<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Safety Monitoring of the Automated City Water Supply Management System Based on PSIM and SIEM Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmitrii Orel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tatyana Guseva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>North Caucasus Federal University</institution>
          ,
          <addr-line>Pushkina st., 1, Stavropol, 355017, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <fpage>127</fpage>
      <lpage>136</lpage>
      <abstract>
        <p>The article is about the integration of monitoring functions of industrial facility security systems based on the PSIM system. The water supply company of a large city acts as an industrial facility. The analysis of the company structure and its security systems, as well as the means of physical security is done. The functionality of SIEM and PSIM systems is considered. At the end of the article, the algorithm for the operation of the Darvis platform, interacting with the video surveillance system and the existing pressure monitoring sensors in the city's water supply, was developed. The integration of the video surveillance system and the Darvis software will allow it use it as a single platform for providing a comprehensive security system and rapid response to incidents at the city's water supply company. Rapid response to accidents in the water supply line or at pumping stations will reduce water losses, which will reduce financial damage to the company.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Security systems integration</kwd>
        <kwd>industrial facility</kwd>
        <kwd>SIEM system</kwd>
        <kwd>PSIM system</kwd>
        <kwd>Darvis softwar</kwd>
        <kwd>automated process control system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>There is a lot of production infrastructure in Russia, including automated process control systems,
and it is of interest to intruders.</p>
      <p>Modern automated process control systems have ceased to be autonomous and are increasingly
integrated with information systems, forming unified automated information management systems.</p>
      <p>For example, in this paper we consider an industrial facility - a water supply company of a large
city, which is an automated water supply management system integrated with the enterprise information
system.</p>
      <p>In such a convergent system, various channels of information transmission are used. All this creates
a wide range of threats to the information security of an industrial facility.</p>
      <p>The purpose of the work is to increase the efficiency of industrial facility security systems by
creating a security monitoring system. The hypothesis is that combining information from sensors of
various security systems will a) reduce the time for making decisions to prevent an incident b) increase
the accuracy of management decisions in the field of security c) reduce the number of false notifications
about information security incidents.</p>
      <p>
        To monitor information systems for managing security incidents at the enterprise SIEM systems can
be used. They monitor information systems, analyze real-time security events emanating from network
devices, information security tools, IT services, system and application infrastructure, and help detect
information security incidents. SIEM systems provide limited opportunities for cybersecurity of
industrial facilities, they do not allow taking into account data on the infrastructure of industrial
facilities, taking into account physical security issues. As a result, an industrial facility is exposed to a
greater number of threats that cannot be controlled. Integration of SIEM systems and SCADA dispatch
control and data collection systems allows to solve this problem. Integration will allow SIEM systems
to receive data generated by systems that allow monitoring of industrial facilities [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Information protection in an automated process control system is achieved by taking a set of
organizational and technical information protection measures aimed at blocking (neutralizing) threats
to information security, the implementation of which may lead to a violation of the normal functioning
of the automated control system and the controlled object and (or) process, localization and minimizing
the consequences of the possible implementation of threats to information security, restoration of the
normal mode of functioning of the automated control system in case of information security threats [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Thus, the integrated security system of industrial facilities, in addition to monitoring the safety of
production processes, should also monitor threats related to information security.</p>
      <p>It should be pointed that the integration of SIEM and SCADA requires the creation of a complex
model that allows describing incidents and incident response algorithms based on data obtained from
heterogeneous information systems. In this paper, it is proposed to develop an algorithm for integrating
the video surveillance system of an industrial facility of a water supply enterprise with the Darvis
software product.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of the structure and security systems of an industrial facility</title>
      <p>The water supply company operates in the field of housing and communal services of a large city.
The main types of services provided by the company are cold water supply and sanitation.
2.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Analysis of the organizational structure of the company</title>
      <sec id="sec-3-1">
        <title>The functions of the company are presented on Figure 2. 128</title>
        <p>Modern water supply and sewerage systems are a set of structures, mechanisms and equipment, all
parts of which must work together accurately and without failures. These include water intake
structures, water treatment plants, water supply and sewerage networks with their servicing devices,
pumping stations, as well as internal water supply and sewerage systems of buildings.
2.2.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>The need to integrate industrial facility security systems</title>
      <p>The company manages complex and geographically distributed processes for water supply and
sanitation in the city. Radio channel communication is used to transmit information from sensors to
dispatch control and data collection systems. The exchange between the SCADA system and the
operator's ARM takes place over an Ethernet network.</p>
      <p>Automated process control systems have two actual threats that allow to disrupt and intercept the
management of the enterprise:
1. The threat of disruption of the technological / production process due to time delays introduced
by the means of protection.
2. The threat of interception of control by an automated process control system.</p>
      <p>Information protection in an automated process control system is achieved by adopting, within the
framework of the automated control system protection system, a set of organizational and technical
information protection measures aimed at blocking information security threats, the implementation of
which may lead to a violation of the normal functioning of the automated control system and the
controlled process, to localize and minimize the consequences of the possible implementation of
information security threats, restoration of the normal mode of functioning of the automated control
system in case of information security threats.</p>
      <p>To ensure the full operation of the enterprise, as well as the ability to eliminate the implementation
of security threats, the integration of physical security means of the enterprise's automated control
system with a SIEM system that allows analyzing security events in real time coming from network
devices, information security tools will help.</p>
      <p>Using the Methodology for assessing information security threats, three negative consequences that
may occur from the implementation (occurrence) of information security threats were identified. The
objects of influence: operator's workstation, database, controller for process control, controller for water
treatment process control, programmable logic controller (PLC) for pumping station control. The main
categories of violator (internal, external), the type of violator and possible goals of information security
threats are considered.</p>
      <p>The following categories of people can be identified as actual violators (Table 1):</p>
      <p>Persons
providing the
functioning of
systems and
networks or
providing the
operator's</p>
      <p>systems
(administration</p>
      <p>, security,
cleaners, etc.)</p>
      <sec id="sec-4-1">
        <title>System</title>
      </sec>
      <sec id="sec-4-2">
        <title>Administrators</title>
        <p>and Security</p>
      </sec>
      <sec id="sec-4-3">
        <title>Administrators</title>
      </sec>
      <sec id="sec-4-4">
        <title>Former employees (users)</title>
      </sec>
      <sec id="sec-4-5">
        <title>Terrorist,</title>
        <p>extremist
groupings
internal</p>
      </sec>
      <sec id="sec-4-6">
        <title>Information system database internal external</title>
        <p>external</p>
      </sec>
      <sec id="sec-4-7">
        <title>Operator's computer</title>
      </sec>
      <sec id="sec-4-8">
        <title>Information system database</title>
      </sec>
      <sec id="sec-4-9">
        <title>Controller for</title>
        <p>controlling
technological
processes of water
purification</p>
      </sec>
      <sec id="sec-4-10">
        <title>Programmable logic controller (PLC) for control of pumping stations</title>
      </sec>
      <sec id="sec-4-11">
        <title>Available interfaces</title>
      </sec>
      <sec id="sec-4-12">
        <title>Methods of implementation</title>
      </sec>
      <sec id="sec-4-13">
        <title>Web user interface for accessing the information system database</title>
      </sec>
      <sec id="sec-4-14">
        <title>Exploiting Database</title>
      </sec>
      <sec id="sec-4-15">
        <title>Management System configuration vulnerabilities</title>
      </sec>
      <sec id="sec-4-16">
        <title>Access via the organization's local area network</title>
      </sec>
      <sec id="sec-4-17">
        <title>Web user interface for accessing the information system database</title>
      </sec>
      <sec id="sec-4-18">
        <title>Remote controller control channel</title>
      </sec>
      <sec id="sec-4-19">
        <title>Remote controller control channel</title>
      </sec>
      <sec id="sec-4-20">
        <title>Introduction of malicious software</title>
      </sec>
      <sec id="sec-4-21">
        <title>Exploiting Database</title>
      </sec>
      <sec id="sec-4-22">
        <title>Management System configuration vulnerabilities</title>
      </sec>
      <sec id="sec-4-23">
        <title>Data modification in communication channel</title>
      </sec>
      <sec id="sec-4-24">
        <title>Introduction of malware</title>
      </sec>
      <sec id="sec-4-25">
        <title>Data modification in communication channel</title>
      </sec>
      <sec id="sec-4-26">
        <title>Introduction of malware</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>2.3. Analysis of the automated process control system of the water supply company</title>
      <p>Significant difficulties of technological management at the enterprise arise as a consequence of the
geographical remoteness of the objects of control and management from each other: technological
objects are arbitrarily located throughout the city and beyond. Therefore, management tasks, first of all,
require the creation of an effective system for collecting and transmitting information about the
parameters and operating modes of technological equipment at various remote facilities. An automated
control system (automated process control system) is used to control and conveniently manage the
technological processes of the enterprise. The automated process control system allows:
● Create dispatching control of the technological process of water supply and sanitation;
● Provide centralized control of parameters;
● Predict and prevent emergency situations related to the operation of technological equipment;
● Control technological processes, optimize and improve the efficiency of work at the pumping
station;
● Minimize the impact of the human factor on the technological process;
● To carry out automatic transmission of the agreed information to the control room of the water
supply company;
● Keep commercial records of pumped water, energy carriers and electricity;
● Extend the service life of the units;
● Reduce personnel labor costs by automating control and management functions;
● Increase the safety of the technological process for personnel and the environment.
The automated process control system combines several levels of hardware:
1. Sensors and actuators.
2. SCADA controllers.</p>
      <p>3. Computer connecting the operator's workstation and SCADA controllers.
2.4.</p>
    </sec>
    <sec id="sec-6">
      <title>Analysis of the means of physical security of the water supply company</title>
      <p>As means of physical security at the enterprise are provided:
● Access control and management system for the territory and individual premises of the
enterprise;
● Security and fire alarm system;
● Video surveillance system.</p>
      <p>All security features have events recorded in special logs. Appropriate security personnel are
assigned to each means of protection. Actually, they can view service information in the event logs.
Figure 3 shows the general structure of the location of the physical security facilities of the water supply
company.
analysis. He will be able to react in a timely manner or even in advance to the incident, preventing an
emergency or a malfunction of the enterprise.</p>
      <p>This problem will be solved by the introduction of a SIEM system at the enterprise, which will
monitor the information system, analyze security events in real time coming from network devices,
information security tools. It will be necessary to integrate the existing means of physical security of
the enterprise with the installed SIEM system.</p>
    </sec>
    <sec id="sec-7">
      <title>3. Analysis of ways to integrate security systems</title>
      <p>To date, the number of enterprises that use SIEM systems in their information security management
centers to ensure cybersecurity is increasing. Information security management centers use a variety of
means to protect important information, which in most cases keep a log of all incidents.
3.1.</p>
    </sec>
    <sec id="sec-8">
      <title>Functional analysis of the SIEM system</title>
      <p>
        Every year the number of means of protection increases, and it becomes more difficult for
information security specialists to process accumulated records in incident logs. At the same time, if
you do not analyze emerging threats in a timely manner and do not try to prevent them, then any
protection system will be useless. Under these conditions, you should think about using Security
Information and Event Management (SIEM) class systems. As a rule, in serious companies with a
mature information security function, there are monitoring and response centers where SIEM systems
are used [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. There are often situations when attackers use complex and distributed methods of accessing
information, while security tools may not react to such incidents, considering them frivolous. However,
if you analyze all the minor incidents, you can form a more visual picture that will indicate a serious
attack. It is precisely these properties that characterize modern SIEM systems, they are able to detect
attacks by post-analysis of events, by minor incidents, as well as anomalous phenomena in the system.
      </p>
      <p>
        Consider the generally accepted definition of a SIEM system [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        SIEM (Security Information and Event Management) - solutions that monitor information systems,
analyze real-time security events originating from network devices, information security tools, IT
services, system and application infrastructure, and help detect information security incidents. SIEM
are provided by providers as hardware devices, software or services and are used to collect and process
events, alerts, generate reports and visualize information security violations. It should be noted right
away that SIEM systems are designed to monitor and respond to incidents, but do not allow you to
protect yourself from threats or prevent negative events [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. As a rule, these systems appeared much
earlier than their application was in demand.
      </p>
      <p>
        SIEM systems are used to solve the following tasks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]:
● Data consolidation, collection of information security events from various sources (network
devices and IT services, security systems, operating systems, databases, business applications);
● Storing security events from various sources in historical order for retrospective analysis and
identification of chains of actions that caused security incidents;
● Correlation and processing of security events, the use of various techniques to compare audit
data from various sources and identify significant information;
● Providing tools for expert analysis of events and analysis of security incidents with the ability
to search through a variety of parameters and build models of the relationship of events with each
other;
● Contextual enrichment of incidents with information about the belonging of the data affected
in the IB events to certain business applications, employees of the organization and processes, their
criticality for business or vulnerability to threats based on information from security systems and
vulnerability scanners;
● Automatic notification of the security administrator via the SIEM interface through integration
with the application accounting system, as well as by e-mail, SMS, etc.
      </p>
      <sec id="sec-8-1">
        <title>Examples of Russian SIEM systems: ● COMRADE; ● Garda Analytics; ● MaxPatrol.</title>
        <p>3.2.</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Analysis of the PSIM system functionality</title>
      <p>It should be noted that SIEM systems, like others, evolve over time. As a result of this development,
SIEM systems have subclasses with various functional extensions: SOAR, COM, PSIM. In particular,
PSIM systems allow not only to collect incident data from network devices, like classic SIEM systems,
but also to work with physical security systems and automated process management systems, while
PSIM systems not only collect data and generate warnings, but also have the ability to monitor the
operation of equipment.</p>
      <p>Since it is important for an industrial facility to control the situation using a video surveillance
system, PSIM systems are considered in the work.</p>
      <p>For the most part, SIEM systems work as network hosts (information system). PSIM systems are
used to work with physical security systems and automated control systems.</p>
      <p>One of the main additions of PSIM systems is working with video information, which is very
important for monitoring the situation at industrial facilities, since the video surveillance system at such
facilities is an integral part of physical security. They have connectors to hundreds of models of physical
security devices, the rules system allows you to send only important information to the SIEM system,
and video data can be transmitted to the SIEM system as a link to the PSIM interface.</p>
      <p>Examples of PSIM systems:
● Darvis;
● ESM – PSIM;
● CoordCom.</p>
      <p>
        One of the representatives of the PSIM system is the Darvis software product developed by
InfocomS LLC. The main task of Darvis is the qualitative integration of all existing systems of the facility to
ensure full control and management without the use of additional technical units and with minimal
participation of employees [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Therefore, we will choose it as an integrated system for a water supply
company. Below we will consider the algorithm for handling security incidents of the Darvis platform.
      </p>
    </sec>
    <sec id="sec-10">
      <title>3.3. The algorithm of integration of the video surveillance system of the water supply company and the software product "Darvis"</title>
      <p>As part of the work, the algorithm for the operation of the Darvis platform will be developed,
interacting with the video surveillance system and the existing pressure monitoring sensors in the city's
water supply.</p>
      <p>Figure 4 shows an interface for creating an event management algorithm for the Darvis platform.</p>
      <p>The algorithm for processing an emergency situation will be developed in such a way that it will
allow to form a division of alerts into:
● The presence of a high level of danger of an incident that has occurred, which requires
immediate notification of the responsible person, and requires an ultra-fast response to eliminate. In
this case, the notification to the employee can come in the form of SMS messages, e-mail messages
and information output to the computer monitor through integration with the SIEM system, as well
as information output to the dashboard;
● The presence of a situation that is not so dangerous, and does not need urgent elimination and
response. The alert does not require immediate attention, so it will be implemented only on the
workplace monitor.</p>
      <p>The response algorithm should be developed taking into account the following aspects of the
company's work:
1. Sensors measuring water pressure in water pipes are placed at water supply and discharge sites,
pumping stations;
2. There are automatically controlled valves for the supply or emergency shutdown of water in
the city;
3. In the chambers and pumping stations within the radius of the placement of sensors, video
surveillance of what is happening is conducted;
4. Any changes in the water pressure level are recorded and transmitted to the operator's
workstation, after which the operator analyzes the surveillance cameras in the relevant areas and
takes measures to eliminate the situation.</p>
      <p>The developed algorithm assumes automating point 4, presented above. Until the operator finds the
necessary sensor in the video surveillance system, examines the picture of the accident on the line, and
then contacts the head of the emergency repair team, and until the employees arrive at the accident site,
a long period of time will pass.</p>
      <p>The Darvis system will allow you to automatically monitor these emergency situations and promptly
respond to the resolution of the situation, depending on the actions laid down in the algorithm. For
example, with a significant decrease in pressure, the system itself will display an image from the
surveillance cameras of the area where the deviation from the norm occurred on the operator's monitor.
In the case when the pressure in the pipeline has significantly decreased or has become zero at all, the
system will determine this situation as a burst of the pipeline and immediately automatically take action
to close the valves on this section of the line. Thus preventing damage caused to the city (blurring of
roads, etc.), to individuals (flooding of the yard territory of private houses, causing harm to the health
of passers-by, due to the release of a huge amount of water under high pressure, etc.), as well as the loss
of a large amount of water for the organization itself. The above algorithm can be represented as follows
(Figure 5).</p>
      <p>The work on the integration of the video surveillance system and the Darvis software will allow it
to be used as a single platform for providing a comprehensive security system and rapid response to
incidents. Rapid response to accidents in the water supply line or at pumping stations will reduce water
losses, which will reduce material damage to the enterprise.</p>
    </sec>
    <sec id="sec-11">
      <title>4. Acknowledgements</title>
      <p>The work was carried out using the equipment of the Center for Collective Use of North-Caucasus
Federal University with financial support from the Ministry of Science and Higher Education of Russian
Federation, unique project identifier RF ---- 2296.61321X0029 (agreement no. 075-15-2021-687).</p>
    </sec>
    <sec id="sec-12">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] Federal Law "On Industrial Safety of Hazardous Production Facilities" dated 21.07</source>
          .1997 No.
          <fpage>116</fpage>
          - FL.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Elena</given-names>
            <surname>Basan</surname>
          </string-name>
          , Maria Lapina,
          <string-name>
            <given-names>Dmitry</given-names>
            <surname>Orel</surname>
          </string-name>
          .
          <article-title>"Host-based Method and System for Detecting Anomalies in Network Traffic for a Robotic System"</article-title>
          .
          <source>Proceedings of the Young Scientist's Third International Workshop on Trends in Information Processing (YSIP3</source>
          <year>2019</year>
          ), Stavropol,
          <source>September 17th to 20th</source>
          ,
          <year>2019</year>
          ; CEUR Workshop Proceedings Volume
          <volume>2500</volume>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Guseva</surname>
            ,
            <given-names>T.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Badun</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          <article-title>Analysis of the problem of ensuring cybersecurity of industrial facilities based on SIEM systems. Innovation in the modern world: experience, problems and prospects for development. Collection of materials of the II International Conference</article-title>
          , Ufa,
          <year>2020</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Zolotukhin</given-names>
            <surname>Alexey</surname>
          </string-name>
          <string-name>
            <surname>Vitalievich</surname>
          </string-name>
          , Timokhovich Alexander Stepanovich.
          <article-title>The principle of operation and the typical structure of information security event management tools</article-title>
          .
          <source>Academy</source>
          .
          <year>2017</year>
          . No.
          <volume>10</volume>
          (
          <issue>25</issue>
          ). URL: https://cyberleninka.ru/article/n/printsip
          <article-title>-raboty-i-tipovaya-struktura-sredstvupravleniya-sobytiyami-bezopasnosti-informatsii.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] The Darvis platform</article-title>
          .
          <article-title>PSIM is a platform for managing and monitoring the security subsystems of an object</article-title>
          . URL: https://darvis.pro.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Calculation of water by pipe diameter and pressure: factors and methods</article-title>
          . URL: https://strojdvor.ru/vodosnabzhenie/rascet-rashoda-vody/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Gonzalez-Granadillo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Menesidou</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papamartzivanos</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xenakis</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romeu</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Navaroo-LIobert D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Okoh</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nifakos</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xenakis</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panaousis</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <article-title>"Automated cyber and privacy risk management toolkit"</article-title>
          .
          <source>Sensors</source>
          <volume>21</volume>
          (
          <issue>16</issue>
          ),
          <volume>549</volume>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .3390/s21165493
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Orel</surname>
            ,
            <given-names>D. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhuk</surname>
            ,
            <given-names>A. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhuk</surname>
            ,
            <given-names>E. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luganskaia</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          <article-title>A method of forming code sets for CDMA in communication, navigation and control systems</article-title>
          .
          <source>2nd Young Scientist's International Workshop on Trends in Information Processing</source>
          ,
          <year>YSIP2 2017</year>
          ; Dombai; Russian Federation;
          <fpage>16</fpage>
          -20
          <source>May 2017; CEUR Workshop Proceedings Volume</source>
          <year>1837</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>158</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Rikhtechi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rafe</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rezakhani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Secured Access</surname>
          </string-name>
          <article-title>Control in Security Information and Event Management Systems</article-title>
          .
          <source>Journal of Information Systems and Telecommunication</source>
          <volume>9</volume>
          (
          <issue>33</issue>
          ), pp.
          <fpage>67</fpage>
          -
          <lpage>78</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>González-Granadillo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>González-Zarzosa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diaz</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>"Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures"</article-title>
          .
          <source>Sensors</source>
          <volume>21</volume>
          (
          <issue>14</issue>
          ),
          <volume>4759</volume>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Aleksandr</surname>
            <given-names>Zhuk</given-names>
          </string-name>
          , Viktor Sazonov, Dmitrii Orel,
          <string-name>
            <given-names>Vladimir</given-names>
            <surname>Pashintsev</surname>
          </string-name>
          .
          <article-title>Computer Modeling of Orthogonal in the Amplified Sense Signal</article-title>
          . Atlantis Highlights in Computer Sciences, volume
          <volume>3</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>217</lpage>
          . doi:
          <volume>10</volume>
          .2991/csit-
          <fpage>19</fpage>
          .
          <year>2019</year>
          .
          <volume>37</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Aleksandr</surname>
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Zhuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>Dmitrii</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Orel</surname>
          </string-name>
          , Igor A.
          <string-name>
            <surname>Kalmykov</surname>
          </string-name>
          ,
          <string-name>
            <surname>Andrey</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Studenikin</surname>
          </string-name>
          .
          <article-title>Improved Method of Formation of an Increased Number of Binary Quasi-Orthogonal Code Sequence Systems with the Required Statistical and Correlation Characteristics. Atlantis Highlights in Computer Sciences</article-title>
          , volume
          <volume>3</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>209</fpage>
          -
          <lpage>214</lpage>
          . doi:
          <volume>10</volume>
          .2991/csit-
          <fpage>19</fpage>
          .
          <year>2019</year>
          .
          <volume>36</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Eswaran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srinivasan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Honnavalli</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise</article-title>
          .
          <source>Network Security</source>
          <year>2021</year>
          (
          <article-title>4</article-title>
          ),
          <year>2021</year>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Berdibayev</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kishchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>A concept of the architecture and creation for siem system in critical infrastructure</article-title>
          .
          <source>Studies in Systems, Decision and Control 346</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>242</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>