Skip to main content
Log in

Post-Analytical Methods for Using Data Proceedings for Defense of Collective Systems

  • Published:
Scientific and Technical Information Processing Aims and scope

Abstract—Theoretical and applied aspects of using analytical post-processing methods using multidimensional data analysis to protect resources in shared systems are investigated. New approaches, algorithms, and procedures of this process are considered on the basis of registration statistics and multidimensional data analysis, which allow counteracting the implementation of implicit indirect methods of unauthorized access (or other actions) to information. A method of evaluating the quality of monitored indicators, as well as the stationary state of the system of indicators that characterize the “image” of the user in the system, is proposed. Questions of perception of results of data post-processing by a decision maker (security service administrator) are analyzed. A method of graphical visualization of results of registration and analytical processing of fixed data is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.

Similar content being viewed by others

REFERENCES

  1. Hoffman, L.J., Modern Methods for Computer Security and Privacy, Prentice-Hall, 1977.

  2. Smolyan, G.L., Network information technologies and personality security problems, Vestn. Ross. Fonda Fundam. Issled., 1999, no. 3, pp. 63–68.

  3. Siountiourenko, O., The problems of providing information security: The case of information infrastructure, in Studies in Eastern Europe. Technological and Environmental Policy, Banse, G., Ed., Berlin, 2007, pp. 161–179.

    Google Scholar 

  4. Akopyan, D.A. and Yelyakov, A.D., Cybercrimes in the information structure of society: A survey, Sci. Tech. Inf. Process., 2009, vol. 36, no. 6, pp. 338–350.

    Article  Google Scholar 

  5. Syuntyurenko, O.V., The social and economic risks of the development of information technologies, Sci. Tech. Inf. Process., 2012, vol. 39, no. 2, pp. 113–116.

    Article  Google Scholar 

  6. Syuntyurenko, O.V., The digital enviroment: the trends and risks of development, Sci. Tech. Inf. Process., 2015, vol. 42, no. 1, pp. 24–29.

    Article  Google Scholar 

  7. Arutyunov, V.V., The results of priority research in the field of information security, Sci. Tech. Inf. Process., 2016, vol. 43, no. 1, pp. 42–46.

    Article  Google Scholar 

  8. Syuntyurenko, O.V., Theoretical and applied aspects of automating multivariate analysis procedures, Autom. Doc Math. Linguist., 2018, vol. 52, no. 6, pp. 275–281.

    Article  Google Scholar 

  9. Syuntyurenko, O.V., Digital environment: Information analytical postprocessing using the scientometric and data analysis methods, Sci. Tech. Inf. Process., 2019, vol. 46, no. 2, pp. 59–66.

    Article  Google Scholar 

  10. Multiple Linear Regression. Improving the Regression Model. https://function-x.ru/statististics_regression2.html. Accessed June 12, 2019.

  11. Sharstnev, V.L. and Vardomatskaya, E.Yu., et al., Application software packages for statistical data analysis. https://rep.vstu.by/handle/123456789/1746. Accessed June 6, 2019.

  12. Velichko, V.V., Comparative analysis of statistical software packages. https://cyberleninka.ru/article/n/sravnitelnyy-analiz-statisticheskin-paketov-programm. Accessed March 6, 2019.

  13. Klyshinskii, E.S., Ryaskov, S.V., and Shikhov, A.I., Overview of multidimensional data visualization techniques. https://cyberleninka.ru/article/n/obzor-metodov-visualizatsii-mnogomernyh-dannyh. Accessed March 7, 2019.

  14. National Program Digital Economy of the Russian Federation, approved by the order of the Government of the Russian Federation of July 28, 2017 no. 1632-r. https://static.government.ru/media/files/9gFM4FHj4PsB79I5v7yLVuPgu4bvR7M0.pdf. Accessed December 27, 2019.

Download references

Funding

This article was supported by the Russian Foundation for Basic Research (project no. 20-07-00014).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to O. V. Syuntyurenko.

Ethics declarations

The authors declare that they have no conflicts of interest.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Syuntyurenko, O.V. Post-Analytical Methods for Using Data Proceedings for Defense of Collective Systems. Sci. Tech. Inf. Proc. 47, 29–35 (2020). https://doi.org/10.3103/S0147688220010086

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0147688220010086

Keywords:

Navigation