda, D.P., Pechenkin, A.I., and Poltavtseva, A., Modeling of information systems for solving the problem of security management, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 7–16.

    Google Scholar 

  18. Methods and Technical Means of Ensuring Information Security, Materialy 26-i nauchno-tekhnicheskoi konferentsii 26.06–29.06 2017 g. (Proc. 26th Sci. Tech. Conf., September 26–29, 2017), St. Petersburg: Izd. politekh. univ., 2017.

  19. Chernyak, L., Analytics of unstructured data, Otkryt. Sist., SUBD, 2012, no. 6, pp. 30–34.

    Google Scholar 

  20. Orlova, K.I. and Orlyuk, A.A., Unstructured data and their processing technologies, Aktual’nye napravleniya fundamental’nykh i prikladnykh issledovanii materialy XI mezhdunarodnoi nauchno-prakticheskoi konferentsii (Actual Directions of Fundamental and Applied Research Materials of the XI International Scientific and Practical Conference), NITs Akademicheskii, 2017, pp. 149–152.

    Google Scholar 

  21. Pechenkin, A.I., Poltavtseva, M.A., and Lavrova, D.S., An approach to data normalization in the Internet of Things for security analysis, Progr. Prod. Sist., 2016, no. 2, pp. 83–88.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. A. Poltavtseva.

Additional information

Original Russian Text © M.A. Poltavtseva, A.I. Pechenkin, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poltavtseva, M.A., Pechenkin, A.I. Intelligent data analysis in decision support systems for penetration tests. Aut. Control Comp. Sci. 51, 985–991 (2017). https://doi.org/10.3103/S014641161708017X

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641161708017X

Keywords

Navigation