Abstract
Scientific and technological progress generates two interrelated trends: new machinery and technologies, on the one hand, open unprecedented opportunities in all practical spheres and, on the other, provoke numerous negative consequences that are often impossible to predict in advance. This is also true of information and communication technologies, whose rapid development in the past decades has called into existence the dangerous phenomena of cyberterrorism and cyberwars. As is the case with other threats associated with the use of scientific and technological achievements, society responds with technological improvements. A specific example of such improvements within a pan-European research project with the participation of Russian scientists is given below.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
MASSIF FP7 Project. Management of Security Information and Events in Service Infrastructures. http://massif-project.eu
I. V. Kotenko and I. B. Saenko, “SIEM systems for security information and events management,” Zashchita Informatsii. Insaid, No. 5 (2012).
I. V. Kotenko, I. B. Saenko, O. V. Polubelova, and A. A. Chechulin, “Security information and event management technologies for computer network protection,” Probl. Inf. Bezopasnosti. Komp’yut. Sist., No. 2 (2012).
I. V. Kotenko, V. V. Vorontsov, A. A. Chechulin, and A. V. Ulanov, “Proactive mechanisms of network worm protection: Approach, implementation, and experimental results,” Inf. Tekhnol., No. 1 (2009).
I. Kotenko, O. Polubelova, and I. Saenko, “Data repository for security information and event management in service infrastructures,” in SECRYPT 2012—Proceedings of the International Conference on Security and Cryptography, Rome, Italy, July 24–27, 2012 (SciTePress, 2012), pp. 308–313.
O. V. Polubelova, I. V. Kotenko, I. B. Saenko, and A. A. Chechulin, “Ontologies and logical inference for security information and event management,” Sist. Vysokoi Dostupnosti, No. 2 (2012).
I. Kotenko, O. Polubelova, and I. Saenko, “The ontological approach to SIEM data repository implementation,” in 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical, and Social Computing. GreenCom 2012 (IEEE Computer Society, Los Alamitos, California, 2012), pp. 761–766.
I. V. Kotenko, I. B. Saenko, O. V. Polubelova, and A. A. Chechulin, “Security information and event management technology for information protection in critical infrastructures,” in Proceedings of SPII RAS (Nauka, St. Petersburg, 2012), No. 1 [in Russian].
I. V. Kotenko, M. V. Stepashkin, D. I. Kotenko, and E. V. Doinikova, “Assessment of information system security based on plotting the trees of socioengineering attacks,” Izv. Vyssh. Uchebn. Zaved., Instrument Making, No. 12 (2011).
I. Kotenko, A. Chechulin, and E. Novikova, “Attack modelling and security evaluation for security information and event management,” in SECRYPT 2012—Proceedings of the International Conference on Security and Cryptography, Rome, Italy, July 24–27, 2012 (SciTePress, 2012), pp. 391–394.
I. Kotenko and A. Chechulin, “Common framework for attack modeling and security evaluation in SIEM systems,” in 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical, and Social Computing. GreenCom 2012 (IEEE Computer Society, Los Alamitos, California, 2012), pp. 94–101.
I. Kotenko and M. Stepashkin, “Network security evaluation based on the simulation of malefactor’s behavior,” in SECRYPT 2006—Proceedings of International Conference on Security and Cryptography, Setúbal, Portugal, August 7–10, 2006 (INSTICC, 2006), pp. 339–344.
I. V. Kotenko, M. V. Stepashkin, and V. S. Bogdanov, “Architectures and models of active security analysis components based on the simulation of malefactor actions,” Probl. Inf. Bezopasnosti. Komp’yut. Sist., No. 2 (2006).
J. F. Ruiz, R. Harjani, A. Mana, V. Desnitsky, I. Kotenko, and A. Chechulin, “A methodology for the analysis and modeling of security threats and attacks for systems of embedded components,” in Proceedings of 20th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2012 (Garching, 2012), pp. 261–268.
E. S. Novikova and I. V. Kotenko, “Visualization mechanisms in SIEM systems,” Sist. Vysokoi Dostupnosti, No. 2 (2012).
E. S. Novikova and I. V. Kotenko, “Visualization technologies for security information and event management,” in Proceedings of SPII RAS (Nauka, St. Petersburg, 2012), No. 4 [in Russian].
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © I.V. Kotenko, I.B. Saenko, 2014, published in Vestnik Rossiiskoi Akademii Nauk, 2014, Vol. 84, No. 11, pp. 993–1001.
Rights and permissions
About this article
Cite this article
Kotenko, I.V., Saenko, I.B. Creating new-generation cybersecurity monitoring and management systems. Her. Russ. Acad. Sci. 84, 424–431 (2014). https://doi.org/10.1134/S1019331614060033
Published:
Issue Date:
DOI: https://doi.org/10.1134/S1019331614060033