Hierarchical approach to analyzing security breaches in information systems

被引:14
|
作者
Pavlenko E.Y. [1 ]
Yarmak A.V. [1 ]
Moskvin D.A. [1 ]
机构
[1] Peter the Great St. Petersburg Polytechnic University, St. Petersburg
关键词
hypervisor; information security; information security analysis; malware; virtualization technology;
D O I
10.3103/S0146411617080144
中图分类号
学科分类号
摘要
This paper proposes a hierarchical approach to analyzing information security in modern information systems that consists of multilevel collection, analysis, and control of events. We have analyzed the mechanisms and peculiarities of how malware acts at each level of the information system, determined the features of the mechanisms of action of malware, its masking, and possible methods for detecting malware. © 2017, Allerton Press, Inc.
引用
收藏
页码:829 / 834
页数:5
相关论文
共 50 条
  • [1] Formal quantification of information systems' security and estimation of the cost of breaches
    Mermigas, Dimitrios
    Pirounias, Sotirios
    Alexandris, Nikolaos
    [J]. 2018 INTERNATIONAL CONFERENCE ON SENSOR NETWORKS AND SIGNAL PROCESSING (SNSP 2018), 2018, : 130 - 138
  • [2] Information security breaches and IT security investments: Impacts on competitors
    Jeong, Christina Y.
    Lee, Sang-Yong Tom
    Lim, Jee-Hae
    [J]. INFORMATION & MANAGEMENT, 2019, 56 (05) : 681 - 695
  • [3] Development of the Theoretical Approach Based on Matrix Theory for Analyzing the State of Information Security Systems
    Bobok, I. I.
    Kobozeva, A. A.
    [J]. PROBLEMELE ENERGETICII REGIONALE, 2024, (03): : 29 - 43
  • [4] Peer governance effects of information security breaches
    Wang, Jiaxin
    Wu, Zhifeng
    Yuan, Xue
    Song, Zilong
    [J]. ENERGY ECONOMICS, 2024, 129
  • [5] Lattice-valued hierarchical clustering for analyzing information systems
    Miyamoto, Sadaaki
    [J]. Rough Sets and Current Trends in Computing, Proceedings, 2006, 4259 : 909 - 917
  • [6] Security in the Cloud Based Systems: Structure and Breaches
    Shandilya, Vivek
    Shiva, Sajjan
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 542 - 547
  • [7] Information security -: an application of a systems approach
    Wennberg, Louise
    Brandt, Patrik
    Revay, Peter
    [J]. KYBERNETES, 2006, 35 (5-6) : 786 - 796
  • [8] The influence of human factors on vulnerability to information security breaches
    Luciano, Edimara M.
    Mahmood, M. Adam
    Macada, Antonio Carlos G.
    [J]. AMCIS 2010 PROCEEDINGS, 2010,
  • [9] Analyzing Health Data Breaches: A Visual Analytics Approach
    Raghupathi, Wullianallur
    Raghupathi, Viju
    Saharia, Aditya
    [J]. APPLIEDMATH, 2023, 3 (01): : 175 - 199
  • [10] A design approach for analyzing interorganizational information systems
    Ronald H. Rasch
    James V. Hansen
    [J]. Annals of Operations Research, 1997, 71 : 95 - 113