Method for Information Security Events Detection in a Cloud Signature Systems
The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Russian |
Published: |
Ministry of Education of the Republic of Belarus, Establishment The Main Information and Analytical Center
2024-06-01
|
Series: | Цифровая трансформация |
Subjects: | |
Online Access: | https://dt.bsuir.by/jour/article/view/851 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832557163572101120 |
---|---|
author | V. A. Gerasimov O. V. Boyprav |
author_facet | V. A. Gerasimov O. V. Boyprav |
author_sort | V. A. Gerasimov |
collection | DOAJ |
description | The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of signed electronic documents, the number of incorrect authentication attempts to access the user’s personal key, the rate of comparing the hash value of the signed documents, and the rate of sending the hash value of the signed data in the signature creation device. It is recommended to base the method on the mechanisms of mathematical statistics in relation to the listed parameters. The description and results of testing the developed method, the number of false positive and false negative results of the analysis of information security events in cloud signature systems are presented. The obtained values turned out to be less than similar indicators typical for the results of analysis carried out using other existing methods. This is the main advantage of the proposed method compared to its analogues. |
format | Article |
id | doaj-art-44e53de0d56e48a3b5592b6a780b979f |
institution | Kabale University |
issn | 2522-9613 2524-2822 |
language | Russian |
publishDate | 2024-06-01 |
publisher | Ministry of Education of the Republic of Belarus, Establishment The Main Information and Analytical Center |
record_format | Article |
series | Цифровая трансформация |
spelling | doaj-art-44e53de0d56e48a3b5592b6a780b979f2025-02-03T05:39:07ZrusMinistry of Education of the Republic of Belarus, Establishment The Main Information and Analytical CenterЦифровая трансформация2522-96132524-28222024-06-01302778410.35596/1729-7648-2024-30-2-77-84340Method for Information Security Events Detection in a Cloud Signature SystemsV. A. Gerasimov0O. V. Boyprav1Scientific Research Institute of Technical Protection of Information; Belarusian State University of Informatics and RadioelectronicsBelarusian State University of Informatics and RadioelectronicsThe parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of signed electronic documents, the number of incorrect authentication attempts to access the user’s personal key, the rate of comparing the hash value of the signed documents, and the rate of sending the hash value of the signed data in the signature creation device. It is recommended to base the method on the mechanisms of mathematical statistics in relation to the listed parameters. The description and results of testing the developed method, the number of false positive and false negative results of the analysis of information security events in cloud signature systems are presented. The obtained values turned out to be less than similar indicators typical for the results of analysis carried out using other existing methods. This is the main advantage of the proposed method compared to its analogues.https://dt.bsuir.by/jour/article/view/851siem systemsignature activation protocolsigner profilecloud signature systeminformation security event |
spellingShingle | V. A. Gerasimov O. V. Boyprav Method for Information Security Events Detection in a Cloud Signature Systems Цифровая трансформация siem system signature activation protocol signer profile cloud signature system information security event |
title | Method for Information Security Events Detection in a Cloud Signature Systems |
title_full | Method for Information Security Events Detection in a Cloud Signature Systems |
title_fullStr | Method for Information Security Events Detection in a Cloud Signature Systems |
title_full_unstemmed | Method for Information Security Events Detection in a Cloud Signature Systems |
title_short | Method for Information Security Events Detection in a Cloud Signature Systems |
title_sort | method for information security events detection in a cloud signature systems |
topic | siem system signature activation protocol signer profile cloud signature system information security event |
url | https://dt.bsuir.by/jour/article/view/851 |
work_keys_str_mv | AT vagerasimov methodforinformationsecurityeventsdetectioninacloudsignaturesystems AT ovboyprav methodforinformationsecurityeventsdetectioninacloudsignaturesystems |