The main directions of expanding the insider information security model
Authors: Sychev V.M. | Published: 08.04.2016 |
Published in issue: #2(107)/2016 | |
DOI: 10.18698/0236-3933-2016-2-125-137 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, insider, intruder model, temporality, classification, data mining |
The article examines the shortcomings of the conceptual and logical interpretation of the insider model in terms of "entity-relationship" and relational data organization. The study shows, that the tested subject area is dynamic, by definition. The process of adapting a temporal database to the new environment makes it necessary to transfer the data and requires the new facilities over the old ones with the preservation of history changes of the temporal data. It is possible to increase the data storage redundancy, increase the basic relational model, and drawing up and executing queries can become more complex. As a result, we propose a method for expanding the model insider information security (insider) by introducing a time attribute, for that purpose we use a certain number of temporal databases.
References
[1] Karpychev V.Yu., Sychev V.M., Minin Yu.V. New approaches to the modeling of insider information security. Pribory i sistemy. Upravlenie, kontrol’, diagnostika instruments and systems [Management, monitoring, diagnostics], 2013, no. 7, pp. 3239 (in Russ.).
[2] Sychev V.M. The formalization of models insider information security. Vestn. Mosk. Gos. Tekh. Univ. im. N.E. Baumana, Priborostr. [Herald of the Bauman Moscow State Tech. Univ., Instrum. Eng.], 2015, no. 2, pp. 92-106 (in Russ.). DOI: 10.18698/0236-3933-2015-2-92-106
[3] What is known about Andreas Lubits who ruled crashed Airbus A320? Available at: http://www.aif.ru/dontknows/file/Andreas_Lubittc_dosie 27.03.15 (accessed 06.25.2015).
[4] Suicide pilot Germanwings - not the first time. Inosmi, 2015. Available at: http://inosmi.ru/world/20150327/227156413.html#ixzz3fBpWJTlu (accessed 06.25.2015).
[5] Garcia-Molina G., Ullman J., Widom J. Database systems. The Complete Book. Pearson Prentice-Hall. Pearson Education Inc., 2002.
[6] Date K. An Introduction to Database Systems. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2003.
[7] Lisyansky K. Architectural solutions and modeling of data warehouse and data marts. Available at: http://www.olap.ru/basic/diasoft1.asp (accessed 06.25.2015).
[8] Baldin A.V., Eliseev D.V., Aghayan K.G. Overview of methods of creating systems based on temporal relational database. Nauka i obrazovanie. MGTU im. N.E. Baumana [Science & Education of the Bauman MSTU. Electronic Journal], 2012, no. 8. Availlable at: http://technomag.bmstu.ru/en/doc/441884.html DOI: 10.7463/0812.0441884
[9] Snodgrass R. Developing Time-Oriented Database Applications in SQL. Morgan Kaufmann Publishers, 1999.
[10] Bazarkin A.N. The development of temporal data model in the medical information system. Programmnye produkty i sistemy [Software products and systems], 2009, no. 2 (in Russ.).
[11] Kostenko B.B., Kuznetsov S.D. The history and current problems of temporal databases. Available at: http://citforum.ru/database/articles/temporal (accessed 05.25.2015).
[12] Christian S. Jensen Temporal Database Management. Aalborg University, 2000. 1323 p. Available at: http://people.cs.aau.dk/csj/Thesis/ (accessed 01.08.2015).
[13] Karpychev V.Yu., Sychev V.M. The Use of Bayes Networks in Problems of Analysis Internal Threats to Information Security. Vestnik Voronezhskogo instituta MVD Rossii [Vestnik of Voronezh Institute of the Ministry of Interior of Russia], 2015, no. 1, pp. 12-19 (in Russ.).
[14] Eliseev D.V. Metodika obrabotki temporal’noy relyatsionnoy bazy dannykh v mivarnom prostranstve. Avtoreferat diss. kand. tekhn. nauk [Methods of treatment of temporal relational database mivarny space. Cand. tech. sci. diss. abstr.]. Moscow, 2011.