scholarly journals Visual Analytics for Information Security: Areas of Application, Tasks, Visualization Models

2021 ◽  
pp. 2-15
Author(s):  
Igor Kotenko ◽  
◽  
Maxim Kolomeec ◽  
Kseniia Zhernova ◽  
Andrey Chechulin ◽  
...  

The purpose of the article: to identify and systematize the areas and problems of information security that are solved using visual analytics methods, as well as analysis of the applied data visualization models and their properties that affect the perception of data by the operator. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant papers in the field of information security and data visualization. The objects of research are: theoretical and practical solutions to information security problems through visual analysis. Visual analytics in the article is considered from several sides: from the point of view of the areas of application of visual analysis methods in information security, from the point of view of the tasks solved by the security analyst, from the point of view of the visualization models used and the data structures used, as well as from the point of view of the properties of data visualization models. The result: classification of visualization models is proposed, which differs from analogs in that it is based on the analysis of areas and tasks of information security and comparison of visualization models to them. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for specialists who develop information security systems and for students studying in the direction of training “Information Security”.

2021 ◽  
pp. 36-45
Author(s):  
Igor Kotenko ◽  
◽  
Maxim Kolomeec ◽  
Kseniia Zhernova ◽  
Andrey Chechulin ◽  
...  

The purpose of the article: to identify and systematize information security problems that are solved using visual analytics methods, applied data visualization models and methods for assessing the effectiveness of visualization models. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant work in the field of information security and data visualization, as well as methods for assessing visualization. The objects of research are: solving information security problems through visual analysis and methods for assessing the effectiveness of visualization models. The result obtained: an interactive map of visualization models and their areas of application is presented, which will allow researchers and developers to choose the visualization models that are most appropriate for specific applied information security problems. A classification of methods for assessing visualization is presented. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for students studying in the direction of training “Information Security”, and for specialists who develop information security systems.


Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection- the most important assets of business entities.


2019 ◽  
Vol 8 (3) ◽  
pp. 6107-6115

With the fast development of digital exchange of data in an electronic way, data and information security are becoming more important in both transmission and data storage. Cryptography is used as a solution which plays an important role in data and information security systems against malicious attacks. The encryption technique is used to provide confidentiality to the data during transmission because security threats are more on data during transmission than data at rest. One can also use encryption to secure user’s data at data storage (i.e., data at rest). But an encryption algorithm consumes a more amount of computing resources such as processing power, memory and computation time. Obfuscation technique is a very lightweight technique that comes into a picture to protect the data at storage from malicious attacks. There are many obfuscation techniques are available to ensure the confidentiality of the data. In this paper, an obfuscation technique has been proposed and implemented which uses a 128-bit key to improve the security of the data. The experimental results show that the time taken for obfuscation and de-obfuscation is less and also from the security point of view it provides high avalanche effect


2021 ◽  
Vol 6 ◽  
pp. 321-327
Author(s):  
Sergei V. Shurugin ◽  
Arif U. Matveev ◽  
Evgeny V. Gritskevich

The proposed work is devoted to the classification of biometric systems for recognizing subjects, which play an important role in modern information security systems, since they are currently one of the main means of identification and authentication of an individual. The classification schemes presented in this paper allow us to apply a systematic approach to the development of new methods of biometrics.


Author(s):  
Muhammad Laiq Ur Rahman Shahid ◽  
Junaid Mir ◽  
Furqan Shaukat ◽  
Muhammad Khurram Saleem ◽  
Muhammad Atiq Ur Rehman Tariq ◽  
...  

Background: Obstructive sleep apnea (OSA) is a chronic sleeping disorder. The analysis of pharynx and its surrounding tissues can play a vital role in understanding the pathogenesis of OSA. Classification of pharynx is a crucial step in the analysis of OSA. Objective: An automatic pharyngeal classification from magnetic resonance images (MRI) and the influence of different features can help in analyzing the pharynx anatomy. However, the state-of-the-art classifiers do not provide any insight regarding the features’ selection and their influence. Methods: A visual analysis-based classifier is developed to classify the pharynx from MRI datasets. The classification pipeline consists of different stages including pre-processing to select the initial candidates, extraction of categorical and numerical features to form a multidimensional features space, and a supervised classifier trained by using visual analytics and silhouette coefficient to classify the pharynx. Results: The pharynx is classified automatically and gives an approximately 86% Jaccard coefficient by evaluating the classifier on different MRI datasets. The expert’s knowledge can be utilized to select the optimal features and their corresponding weights during the training phase of the classifier. Conclusion: The proposed classifier is accurate and more efficient in terms of computational cost. It provides additional insight to better understand the influence of different features individually and collectively. It finds its applications in epidemiological studies where large datasets need to be analyzed.


2019 ◽  
Vol 191 (1) ◽  
pp. 26-35
Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection – the most important assets of business entities.


Author(s):  
Georgiy Aleksandrovich Popov ◽  
Ekaterina Aleksandrovna Popova

The paper highlights the procedure of forming the composition of management functions in the information security systems, which is based on a systematic approach. The stages of the life cycle of the threat and the realization pattern of the function have been chosen as indicators of the classification of information security functions - a priori (before the threat was manifested, i.e. responses to threats are taken on a scheduled basis), or a posteriori (after the threat had been realized, i.e. responses to threats are taken in real time). Two classes of functions are distinguished: functions ensuring the information security and functions controlling mechanisms for ensuring the information security. The research of all the dedicated functions resulted in forming a set of 22 functions. For the information security functions there were built two diagrams of possible outcomes, such as successful protection of information, breaking the security system, or its damage in the course of the function realization. The procedure of finding probabilities for the outcomes using the diagrams has been described. The efficient realization of the functions offered is more dependent on the way the functions are used and organized in the framework of an integral technology of providing information security and on the amount of the resource and financial support of these functions. Building the diagram of the outcomes helps to formalize and solve the tasks of distribution of the resources needed for increasing the level of information security. As an example there have been presented two statements of the distribution problem for improving the efficiency of realization of each of the above functions.


Author(s):  
I. R. Khuzina ◽  
V. N. Komarov

The paper considers a point of view, based on the conception of the broad understanding of taxons. According to this point of view, rhyncholites of the subgenus Dentatobeccus and Microbeccus are accepted to be synonymous with the genus Rhynchoteuthis, and subgenus Romanovichella is considered to be synonymous with the genus Palaeoteuthis. The criteria, exercising influence on the different approaches to the classification of rhyncholites, have been analyzed (such as age and individual variability, sexual dimorphism, pathological and teratological features, degree of disintegration of material), underestimation of which can lead to inaccuracy. Divestment of the subgenuses Dentatobeccus, Microbeccus and Romanovichella, possessing very bright morphological characteristics, to have an independent status and denomination to their synonyms, has been noted to be unjustified. An artificial system (any suggested variant) with all its minuses is a single probable system for rhyncholites. The main criteria, minimizing its negative sides and proving the separation of the new taxon, is an available mass-scale material. The narrow understanding of the genus, used in sensible limits, has been underlined to simplify the problem of the passing the view about the genus to the other investigators and recognition of rhyncholites for the practical tasks.


2020 ◽  
Vol 10 (2) ◽  
pp. 213-218
Author(s):  
OKSANA KOCHKINA ◽  
◽  
OLGA MARCHUK ◽  

The article examines the legal and moral and ethical aspects of a misdemeanor that discredits the honor of an employee of the criminal Executive system. The considered reason for dismissal has the main feature associated with the integration of legal and moral norms, which often raises a lot of questions about the attribution of a particular offense to this basis. Using the analysis of normative legal acts, the authors attempt to identify the signs that contribute to the separation of the studied grounds for dismissal from all their diversity. The classification of offenses that discredit the honor of an employee of the criminal Executive system is presented, which allows to systematize and organize the knowledge obtained about the considered grounds for dismissal. The analysis of a misdemeanor that defames the honor of an employee of the penal system from a moral and ethical position gives an understanding, first of all, that it does not have a clear regulation from the point of view of the law, but the consequences of committing such a misdemeanor are clearly legal. The concepts of “honor” and “dignity” are considered as ethical categories and are analyzed as personal qualities that are manifested in an employee of the penal correction system during the period of service. These categories in the behavior of a person or employee are manifested both externally (assessment from the outside) and internally (self-assessment). The article describes the value orientation of an employee of the criminal Executive system to ethical standards in professional activity, which is an integral part of the moral and ethical side of a misdemeanor that discredits the honor of an employee.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


Sign in / Sign up

Export Citation Format

Share Document