Method of Organizing Real-Time Assessment of Cybersecurity Status of Critical Information Infrastructure Using Cyber-Threat Indicators

DOI: 10.31673/2409-7292.2019.049297

Authors

  • І. В. Ткаченко, (Tkachenko I. V.) State University of Telecommunications, Kyiv
  • В. А. Козачок, (Kozachok V. A.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2019.049297

Abstract

The article deals with the organization of complex assessment of the state of cyber defense of critical information infrastructure in real time, taking into account cyber threats indicators. It is proposed to assess the state of cyber defense through the use of different types of data, differentiated information sources, and software platforms capable of processing big data.

Keywords: information system, assessments of cybersecurity status of critical information infrastructure, cyber-threat indicators, big data.

References
1. https://uk.wikipedia.org/wiki/%D0%86%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82-%D0%B0%D1%80%D1%85%D1%96%D0%B2
2. https://hadoop.apache.org/docs/r1.2.1/hdfs_design.html
3. https://ru.bmstu.wiki/YARN_(Yet_Another_Resource_Negotiator)
4. Холден Карау, Рейчел Уоррен Эффективный Spark. Масштабирование и оптимизация. – Питер, 2018. – 352
5. https://ru.bmstu.wiki/Apache_Solr
6. https://www.splunk.com/en_us/blog/security/six-straight-years-splunk-named-a-leader-in-the-gartner-siem-magic-quadrant.html
7. Niya Narhid, Gwen Shapira, Todd Palino. Apache Kafka. Stream processing and data analysis. - . St Peterb. 2018. – 463
8. https://static.rainfocus.com/splunk/splunkconf18/sess/1523315089950001nFR9/finalPDF/Using-Spark-and-MLlib-1364_1538792259889001CncS.pdf
9. https://docs.splunk.com/Documentation/Splunk/8.0.1/Indexer/Basicclusterarchitecture
10. https://en.wikipedia.org/wiki/Word2vec
11. https://medium.com/@machineboxio/introducing-fakebox-detect-fake-news-with-machine-learning-f602c39aad04

Published

2020-01-23

Issue

Section

Articles