Abstract—Theoretical and applied aspects of using analytical post-processing methods using multidimensional data analysis to protect resources in shared systems are investigated. New approaches, algorithms, and procedures of this process are considered on the basis of registration statistics and multidimensional data analysis, which allow counteracting the implementation of implicit indirect methods of unauthorized access (or other actions) to information. A method of evaluating the quality of monitored indicators, as well as the stationary state of the system of indicators that characterize the “image” of the user in the system, is proposed. Questions of perception of results of data post-processing by a decision maker (security service administrator) are analyzed. A method of graphical visualization of results of registration and analytical processing of fixed data is presented.
Similar content being viewed by others
REFERENCES
Hoffman, L.J., Modern Methods for Computer Security and Privacy, Prentice-Hall, 1977.
Smolyan, G.L., Network information technologies and personality security problems, Vestn. Ross. Fonda Fundam. Issled., 1999, no. 3, pp. 63–68.
Siountiourenko, O., The problems of providing information security: The case of information infrastructure, in Studies in Eastern Europe. Technological and Environmental Policy, Banse, G., Ed., Berlin, 2007, pp. 161–179.
Akopyan, D.A. and Yelyakov, A.D., Cybercrimes in the information structure of society: A survey, Sci. Tech. Inf. Process., 2009, vol. 36, no. 6, pp. 338–350.
Syuntyurenko, O.V., The social and economic risks of the development of information technologies, Sci. Tech. Inf. Process., 2012, vol. 39, no. 2, pp. 113–116.
Syuntyurenko, O.V., The digital enviroment: the trends and risks of development, Sci. Tech. Inf. Process., 2015, vol. 42, no. 1, pp. 24–29.
Arutyunov, V.V., The results of priority research in the field of information security, Sci. Tech. Inf. Process., 2016, vol. 43, no. 1, pp. 42–46.
Syuntyurenko, O.V., Theoretical and applied aspects of automating multivariate analysis procedures, Autom. Doc Math. Linguist., 2018, vol. 52, no. 6, pp. 275–281.
Syuntyurenko, O.V., Digital environment: Information analytical postprocessing using the scientometric and data analysis methods, Sci. Tech. Inf. Process., 2019, vol. 46, no. 2, pp. 59–66.
Multiple Linear Regression. Improving the Regression Model. https://function-x.ru/statististics_regression2.html. Accessed June 12, 2019.
Sharstnev, V.L. and Vardomatskaya, E.Yu., et al., Application software packages for statistical data analysis. https://rep.vstu.by/handle/123456789/1746. Accessed June 6, 2019.
Velichko, V.V., Comparative analysis of statistical software packages. https://cyberleninka.ru/article/n/sravnitelnyy-analiz-statisticheskin-paketov-programm. Accessed March 6, 2019.
Klyshinskii, E.S., Ryaskov, S.V., and Shikhov, A.I., Overview of multidimensional data visualization techniques. https://cyberleninka.ru/article/n/obzor-metodov-visualizatsii-mnogomernyh-dannyh. Accessed March 7, 2019.
National Program Digital Economy of the Russian Federation, approved by the order of the Government of the Russian Federation of July 28, 2017 no. 1632-r. https://static.government.ru/media/files/9gFM4FHj4PsB79I5v7yLVuPgu4bvR7M0.pdf. Accessed December 27, 2019.
Funding
This article was supported by the Russian Foundation for Basic Research (project no. 20-07-00014).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
About this article
Cite this article
Syuntyurenko, O.V. Post-Analytical Methods for Using Data Proceedings for Defense of Collective Systems. Sci. Tech. Inf. Proc. 47, 29–35 (2020). https://doi.org/10.3103/S0147688220010086
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0147688220010086