Building an Adaptive System for Collecting and Preparing Data for Security Monitoring | Automatic Control and Computer Sciences Skip to main content
Log in

Building an Adaptive System for Collecting and Preparing Data for Security Monitoring

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

The task of collecting and preparing data for CPS security monitoring is formulated. A method for simulation and evaluation of a system for collecting and preparing data for security monitoring and principles for constructing an adaptive solution are given. An example of building and optimizing an adaptive system for CPS monitoring is given.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

Similar content being viewed by others

REFERENCES

  1. Vvedenie v problemu kiberbezopasnosti avtomatizirovannykh sistem upravleniya tekhnologicheskimi protsessami. Sbornik statei (Introduction to the Problem of Cybersecurity of Automated Control Systems for Technological Processes. Collection of Articles), Zegzhda, D.P., Ed., St. Petersburg, 2018.

    Google Scholar 

  2. Semenov, V.V., Salakhuddinova, K.I., Lebedev, I.S., and Sukhoparov, M.E., Identification of abnormal deviations in the functioning of cyber-physical systems devices, Prikl. Inf., 2019, no. 6, pp. 114–122.

  3. Burlov, V.G., et al., Industry 4.0. Threats and requirements for the process of managing information security of cyberphysical systems, Inf. Tekhnol. Sist.: Upr. Ekon. Transp. Pravo, 2019, no. 3, pp. 126–129.

  4. Coletta, A. and Armando, A., Security monitoring for industrial control systems, Security of Industrial Control Systems and Cyber Physical Systems, First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015; Lect. Notes Comput. Sci., 2016, vol. 9588, pp. 48–62.

  5. Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.

    Article  Google Scholar 

  6. Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://doi.org/10.1145/2947626.2947639

  7. Lavrova, D.S. and Vasil’ev, Y.S., An ontological model of the domain of applications for the Internet of Things in analyzing information security, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 817–823.

    Article  Google Scholar 

  8. Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.

    Article  Google Scholar 

  9. Sanfelice, R.G., Analysis and design of cyber-physical systems: A hybrid control systems approach, in Cyber-Physical Systems, CRC Press, 2015, pp. 3–31.

    Google Scholar 

  10. Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.

    Article  Google Scholar 

  11. Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.

    Article  Google Scholar 

  12. Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4, 2019, pp. 129–135.

    Google Scholar 

  13. Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https://doi.org/10.1109/RUSAUTOCON.2018.8501783

  14. Zegzhda, D., Lavrova, D., and Khushkeev, A., Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series, Proceedings – 2019 IEEE International Conference on Industrial Cyber Physical Systems, ICPS, 2019, pp. 780–784.

  15. Petrenko, S.A., Review of methods of immune protection of anticipation of disturbances on the cyber systems of Industry 4.0, Zashch. Inf., INSIDE, 2019, no. 5, pp. 36–48.

  16. Lomako, A.G., Ovcharov, V.A., and Petrenko, S.A., A method for investigating security incidents using behavior profiles of network objects, Distantsionnye obrazovatel’nye tekhnologii. Materialy III Vserossiiskoi nauchno-prakticheskoi konferentsii (Distance Educational Technologies. Proc. III All-Russian Scientific and Practical Conference), Yalta, 2018, pp. 366–373.

  17. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.

    Google Scholar 

  18. Lavrova, D., Poltavtseva, M., Shtyrkina, A., and Zegzhda, P., Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic, SHS Web Conf., 2018, vol. 44, p. 00051. https://doi.org/10.1051/shsconf/20184400051

  19. Saenko, I.B., Kushnerevich, A.G., and Kotenko, I.V., Implementation of a distributed parallel computing platform for collecting and preprocessing large monitoring data in cyber-physical systems, Mezhdunarodnyi kongress po informatike: informatsionnye sistemy i tekhnologii (CSIST-2016). Materialy mezhdunarodnogo nauchnogo kongressa (International Congress on Informatics: Information Systems and Technologies (CSIST-2016). Materials of the International Scientific Congress), Minsk, 2016, pp. 641–645.

  20. Klasa, T. and El Fray, I., Load-balanced integrated information security monitoring system, Ann. Comput. Sci. Inf. Syst., 2017, vol. 13, pp. 213–221.

    Google Scholar 

  21. Marchal, S., Jiang, X., State, R., and Engel, T., A big data architecture for large scale security monitoring, 2014 IEEE International Congress on Big Data, 2014, pp. 56–63. https://doi.org/10.1109/BigData.Congress.2014.18

  22. Manogaran, G., et al., A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system, Future Gener. Comput. Syst., 2018, vol. 82, pp. 375–387. https://doi.org/10.1016/j.future.2017.10.045

    Article  Google Scholar 

  23. Kazarin, O.V., Sharyapov, R.A., and Yashchenko, V.V., Multifactorial classification of threats to information security of cyber-physical systems, Vestn. RGGU Inf. Inf. Bezop., Mat., 2019, no. 1, pp. 39–55.

  24. Poltavtseva, M.A., Support for the inference mechanism of access control systems based on ontologies in a relational server, Metody Tekh. Sredstva Obespecheniya Bezop. Inf., 2016, no. 25, pp. 109–111.

  25. Biryukov, D.N. and Lomako, A.G., An approach to the construction of information security systems capable of synthesizing scenarios of proactive behavior in an information conflict, Zashch. Inf., INSIDE, 2014, no. 6, pp. 42–50.

  26. Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 785–789. https://doi.org/10.1109/ICPHYS.2019.8780193

  27. Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.

    Article  Google Scholar 

  28. Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.

    Article  Google Scholar 

  29. Poltavtseva, M.A., Zegzhda, P.D., and Pankov, I.D., The hierarchial data aggregation method in backbone traffic streaming analyzing to ensure digital systems information security, 11th International Conference “Management of Large-Scale System Development,” MLSD, 2018, pp. 1–5.

Download references

ACKNOWLEDGMENTS

The results of this work were obtained using the computing resources of the supercomputer center of the Peter the Great St. Petersburg Polytechnic University (SCC Polytechnic, http://www.spbstu.ru).

Funding

This work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to M. A. Poltavtseva or D. P. Zegzhda.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by I. Obrezanova

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poltavtseva, M.A., Zegzhda, D.P. Building an Adaptive System for Collecting and Preparing Data for Security Monitoring. Aut. Control Comp. Sci. 54, 968–976 (2020). https://doi.org/10.3103/S0146411620080283

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080283

Keywords:

Navigation