<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Detection of Cybersecurity Events Based on Entropy Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Andrii Bigdan</string-name>
          <email>abigdan@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Babenko</string-name>
          <email>babenko.tetiana.v@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hryhorii Hnatiienko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Baranovskyi</string-name>
          <email>oleksii.baranovskyi@bth.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Larysa</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Myrutenko</string-name>
          <email>myrutenko.lara@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Blekinge Tekniska Högskola</institution>
          ,
          <addr-line>371 79 Karlskrona</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>64/13 Volodymyrska St., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>As a rule, modern approaches to protecting against cyberattacks do not guarantee the impossibility of compromising applications and operating systems. Therefore, detection and identification of vulnerabilities, and actions to avoid or mitigate their impact on businesses and cybersecurity processes are critical for the operation of information systems and the information security management system. To identify a possible attack vector, as a rule, the following methods could be applied: either those that allow detecting abuses or that allow detecting anomalies. This paper investigates the possibility of identifying the alleged attack vector based on the entropy analysis of cybersecurity events. The research results presented in the paper allow us to determine the required width of the sliding window and confirm that such entropy analysis detects exceeding security thresholds and anomalies in the operation of operating systems and applications and, accordingly, probable attack vectors. Entropy, anomaly, event log, information security, intrusion detection, cybersecurity event ORCID: 0000-0002-2940-6085 (Andrii Bigdan); 0000-0003-1184-9483 (Tetiana Babenko); 0000-0002-0465-5018 (Hryhorii Hnatiienko); 0000-0001-5629-5205 (Oleksii Baranovskyi); 0000-0003-1686-261X (Larysa Myrutenko)</p>
      </abstract>
      <kwd-group>
        <kwd>Keywords1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>According to the World Economic Forum's report on global risks, cyber-attacks and data theft are
expected to remain among the most long-term risks that businesses will face over the next ten years
and, accordingly, enterprises of various forms of ownership need to ensure a given level of cyber
security service delivery [1]. Cyber-attacks are becoming more complex and destructive, which leads
to the disruption of information systems, including critical information infrastructure. Therefore, studies
that allow timely identification of deviations in the operation of processes that in the future may lead to
the implementation of a certain attack vector and compromise of information systems are relevant
[29]. One of the promising areas of research is utilizing indicators of entropy to assess various parameters
of information systems cybersecurity, as evidenced by a significant number of relevant scientific papers.</p>
      <p>To detect attacks, the following groups of methods are used [2]: based on storing behavior examples;
frequency; neural network; implementing finite-state machines; other special. These methods are also
divided into abuse-detecting and anomaly-detecting methods. Abuses are based on the use of existing
flaws in the information system, and an anomaly is a deviation from the normal state of the system,
such unusual activity in it may indicate certain attacking actions [3]. The advantage of anomaly
detection methods is the ability to identify new attacks without modifying or updating the model
parameters in the case when the behavior of the system during the attack is statistically different from
the system’s normal behavior [4]. Besides anomalies in the network, there are anomalies in the event
log on the hosts that can also indicate the occurrence of unauthorized activity. Anomalies in the system
operation can be indicated by the number of different records that can be analyzed using entropy
Proceedings of the 7th International Conference on Digital Technologies in Education, Science and Industry (DTESI 2022), October 20-21,</p>
      <p>2022 Copyright for this paper by its authors.
calculation. Using several methods at the same time, i.e., an integrated approach to identifying and
analyzing cybersecurity incidents, it is possible to increase the effectiveness of counteracting abuses in
the field of cybersecurity and intrusion [2].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>Entropy is “a measure of the randomness or diversity of a data-generating function. Data with full
entropy is completely random and no meaningful patterns can be found.” [10]. Entropy is a degree of
uncertainty. The chaos level in the data can be calculated using the entropy of the system [11].
According to the authors of [11–14], the availability and use of high-entropy data sources can
theoretically be crucial for ensuring cybersecurity. As a rule, the sources of entropy in information
systems are keyboard inputs, mouse movement parameters, reading data from disks, the voltage on
structural elements, temperature indicators, etc. The authors of [12,13] utilize entropy in the analysis of
encrypted and packed malware to detect malware and malware accident investigation. Malware can
easily avoid signature-based detection by using packing or encryption methods. So, packed file
detection is also important. As known, detection methods can be divided into signature-based and
entropy-based detection [13]. [11] presents the results of using entropy analysis to identify abuses in
digital marketing, namely, to determine the subject of interaction with information systems (bot or
human). The solution proposed by the authors is a JavaScript detection tag that collects hundreds of
parameters from the browser, and it provides a fairly simple way to determine the power of the central
processor on various devices (server, laptop, phone), and identifies the same kinds of bots (not new
ones). The approach proposed by the authors does not allow determining the type of interaction subject
with 100% accuracy, but, in our opinion, it is promising, in particular, for detecting the compromise of
end systems and unauthorized use of their computing resources, including for cryptocurrency mining.
The authors of [14] used entropy as a statistical indicator of applications’ operation designed to monitor
the network, in particular, to detect anomalies in network traffic. They proceeded from the fact that it
is quite difficult to estimate the entropy of data streams due to the complexity of entropy calculation.</p>
      <p>In [11], the results of research on risk assessment of security systems based on the calculation of the
Shannon entropy for calculating systemic risk are presented. According to the authors of [14], study
[15] presents the most optimal algorithm for estimating entropy and determining the size of the sliding
window, provided that the sample for research is random and corresponds to the specifics of data
distribution in the network traffic flow. Accordingly, determining the "correct" size of the sliding
window in the process of entropy calculation remains one of the problematic issues in applying entropy
indicators to analyze the security of cyber-physical systems and identify information security
anomalies. If we calculate the entropy of all sources of events in the information system, then when
logging a new security event, it is necessary to calculate the probabilities of all previously logged
message types. The method is not suitable for calculating the entropy of a source that constantly
generates new message types.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Problem statement</title>
      <p>This paper investigates the possibility of identifying the alleged attack vector based on the entropy
analysis of cybersecurity events in the operating system and application systems. Anomaly detection in
the operation of the application process/operating system was performed based on the comparison of
the reference entropy with the entropy of the application process/operating system after performing
unauthorized actions. The research was conducted in the environment Windows 10 operating system
one of the popular user systems [16].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Model implementation</title>
      <p>As known [17], the Windows event logging service uses the data stored in the "EventLog" registry
key, which, in turn, contains subkeys that store system operation logs. The main logging data of the
Windows operating system are records of applications, system processes, and security processes.
Processes of application can log events associated with them in the standard log of the corresponding
application processes, created when the corresponding program is installed. Within the framework of
this study, a detailed analysis of the structure and content of operation logs the following logs were
used: application processes, security systems, and PowerShell Operational, which stores, in particular,
information about console commands. At the same time, it was considered that most of the records in
the event logs during normal system operations are "Microsoft Windows security auditing" messages
about logging in and logging out of users, granting them rights, fetching credentials; and also taking
into account the fact that messages about security events may not be logged in case an attacker blocked
the logging of events security.</p>
      <p>Entropy values were calculated based on the PID (process ID) and PPID (parent process ID) of the
process and the event code. As known [18], by default, the Windows operating system does not log
events about the following activities: creating, modifying, or deleting files; creating processes, or
modifying the registry. So, to register these events the Sysmon service was leveraged. Sysmon, once
installed on a system, remains resident across system reboots and allows monitoring and logging of
cybersecurity events to the Windows log. Also, this tool allows us to get detailed information about the
launch of processes, network connections, and changes in the file creation time [19]. The Sysmon
service was used in the standard configuration [20]. At this stage of the research, network connections
were not analyzed, so the entries of the "NetworkConnect" type were disabled.</p>
      <p>The entropy of the event source was calculated using the Shannon formula [21]:
where letters without a stroke are the probability of the value of messages for the current window, with
a stroke – for the previous window.
where   – the number of messages of a certain type,  – the total number of messages.</p>
      <p>
        The sliding window method was used to calculate the entropy of the event log [22]. The entropy was
calculated for messages within the selected window of size  . For the first 
messages, the entropy is
calculated by the formula (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), then when new messages appear, the window is shifted by 
.
 ( ) = − ∑   log2   ,

 =1
  =
      </p>
      <p>,

 =1</p>
      <p>
        =1
The entropy change was calculated by the formula:
Substituting formula (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) into formula (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), we obtained the expression:
  =   −1 + ∆ ,
∆ =   −   −1,
∆ = − ∑   log2   + ∑  ′ log2  ′ ,
message.
where  – set of messages,  – the number of messages,   – the probability of occurrence of each
To calculate the probability of a message appearing, the following formula was used:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
      </p>
      <p>
        With this approach, elements with no changed probability in the current and previous windows will
not affect the change in entropy, therefore, it will depend only on the elements that have entered and
left the window. In Figure 1, after shifting the window, the probability of elements 1 and 3 will change,
while element 2 will remain unchanged. If we designate the previous values of the probabilities of
elements 1 and 3 as  11 and  31, and the current values as  12 and  32, then the entropy change will be
calculated by the formula:
∆ = −  12 log2  12 −  32 log2  32 +  11 log2  11 +  31 log2  31,
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
      </p>
      <p>That is, for elements with changed probability we need to subtract the entropy before the window
shift and add the entropy after the shift. To calculate the entropy of Windows event logging according
to the described algorithm, a Python program was developed. To receive messages from the event log,
the “EvtSubscribe” function [23], which is part of the Win32 API, was used.</p>
      <p>Figure 2 shows the entropy during normal system operation. Entropy values were calculated based
on the PID of the process, and for Sysmon messages - based on the event code. The size of the sliding
window was 100, which made it possible to cover the events to be logged as fully as possible.</p>
      <p>The analysis of the obtained research results showed that in the occurrence of a significant number
of cybersecurity events of the same type, the entropy value approaches zero. If the number of
cybersecurity events is greater than the size of the sliding window, the entropy value will be zero.
Therefore, the following heuristics were introduced in further studies.</p>
      <p>Heuristic E1. By examining the graph of changes in the entropy of the message source, it is possible
to identify an attack with high certainty.</p>
      <p>Heuristic E2. For complete identification, there must be several signs of the presence of an attack
vector. The prerequisites for an attack are a deep drop in the level of entropy and a large increase in the
level of entropy. But if these two features are not related, these features are not sufficient to consider
them one by one as mandatory features of entropy.</p>
      <p>Heuristic E3. The attack is accompanied by a large range of entropy reduction at the beginning of
the attack and a large increase in the entropy level at the end of the attack.</p>
      <p>Further, a heuristic will also be introduced to guarantee the capture of the attack vector. Within the
framework of this study, several options for expert determination of the window width were considered:
1. Expert survey of information systems security administrators.
2. To determine the width of the window, which is guaranteed to contain information about the
attack, several investigations were carried out, in which the beginning and end of the attack were
fixed by experts. The window width was determined based on the statistical analysis of the obtained
data. The width of the window should be considered in several aspects: when studying trends in
entropy change; when detecting anomalous behavior of the function values; for guaranteed
localization of the event, while the event consists of related messages/entries.</p>
      <p>When studying the behavior of the function that describes the change in entropy, at least several
factors were distinguished: the number of events in the window; a variety of different types of events
in the window; interval of entropy changes within the window.</p>
      <p>The attack detection window (ADW) is considered to be the number of recorded events during which
it is possible to reliably determine the signs of the beginning of an attack, the maximum difference in
entropy values, and the signs of the completion of an attack.</p>
      <p>The window for determining standard events (WDSE) is considered to be the number of recorded
events, during which it is possible to determine the beginning, reaching the minimum/maximum
entropy, and the end of the event. The width of the window in all cases was measured by the number
of recorded events. Even based on visual observations, it can be concluded that almost always
ADW&gt;WDSE.</p>
      <p>As known, determining the size of a sliding window when calculating entropy remains one of the
problematic issues in applying entropy indicators to analyze the security of cyber-physical systems and
detect cybersecurity anomalies. Determining the required width of the sliding window makes it possible
to automate the analysis of the behavior of a function that reflects the level of entropy. To ensure the
further automatic investigation of the behavior of the function that describes the value of entropy in the
system, it is necessary to investigate: identifying the behavior of the function graph during attacks;
identifying common features of attacks displayed on the graph; finding the boundaries of the beginning
and end of the attack.</p>
      <p>,  ∈  ,


=
  ,
  +


=</p>
      <p>(  + +  )</p>
      <p>,
∃ 
&gt;&gt; 
 ∈</p>
      <p>(  ),

1

∃ (
) &lt;&lt; 
 ∈
(
1
 
),</p>
      <p>An attack can be investigated by studying the behavioral trends, in particular, the time series. As
known, trends are described using linear, logarithmic, power, and other equations. Let's consider an
approach that allows us to identify a rapid change in trend behavior from the very first steps of the
emergence of a certain trend. Let a series of events be given, the sequence of which will be denoted by
indices  ∈  = {1, … ,  }. The entropy value for each event will be denoted by</p>
      <p>2</p>
      <p>
        To study the patterns of behavior of the values of series (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ), we set WDSE  , for example, in the
interval  ∈ [1,  ]. For each event  ∈  , we will determine the values of the ratio:
where  = 1, … ,  .
 &gt; 0 can be added to the denominator in formula (8):
      </p>
      <p>
        In situations where there may be zero values among the entropy values, sufficiently small values
where  = 1, … ,  .
series (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ):
      </p>
      <p>Signs of a change in the trend with a sharp decrease in entropy values are the presence within the
width window (8) among the values of the form (9) that are significantly greater than the values of the</p>
      <p>
        Signs of a change in the trend with a sharp increase in entropy values are the presence among the
values of the form (9) and those that are significantly lower than the inverse values of the series (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ):
      </p>
      <p>The presence of several values (10) or (11) among the values of the form (9) is the criteria for a
sharp change in the trend. Depending on the width of the window, it is possible to determine the trend
change at different stages.
1,17
0,83
0,86
1,17
1,20
0,71
1,17
0,67
1,13
0,73
1,38
0,89
1,80
0,83
6,00</p>
      <p>Figure 3 shows simulation results with cybersecurity event logging disabled. The average value of
entropy is 2.04961, and the variance is 2.45429, which is significantly higher than the average value of
entropy and variance obtained in the opposite case.
2,5
py2,0
o
r
tn1,5
E
1,0
0,5
0,0
6,0
5,0
y4,0
p
ro3,0
t
n
E2,0
1,0
0,0
3,5
3,0
2,5
y
p2,0
o
r
tn1,5
E
1,0
0,5
0,0
10:19
11:02
11:45
12:28
13:12
13:55
14:38
time
15:21
16:04
16:48
17:31
18:14
18:57</p>
      <p>At the next stage of the research, unauthorized actions were simulated in a system with an active
Sysmon service. As part of the implementation of this stage, numerous files were written, and many
processes were created.</p>
      <p>Figure 4 shows a graph of the entropy changes during the regular operation of the system and the
logging of cybersecurity events by the Sysmon process. The average value of entropy is 1.53181, the
minimum is 0.58508.</p>
      <p>The creation of a significant number of files or processes may indicate a local DoS (Denial of
Service) attack aimed at degrading the performance of the hardware and software system, and, as a
result, disrupting availability. Simultaneous actions with numerous files may also indicate unauthorized
actions, such as the execution of a ransomware virus. To simulate the generation of cybersecurity events
in the browser, a significant number of pages were opened, which are typically stored so that they can
be restored the next time the browser is launched. Figure 5 shows a graph of the entropy changes when
replacing descriptors for numerous files. A similar dependence was obtained for the case of creating
and executing many processes.</p>
      <p>3,0
2,5
2,0
y
p
ro1,5
t
n
E1,0
0,5
0,0
16:04</p>
      <p>Analysis of the research results showed that the average value of the entropy of the system, obtained
based on the analysis of cybersecurity events, is greater than the entropy value when security events are
not recorded. Thus, it was concluded that by comparing the average value of the entropy of the system
for a certain period with the value accepted as a reference, it is possible to detect the disabling of logging
of cybersecurity events, which may indicate, among other things, a certain phase of the implementation
of the attack vector.</p>
      <p>Then the ability was tested for immediate detection of the security events logging turned off. To
disable logging, the command "auditpol /clear" must be executed. This command is designed to remove
the security audit settings for all users and, accordingly, processes running on their behalf. Figure 6
shows the entropy values after disabling cybersecurity event logging.</p>
      <p>3,5
3,0
2,5
p2,0
y
o
r
tn1,5
E
1,0
0,5
0,0</p>
      <p>The first zero value of entropy is due to a large number of records about reading account data and
granting rights during user login. The following zero value is caused by a large number of audit policy
change records.</p>
      <p>We also studied whether the value of the entropy is affected by attacks aimed at obtaining
unauthorized access to the system via a reverse TCP connection. An attack was performed using
Metasploit on a Linux virtual machine which involves remotely connecting to the target system and
exploiting "UAC bypass" privilege escalation, which in turn would grant "System" user rights:
• "Meterpreter reverse TCP" payload [24-27] was created and uploaded to the target system.
• Once opened, the file establishes a connection to Metasploit, creating a session that provides
access to the target system.
• To obtain superuser or "System" rights, privileges were escalated using the "FodHelper UAC
bypass" exploit [28], which allows bypassing Windows user access control.</p>
      <p>The successful result of the attack is a remote connection to the target system and the execution of
privilege escalation. The attack scheme that was used in the simulation process is shown in Figure 7.</p>
      <p>Virtual
machine with</p>
      <p>Metasploit
1
2
3
4
5
6</p>
      <sec id="sec-4-1">
        <title>Apache</title>
        <p>handler
payload
Listening for
connections</p>
      </sec>
      <sec id="sec-4-2">
        <title>Uploading the "meterpreter"</title>
        <p>payload executable</p>
        <p>Establishing a
TCP connection
payload
"meterpreter" session is established</p>
      </sec>
      <sec id="sec-4-3">
        <title>Executing the “FodHelper UAC bypass” exploit</title>
      </sec>
      <sec id="sec-4-4">
        <title>Running the “getsystem” command</title>
      </sec>
      <sec id="sec-4-5">
        <title>A new session on behalf of the user “System” is established</title>
        <p>Target
Windows
system</p>
        <p>Figure 8 shows the entropy values at a sliding window size of 300 during normal system operation
and the attack execution. Average value – 1.89971, minimum – 0.09664, maximum – 3.14670.
3,5</p>
        <p>3
2,5
py 2
o
r
tn1,5
E
0,5
1
0</p>
        <p>During the attack execution, the entropy value was the highest for the entire observation period,
which is due to the occurrence of cybersecurity events such as modifying the registry and executing
commands in the console. Entropy values close to zero are caused by cybersecurity events related to
reading credentials. Figure 9 shows the deviation of the entropy values from the reference values
observed during the implementation of the attack vector.
y
p
tro 1
n
E
0,5
0
0
2500
events
500
1000
1500
2000
3000
3500
4000
4500
5000</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The analysis of the obtained results allows us to conclude that such events significantly affect the
value of the entropy of the system; accordingly, large values may indicate the execution of unauthorized
actions in the system.</p>
      <p>Thus, the proposed approaches in this work allow the detection of anomalous conditions, such as
one-time recording of a large number of files, launching a large number of processes, stopping security
event logging, gaining unauthorized remote access to the system, and privilege escalation. When
developing the attack lifecycle, the entropy value differs significantly from the average values
(observed during normal system operation), and, accordingly, this method of analyzing security event
logging allows you to detect the exceeding of defined security thresholds, which may indicate the
presence of anomalies or abuses. The proposed approach to determining the width of the sliding window
makes it possible to identify with great accuracy the presence of a deviation from the normal operation
of the system and to determine the development trends of incomprehensible events or processes. These
solutions can be integrated into intrusion detection systems or other security controls.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Reference</title>
      <p>[8] O. Panasko, S. Burmistrov, Praktychni aspekty upravlinnia intsydentamy informatsiinoi bezpeky.</p>
      <p>Hraal nauky (Ukrainian) 5 (2021) 164-166. URL:
https://ojs.ukrlogos.in.ua/index.php/grail-ofscience/article/download/13105/12042.
[9] T. Radivilova, Vyiavlennia anomalii v telekomunikatsiinomu trafiku statystychnymy metodamy,
Kiberbezpeka: osvita, nauka, tekhnika (Ukrainian) 11.3 (2021) 183-194. URL:
https://doi.org/10.28925/2663-4023.2021.11.183194.
[10] T. W. Edgar, D. O. Manz, Research Methods for Cyber Security, Syngress, Cambridge, 49, 2017.
[11] A. Subasi, Practical Machine Learning for Data Analysis Using Python, Academic Press, 78, 2020.</p>
      <p>URL: https://doi.org/10.1016/C2019-0-03019-1.
[12] R. Lyda, J. Hamrock, Using Entropy Analysis to Find Encrypted and Packed Malware, IEEE</p>
      <p>Security and Privacy Magazine 5.2 (2017) 40-45. URL: https://doi.org/10.1109/MSP.2007.48.
[13] S.-W. Han, S. Lee, Packed PE File Detection for Malware Forensics, The KIPS Transactions Part</p>
      <p>C 16C.5 (2009). URL: https://doi.org/10.3745/KIPSTC.2009.16C.5.555.
[14] Y. Liu, Y. Guan, Distributed Network and System Monitoring for Securing Cyber-Physical
Infrastructure, Handbook on Securing Cyber-Physical Critical Infrastructure, 2012, 455-479.</p>
      <p>URL: http://dx.doi.org/10.1016/B978-0-12-415815-3.00018-2.
[15] A. Chakrabarti, G. Cormode, A. McGregor, A near-optimal algorithm for computing the entropy
of a stream, in: Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete algorithms,
SODA 07, 2007, pp. 328-335.
[16] A. V. Ilienko, S. S. Ilienko, T. M. Kulish, Perspektyvni metody zakhystu operatsiinoi systemy
Windows, Kiberbezpeka: osvita, nauka, tekhnika (Ukrainian) 4 (2020) 124-134. URL:
https://doi.org/10.28925/2663-4023.2020.8.124134.
[17] Eventlog Key - Win32 apps. Developer tools, technical documentation, and coding examples.</p>
      <p>Microsoft Docs, 20 August 2021. URL:
https://docs.microsoft.com/ukua/windows/win32/eventlog/eventlog-key.
[18] A. S. Tanenbaum, H. Bos, Modern Operating Systems, 4th. ed, Pearson Education, 2015.
[19] M. Russinovich, T. Garnier, Sysmon - Windows Sysinternals. Developer tools, technical
documentation and coding examples, Microsoft Docs, 11 May 2022. URL:
https://docs.microsoft.com/uk-ua/sysinternals/downloads/sysmon.
[20] SwiftOnSecurity. Sysmon configuration file template with default high-quality event tracing.</p>
      <p>GitHub, 17 October 2021. URL: https://github.com/SwiftOnSecurity/sysmon-config.
[21] Y. P. Zhurakovskyi, V. P. Poltorak, Teoriia informatsii ta koduvannia: Pidruchnyk, Vyshcha shk
(Ukrainian) 32 (2001).
[22] O. Gudkov, Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection.</p>
      <p>IT Security for the Next Generation, International Round, Delft University of Technology, May
2012.
[23] EvtSubscribe function (winevt.h) - Win32 apps. Developer tools, technical documentation and
coding examples. Microsoft Docs, 13 October 2021. URL:
https://docs.microsoft.com/enus/windows/win32/api/winevt/nf-winevt-evtsubscribe.
[24] Metasploit-Framework. Kali Linux Tools. Kali Linux, 05 August 2022. URL:
https://www.kali.org/tools/metasploit-framework/.
[25] Working with payloads. Metasploit documentation. Rapid7 Docs, July 2022. URL:
https://docs.rapid7.com/metasploit/working-with-payloads.
[26] About the Metasploit meterpreter. Offensive security. Infosec Training &amp; Penetration Testing.</p>
      <p>Offensive Security, 02 November 2019. URL:
https://www.offensive-security.com/metasploitunleashed/about-meterpreter/.
[27] Meterpreter getsystem. Metasploit Documentation. Rapid7 Docs, July 2022. URL:
https://docs.rapid7.com/metasploit/meterpreter-getsystem/.
[28] Windows UAC protection bypass (via fodhelper registry key). Rapid7 Docs, 30 May 2018. URL:
https://www.rapid7.com/db/modules/exploit/windows/local/bypassuac_fodhelper/.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] The Global Risks Report</source>
          <year>2022</year>
          , 17th Edition. World Economic Forum,
          <fpage>25</fpage>
          -
          <lpage>26</lpage>
          ,
          <issue>11</issue>
          <year>January 2022</year>
          . URL: https://www3.weforum.org/docs/WEF_The_
          <source>Global_Risks_Report_2022.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Kolodchak</surname>
          </string-name>
          ,
          <article-title>Suchasni metody vyiavlennia anomalii v systemakh vyiavlennia vtorhnen, Visnyk Natsionalnoho un-t Lvivska politekhnika, Kompiuterni systemy ta merezhi (Ukrainian) 745 (</article-title>
          <year>2012</year>
          )
          <fpage>98</fpage>
          -
          <lpage>104</lpage>
          . URL: https://science.lpnu.ua/sites/default/files/journalpaper/2017/nov/6726/16-98-104.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Palko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Myrutenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bigdan</surname>
          </string-name>
          ,
          <article-title>Model of Information Security Critical Incident Risk Assessment</article-title>
          ,
          <source>in: Proceedings of the IEEE International Conference on Problems of Infocommunications Science and Technology, PIC S and T,</source>
          <year>2020</year>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>161</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Palko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bigdan</surname>
          </string-name>
          ,
          <article-title>Determining key risks for modern distributed information systems</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <volume>3018</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kazmirchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Korchenko</surname>
          </string-name>
          , T. Parashchuk,
          <article-title>Analiz system vyiavlennia vtorhnen</article-title>
          ,
          <source>Zakhyst informatsii (Ukrainian) 20.4</source>
          (
          <year>2018</year>
          )
          <fpage>259</fpage>
          -
          <lpage>276</lpage>
          . URL: https://doi.org/10.18372/
          <fpage>2410</fpage>
          -
          <lpage>7840</lpage>
          .
          <fpage>20</fpage>
          .13425.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Bierkovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Bezsonov</surname>
          </string-name>
          ,
          <article-title>Analiz ta klasyfikatsiia metodiv vyiavlennia vtorhnen v informatsiinu system, Systemy upravlinnia, navihatsii ta zviazku (Ukrainian) 3 (</article-title>
          <year>2017</year>
          )
          <fpage>7</fpage>
          -
          <lpage>62</lpage>
          . URL: http://nbuv.gov.ua/UJRN/suntz_2017_
          <volume>3</volume>
          _
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Ruban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. O.</given-names>
            <surname>Martovytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Partyka</surname>
          </string-name>
          ,
          <article-title>Klasyfikatsiia metodiv vyiavlennia anomalii v informatsiinykh systemakh. Systemy ozbroiennia i viiskova tekhnika (Ukrainian) 3 (</article-title>
          <year>2016</year>
          )
          <fpage>100</fpage>
          -
          <lpage>105</lpage>
          . URL: http://nbuv.gov.ua/UJRN/soivt_2016_
          <volume>3</volume>
          _
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>