Data Scheme Conversion Proposal for Information Security Monitoring Systems

  • Tomasz KlasaEmail author
  • Imed El Fray
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 534)


Information security monitoring in a highly distributed environment requires gathering and processing data describing state of its components. To allow successful interpretation of that data, they cannot be acquired in any form – numerous meta languages and description schemes are available, but usually only one or few of them is supported by a given data source. A set of those schemes supported by a given device or program is defined by its manufacturer, and because of utilization of proprietary formats, usually it is impossible to apply a single scheme to all data sources. As a consequence, it is necessary to apply data conversion scheme, transforming various incompatible messages to a chosen data scheme, supported by the main repository and the analytic subsystem. Only then it is possible to process data to determine the current state of security of the whole information system.


Information security Security monitoring Meta-language conversion 


  1. 1.
    Aktung, I., Naliuka, K.: ConSpec – a formal language for policy specification. Electron. Notes Theor. Comput. Sci. 197, 45–58 (2008)CrossRefzbMATHGoogle Scholar
  2. 2.
    Dhouha, A., Muhammad, A., David, L.-J.: An event processing aproach for threats monitoring of service compositions. In: Internetional Conference on Risks and Security of Internet and Systems (2013)Google Scholar
  3. 3.
    Bai, X., et al.: Model-based monitoring and policy enforcement of services. Simul. Model. Pract. Theory 17, 1399–1412 (2009)CrossRefGoogle Scholar
  4. 4.
  5. 5.
    Bodenham, A., Niall, M.A.: Continuous monitoring of a computer network using multivariate adaptive estimation. In: 2013 IEEE 13th International Conference on Data Mining Workshops, pp. 311–318 (2013)Google Scholar
  6. 6.
    Brdys, M.A.: Integrated monitoring, control and security of critical infrastructure systems. Ann. Rev Control 2014(38), 47–70 (2014)CrossRefGoogle Scholar
  7. 7.
    Luca, C., Pierre, G., Achim, B.D.: Business process compliance via security validation as a service. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST), pp. 455–462 (2013)Google Scholar
  8. 8.
    Du, S., et al.: Towards an analysis of software supply chain risk management. In: World Congress on Engineering and Computer Science, WCECS 2012, Vol. 1. Lecture Notes in Engineering and Computer Science, pp. 162–167 (2013)Google Scholar
  9. 9.
    El Fray, I.: Metoda określająca zaufanie do system informacyjnego w oparciu o process szacowania i postępowania z ryzykiem. Wydział Informatyki, Zachodniopomorski Uniwersytet Technologiczny w Szczecinie, Szczecin (2013)Google Scholar
  10. 10.
    Han, S., et al.: Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Syst. J. 8, 4 (2014)CrossRefGoogle Scholar
  11. 11.
    Hussein, A.A., Ghoneim, A., Dumke, R.R.: An approach for securing and validating business processes based on a defined enterprise security ontology criteria. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds.) Digital Information Processing and Communications, Part 1. Communications in Computer and Information Science, pp. 54–66. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  12. 12.
    Klasa, T.: Information systems security description proposal. In: Swacha, J., Szyjewski, Z. (eds.) Project Management Selected Issues. Uniwersytet Szczeciński, Wydział Nauk Ekonomicznych i Zarządzania, Szczecin (2010)Google Scholar
  13. 13.
    Klasa, T.: Evaluation of influence of identified changes in the state of the information system on information security grade. Found. Comput. Decis. Sci. 36(3–4), 229–242 (2011)Google Scholar
  14. 14.
    Klasa, T.: Model gromadzenia danych monitorowania bezpieczeństwa informacji w organizacji wirtualnej. Zeszyty Naukowe Studia Informatica 2015(38), 49–64 (2015)CrossRefGoogle Scholar
  15. 15.
    Kwiatkowski, J., Juszczyszyn, K., Kolaczek, G.: An environment for service composition, execution and resource allocation. In: Manninen, P., Öster, P. (eds.) PARA. LNCS, vol. 7782, pp. 77–91. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  16. 16.
    Malinowski, T., Arciuch, A.: The procedure for monitoring and maintaining a network of distributed resources. ACSIS 2, 947–954 (2014)Google Scholar
  17. 17.
    Michalek, P.: Dissecting application security XML schemas, AVDL, WAS, OVAL – state of the XML security standards report. Inf. Secur. Tech. Rep. 9(3), 66–76 (2004)CrossRefGoogle Scholar
  18. 18.
    Microsoft. Configuring Audit Policies. Technet (2015).
  19. 19.
    Margherita, P., Irene, S.: Increasing security and efficiency in supply chains: a five-step approach. Int. J. Shipping Transp. Logistics 6(3), 257–279 (2014)CrossRefGoogle Scholar
  20. 20.
    Potter, B.: Security automation. Netw. Secur. 9(2007), 18–19 (2007)Google Scholar
  21. 21.
    Qin, T., et al.: Robust application identification methods for P2P and VoIP traffic classification in backbone networks. Knowl. Based Syst. 2015(82), 152–162 (2015)CrossRefGoogle Scholar
  22. 22.
    SAP ECC 6 documentation, FICO module (2011)Google Scholar
  23. 23.
    Stallings, W.: Computer Networks Security (2011)Google Scholar
  24. 24.
    Stallings, W.: Operating Systems. Internals and Design. Prentice Hall, Upper Saddle River (2013)Google Scholar
  25. 25.
    Liu, T., Zhao, Y.: A decentralized information flow model for SaaS application security. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (2013)Google Scholar
  26. 26.
    Van Tan, V., Yi, M.-J.: Design issues and approach to internet-based monitoring and control systems. In: García-Pedrajas, N., Herrera, F., Fyfe, C., Benítez, J.M., Ali, M. (eds.) IEA/AIE 2010, Part I. LNCS, vol. 6096, pp. 478–488. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  27. 27.
    Wójcik, A.: System SCS Win. Zabezpieczenia, p. 5 (2009)Google Scholar
  28. 28.
    Wu, M.Z., et al.: Development and Validation on integrated dynamic security monitoring platform. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing (2012)Google Scholar
  29. 29.
    Wun-Young, L., et al.: SAP Security Configuration and Deployment. Syngress, Elsevier, Burlington (2008)Google Scholar
  30. 30.
    Zawoad, S., Mernik, M., Hasan, R.: FAL: a forensics aware language for secure logging. In: Ganzha, M., Maciaszek, L., Paprzycki, M. (eds.) 2013 Federated Conference on Computer Science and Information Systems. IEEE, Kraków, pp. 1567–1574 (2013)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.West Pomeranian Business SchoolSzczecinPoland
  2. 2.West Pomeranian University of TechnologySzczecinPoland

Personalised recommendations