Data Scheme Conversion Proposal for Information Security Monitoring Systems

被引:0
|
作者
Klasa, Tomasz [1 ]
El Fray, Imed [2 ]
机构
[1] West Pomeranian Business Sch, Szczecin, Poland
[2] West Pomeranian Univ Technol, Szczecin, Poland
关键词
Information security; Security monitoring; Meta-language conversion;
D O I
10.1007/978-3-319-48429-7_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security monitoring in a highly distributed environment requires gathering and processing data describing state of its components. To allow successful interpretation of that data, they cannot be acquired in any form - numerous meta languages and description schemes are available, but usually only one or few of them is supported by a given data source. A set of those schemes supported by a given device or program is defined by its manufacturer, and because of utilization of proprietary formats, usually it is impossible to apply a single scheme to all data sources. As a consequence, it is necessary to apply data conversion scheme, transforming various incompatible messages to a chosen data scheme, supported by the main repository and the analytic subsystem. Only then it is possible to process data to determine the current state of security of the whole information system.
引用
收藏
页码:156 / 166
页数:11
相关论文
共 50 条
  • [1] A Proposal for Information Systems Security Monitoring Based on Large Datasets
    Hai Van Pham
    Moore, Philip
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2018, 9 (02) : 16 - 26
  • [2] Information proposal for the new security data sheet guideline
    Kringel, U
    Kefenbaum, K
    [J]. GEFAHRSTOFFE REINHALTUNG DER LUFT, 2003, 63 (7-8): : 294 - 294
  • [3] A Proposal of Robust Condition Monitoring Scheme for Industrial Systems
    Rodriguez-Ramos, Adrian
    Javier Ortiz, Francisco
    Llanes-Santiago, Orestes
    [J]. COMPUTACION Y SISTEMAS, 2023, 27 (01): : 223 - 235
  • [4] Proposal of an Interoperability Model for Social Security Information Systems
    Delgado, Francisco
    Oton, Salvador
    Ruggia, Raul
    Hilera, Jose R.
    Gutierrez, Jose M.
    [J]. ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2013, : 451 - 458
  • [5] Data Security in Cognitive Information Systems
    Kubarek, Anna
    Ogiela, Lidia
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 631 - 635
  • [6] Information Security Monitoring System based on Data Mining
    Lv Guangjuan
    Xu Ruzhi
    Zu Xiangrong
    Deng Liwu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 472 - 475
  • [7] Open information systems and data security in medicine
    Blobel, B
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 168 - 182
  • [8] Distributed information systems and data security problem
    Dardzinska-Glebocka, Agnieszka
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 52 - 57
  • [9] A Methodological Proposal Concerning to the Management of Information Security in Industrial Control Systems
    Bustamante, Fabian
    Fuertes, Walter
    Diaz, Paul
    Toulkeridis, Theofilos
    [J]. 2016 IEEE ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2016,
  • [10] Security of Data and Information in Vessel Traffic Management Information Systems
    Ristov, Panco
    Mrvica, Ante
    Komadina, Pavao
    [J]. NASE MORE, 2016, 63 (01): : 1 - 8