Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Detection of Cybersecurity Events Based on Entropy Analysis
Taras Shevchenko National University of Kyiv, Ukraine.
Taras Shevchenko National University of Kyiv, Ukraine.
Taras Shevchenko National University of Kyiv, Ukraine.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0001-5629-5205
Show others and affiliations
2022 (English)In: CEUR Workshop Proceedings / [ed] Khikmetov A., Daineko Y., Ipalakova M., Technical University of Aachen , 2022Conference paper, Published paper (Refereed)
Abstract [en]

As a rule, modern approaches to protecting against cyberattacks do not guarantee the impossibility of compromising applications and operating systems. Therefore, detection and identification of vulnerabilities, and actions to avoid or mitigate their impact on businesses and cybersecurity processes are critical for the operation of information systems and the information security management system. To identify a possible attack vector, as a rule, the following methods could be applied: either those that allow detecting abuses or that allow detecting anomalies. This paper investigates the possibility of identifying the alleged attack vector based on the entropy analysis of cybersecurity events. The research results presented in the paper allow us to determine the required width of the sliding window and confirm that such entropy analysis detects exceeding security thresholds and anomalies in the operation of operating systems and applications and, accordingly, probable attack vectors. © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).

Place, publisher, year, edition, pages
Technical University of Aachen , 2022.
Series
CEUR Workshop Proceedings, E-ISSN 1613-0073 ; 3382
Keywords [en]
anomaly, cybersecurity event, Entropy, event log, information security, intrusion detection, Cybersecurity, Information management, Attack vector, Cyber security, Cyber-attacks, Detection and identifications, Entropy analysis, Event logs, Event-based, Intrusion-Detection
National Category
Computer Systems Computer Sciences
Identifiers
URN: urn:nbn:se:bth-24800Scopus ID: 2-s2.0-85159363701OAI: oai:DiVA.org:bth-24800DiVA, id: diva2:1766100
Conference
7th International Conference on Digital Technologies in Education, Science and Industry, DTESI 2022, Almaty, 20 October through 21 October 2022
Available from: 2023-06-12 Created: 2023-06-12 Last updated: 2023-06-12Bibliographically approved

Open Access in DiVA

fulltext(1211 kB)132 downloads
File information
File name FULLTEXT01.pdfFile size 1211 kBChecksum SHA-512
7c0a571dc50aca83a9da93b983a69e0525418c47b9b9a2379974c49eeb8c7931358e7927838eb22ed315f69f6c3ea352d98ca239c86fd3ddfd61d3c60ba7e1f3
Type fulltextMimetype application/pdf

Scopus

Authority records

Baranovskyi, Oleksii

Search in DiVA

By author/editor
Baranovskyi, Oleksii
By organisation
Department of Computer Science
Computer SystemsComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 132 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 390 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf