<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Information Security Monitoring at National, Regional for and Corporate Levels</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Information Technologies</institution>
          ,
          <addr-line>B.Vahabzade str., 9A, Baku</addr-line>
          ,
          <country>Azerbaijan Republic</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>1</volume>
      <fpage>1</fpage>
      <lpage>12</lpage>
      <abstract>
        <p>In the conditions where cyber threats are widespread and unavoidable, it is necessary to promptly detect cyber threats and quickly react to possible incidents in order to ensure the information security of the national information environment. In the article, the need for continuous monitoring of computer networks to ensure information security is highlighted. The main components of the process of ensuring information security at the national, regional and corporate levels are studied. Sources of data for information security methods of collecting data from various sources are investigated, categories of Information Security Monitoring Systems (ISMS) are studied. The carriers of social dangers are always people or social groups. The peculiarity of social threats is that they always threaten a large number of people, even if they are directed specifically against one person.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>and</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Currently, about 5 billion users use the Internet, the largest and most complex information network
in the world. The Internet network provides users with numerous information and communication
technologies, information sources, e-commerce and entertainment sites [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Every year, the bulk of
the community integrates into the internet, and the number of users increases dramatically. As the
internet environment is rich in content for all ages, increasingly, people are becoming dependent on
social networks, mobile phones, telecommunications, games and various cloud services. The increase
in the number of the Internet users leads to an increase in the volume of information exchange, the
creation of "Big Data", as well as the proliferation of harmful information and actions that can
damage the psychological health and property of people. Factors such as the abundance of
information, the age limit and religious-ethnic composition of users, the possibility of influencing the
psychology of the masses, and others make cyberspace attractive for criminals [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Although the
world countries pay great attention to the information security issues, the number of computer attacks
increases every year, and new attack tools and methods appear. Hackers can carry out large-scale
attacks anywhere in the world for various reasons. The number of cyber crimes such as cyber
terrorism, identity theft, fraud is increasing rapidly. The number of cyber threats targeting the vital
interests of the individual, society and the state is increasing. The opportunities brought by the
Internet in some cases allow cyber threats to go beyond the individual or local level and become
regional, national, continental or global in nature. At this time, the social security problems become
urgent. Social threats are unfavorable processes and events occurring among people in society, which
threaten people's life and health, their property, rights and legal interests.
      </p>
      <p>2022 Copyright for this paper by its authors.</p>
      <p>The carriers of social dangers are always people or social groups. The peculiarity of social threats
is that they always threaten a large number of people, even if they are directed specifically against one
person. In order to prevent and eliminate such threats, by analyzing the parameters characterizing the
social threat, the scale of the threat (local, regional, national, transnational), the area it covers (village,
district, settlement, city, country) and the age group (0-6, 7-17, 18-30, 31-55, 56-61 and above), we
should determine the duration of the danger, whether it is intentional or accidental, and so on.</p>
      <p>
        Various security tools and methods are used to ensure information security in cyberspace, to
detect and assess security incidents. Monitoring of information security in cyberspace is carried out in
order to reliably organize the work of computer networks (CN), protect the completeness,
confidentiality and accessibility of data. Information security monitoring (ISM) can serve to detect
social threats, determine the nature of threats, attack targets, assess the state of information security
within an organization, region, country, etc., as well as prevent cyber attacks in the future [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>This research, the main components of the process of ensuring information security at the national,
regional and corporate levels, and proposes a hierarchical structure for evaluating the data analyzed
through ISMS. The sources and data collection methods on which ISMS are based are also
considered. In order to provide support to decision-makers and improve analytical activity in this
field, it proposes to develop a decision support system in ISMS.</p>
    </sec>
    <sec id="sec-3">
      <title>2. The main components of the process of ensuring information security at the national, regional and corporate levels</title>
      <p>
        Information security has become one of the main components of national security in cyberspace in
conditions of increasing potential events, conditions, actions or processes aimed at harming the
interests of the individual, society and the state [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. National security is a set of officially adopted
views to ensure the protection of the individual, society and the state from external and internal
threats, threats of a political, economic, social, military, environmental and other nature. Ensuring
national security is considered the duty of the government. The problems of monitoring the
information space at the national, regional and corporate levels for the protection of the material and
moral values of society from external and internal threats, the detection and prevention of social
threats are becoming relevant. Approaches to information security are changing in a situation where
various fields of activity are digitized, threats and attacks against digital systems are increasing.
Security centers are created on the basis of monitoring systems, changes related to cyber security are
made in the legislative framework, new laws and strategies are developed. Figure 1 shows the
sequence of the ensuring process of information security at the national, regional and corporate levels
(Figure 1).
      </p>
      <p>First of all, to monitor the national information space and determine the state of information
security is necessary. The area covered by the danger, the scale of the danger, the targets of the attack,
the time of continuation, the origin of the danger (intentional or accidental) and so on should be
determined. For this purpose, the process of monitoring the information security of computer
networks, collecting and analyzing information about security incidents in cyberspace is carried out.
ISM is the process of collecting, systematizing and analyzing information about the state of the
network and the behavior of users.</p>
      <p>
        The purpose of this process is to identify information security breaches and gaps in the computer
systems of the protected facility. ISMS automate the process of collecting and analyzing information
about security incidents from various sources. Modern ISMS work in continuous, automatic mode,
allow timely detection of threats, preparation of appropriate notifications and timely prevention of
security risks (Figure 2) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>The main components of ISMS include software-technical, documentation and personnel
part:
• The software-technical part includes tools for monitoring security events of the SIEM
(Security Information and Event Management) class. Data collection from various sources is
carried out through monitoring agents. Such sources can be information security tools (antivirus
systems, security scanners, etc.), system and application software, CERT, etc. Information about
security events is collected in the event server and ensures centralized processing of the system.
Data processing is carried out in accordance with the rules established by the security
administrator. The results of system activity and data received from agents are stored in the
database. The system management console allows you to review the results of the system's work in
real time and manage its parameters.
• The documentation part of ISMS includes a set of documents that describe the basic processes
involved in identifying and responding to security incidents.
• The personnel part envisages employees responsible for working with ISMS.</p>
      <sec id="sec-3-1">
        <title>Security</title>
        <p>administrator</p>
      </sec>
      <sec id="sec-3-2">
        <title>Information security monitoring server</title>
      </sec>
      <sec id="sec-3-3">
        <title>Security incidents</title>
        <p>Data transmission network
Monitoring agent
Monitoring agent
Monitoring agent</p>
      </sec>
      <sec id="sec-3-4">
        <title>Communication equipment</title>
      </sec>
      <sec id="sec-3-5">
        <title>Servers</title>
      </sec>
      <sec id="sec-3-6">
        <title>Defense tools</title>
        <p>Monitoring agent</p>
      </sec>
      <sec id="sec-3-7">
        <title>CERT</title>
        <p>The next step for ensuring the security of the national information environment is the evaluation of
the results obtained through ISMS at different levels (corporate, regional, national) within a country.
Evaluation can be organized hierarchically, starting from the corporate level to regional and national
levels (Figure 3). After evaluating the analyzed information within the framework of individual
enterprise, organization, administration, the situation of information security within the framework of
a village, settlement, district, city, and finally the region is evaluated accordingly. In the last stage, on
the bases of the regional level, we can assess the level of information security at the level of a
country.</p>
        <p>Cluster analysis methods, expert assessment methods, multi-criteria assessment, multidimensional
assessment methods can be used to evaluate the results of information security monitoring.
Assessment of the results of information security monitoring allows you to quickly analyze the
current situation in the field of information security, detect signs of information security incidents.
region
city
district
village</p>
      </sec>
      <sec id="sec-3-8">
        <title>Country</title>
      </sec>
      <sec id="sec-3-9">
        <title>NATIONAL LEVEL</title>
        <p>region
city
district
village</p>
        <p>REGIONAL LEVEL</p>
        <p>Based on the results of monitoring, we can assess the current state of information security at the
level of a country and make predictions about its future state and give recommendations to
decisionmakers.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Analysis of sources on which ISMS are based</title>
      <p>
        Information security is monitored by the process of checking all security incidents obtained from
various sources. The source of incidents can be CERTs, antivirus systems located in the infrastructure
of various organizations, operating system logs, scanners for security analysis of information
infrastructure, network equipment, and other sources (Figure 4) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        CERT (Computer Emergency Response Team) is a group of computer security experts involved in
collecting, monitoring, classifying, and neutralizing incident information. The main purpose of CERT
is to analyze incidents sent by users (phishing, social engineering), suspicious files, viruses, as well as
network traffic sessions, to respond quickly to new threats, inform users and develop security
recommendations [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>СERT</p>
      <p>Network
equipment</p>
      <p>
        The first CERT group was formed at Carnegie Mellon University in 1988 after thousands of
servers were infected with the Morris worm. The group currently has the status of a CERT
coordination center and licenses and coordinates the activities of information security incident
response centers around the world. National, regional or industrial CERTs can be established in
coordination with Carnegie Mellon University. Currently, many companies around the world also
create CERTs, but not all of them receive official status [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In total, there exist currently about 250
CERT teams in various countries around the world. Analysis of data collected in CERTs can allow for
the timely detection and prevention of cyber threats and the assessment of the level of information
security within a country to ensure the social security of society.
      </p>
      <p>Today, computer viruses and malware are a real source of danger for any enterprise, organization,
and others that use information technology in their activities. The widespread use of these global
networks can be explained by the insufficient attention to network security issues in a large number of
local computer networks. Computers are increasingly infected with malicious software when working
with Internet resources or through email messages. The target of viruses can be any user's computer,
global or local computer networks. The damage can lead to the failure of the computer and all
computer networks in general, the violation of data integrity, accessibility, and confidentiality.</p>
      <p>
        Every year, the creation of new types of viruses that can bypass traditional protection methods
raises the issue of protecting computer networks from malware. An important way to fight computer
viruses is to prevent them in time. Timely detection of infected files or disks, and complete
destruction of detected viruses on each computer help to prevent the spread of the virus epidemic to
other computers and computer networks. Antivirus software is a special program that is used to detect
computer viruses, as well as undesirable (considered harmful) programs, recover infected (modified)
files by these programs, and prevent infection (modification) of files or operating systems with
malicious code. Network antivirus programs carry out monitoring of servers, network computers, and
installed software, allow you to monitor e-mail, data of allowed network protocols (HTTP, FTP), file
servers, external carriers (floppy disks, flashcards, CDs, DVDs), as well as all channels through which
computer viruses and malicious programs can penetrate [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The essence of the antivirus monitoring method is that the antivirus program is constantly in the
computer's memory and monitors all suspicious actions performed by other programs. Antivirus
monitoring allows you to check all running programs, created, opened, and saved documents,
programs, and files received via the Internet. The antivirus monitor will inform the user if any
program tries to perform potentially dangerous actions.</p>
      <p>
        Log files found in the logs of operating systems or web servers contain system information about
the operation of the server or computer and information about the user behavior. The purpose of log
files is to record all operations performed on the webserver or computer for monitoring by the
administrator. This information is of great importance in the event of security incidents. Regular
monitoring of logs and analysis of log files allows to identify errors in the operation of a particular
system or site, diagnose malicious activity, identify threats, threats, collect information about user
behavior, as well as evaluate according to various criteria [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Weaknesses in information systems, infrastructure nodes, and elements of the information security
complex create great problems for information security. To identify vulnerabilities, companies need to
analyze the security of their information infrastructure. As a rule, vulnerability scanners are used for
security analysis from automatic instruments operating in static and dynamic scanning modes. At
present, this class of tools allows you to solve a wide range of problems. A vulnerability scanner is a
program that identifies and creates a registry of all systems connected to the network (servers,
computers, virtual machines, containers, firewalls, switches, and printers). The program allows you to
identify each device, the operating system and installed programs on this device, as well as other
attributes such as open ports and user accounts and passwords, as well as track other elements that
pose a potential threat to information security [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Faults in the hardware or software of the CN, slowing down or stopping the operation of important
network services can lead to unpleasant consequences. A modern network equipment monitoring
system is a complex information system that monitors servers, hosting, processes, and services on
users' computers, as well as files, folders, and databases. It consists of the following components.
• network device indicators (CPU, temperature, device availability, packet loss, interface
errors, available throughput, etc.) are critical parameters that need to be monitored;
• monitoring – the process of collecting, assembling, and analyzing indicators to improve the
understanding of the characteristics and behavior of the components of the system. The data
collected as a result of the monitoring can be visualized and drawn in the form of various graphs,
diagrams, and histograms.
• the warning system is an important component that takes action when changes occur in the
values of the observed indicators. When the critical value is reached, the metric value can try to
solve the problem itself according to the developed scenario or send an alert to the responsible
person using SMS, email, and so on.</p>
      <p>
        The network equipment monitoring system allows receiving timely information about the fault,
controlling the situation, to eliminate the fault with minimal time loss [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. During ISM, the
monitoring information can be collected from various sources using both automated and
nonautomated tools. Primary data collection is used to analyze the state of information security and
conduct various types of assessments. The following methods can be applied to obtain primary data
during the use of automated monitoring tools (Figure 5):
• agent-based data collection (agents for security incident monitoring);
• data collection without agent;
• questionnaires (forms);
• software.
      </p>
      <sec id="sec-4-1">
        <title>Agent based</title>
      </sec>
      <sec id="sec-4-2">
        <title>Without agent</title>
        <p>A security monitoring agent is software installed on information infrastructure components and
information system nodes to gather the necessary information directly from a source. Monitoring
agents can be used to collect information on security incidents, software effectiveness, user behavior,
and other information.</p>
        <p>The method of collecting data without agents involves the receipt of data from sources over the
network without installing additional software for monitoring. Non-Agent data collection methods
include:
• Read data directly from security log files or databases;
• Receiving information from sources using standard protocols for transmitting information
about security events;
• Data collection by connecting to the program interface or the web service of the data source.</p>
        <p>By the usage of agent-free data collection method, data collection can be carried out about
security incidents, the operability of the software, and other information that the source can provide.</p>
        <p>The collection of data on security incidents using questionnaires (forms) is carried out by filling
in special electronic (paper) forms and then transferring them to information security monitoring
personnel.</p>
        <p>
          Data collection method using software includes information management systems on
information security threats, security control systems, inventory means of software and technical
means, software and information protection tools, and so on [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Categories of ISMS</title>
      <p>All currently established and used ISMS can fall into one of the following categories.</p>
      <p>
        SIEM is a system that allows analyzing data obtained from various sources in real-time. SIEM
is a combination of Information Security Management and security event management systems into a
single security management system. The results of the analysis carried out by SIEM are presented in a
single interface, accessible to security analysts. This also facilitates the study of the corresponding
characteristic features of security events and allows analyzing the events that occur in order to
respond to security threats in real-time (Figure 6). Sources of information for SIEM systems can be
antivirus programs, authorization and authentication systems, network screens, security walls, logs of
network equipment, servers and workstations, intrusion detection and prevention systems (IDS / IPS),
information leakage prevention systems (DLP) and other programs [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>Log Collection</p>
      <p>Log Analysis
Event Correlation</p>
      <p>Log Forensics</p>
      <p>IT Compliance
App Log Monitoring
Object Access Auditing</p>
      <p>SIEM</p>
      <p>Real-Time
User Activity Monitoring</p>
      <p>Dashboards</p>
      <p>Reporting
File Integrity Monitoring</p>
      <p>Sistem &amp; Device Log</p>
      <p>Monitoring
Log Retention</p>
      <p>
        UBA (User Behavioral Analytics) – systems that collect and analyze all behaviors, including
managed data, used to manage fraudulent activities at the expense of financial threats with internal
threats [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        UEBA (User and Entity Behavioral Analytics) – systems aimed at searching for and detecting
anomalies in the behavior of users and various systems. A class of behavioral analysis systems has
been established because companies use many different data collection systems to ensure information
security. At the same time, employees are not always able to review all the information received and
respond to potential events in a timely manner. UEBA systems increase efficiency by compiling
profiles and ensuring timely response to possible data leaks [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Employee monitoring and time recording systems are systems that allow the organization to
analyze the activities of employees and monitor the use of working time in the workplace, as well as
control business processes, solve several tasks related to confidential information leaks, and further
investigate of incidents [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Different types of attack detection and detection systems are aimed at improving the overall
protection of the corporate network [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>5. The architecture of the decision support system in ISMS</title>
      <p>To ensure the efficiency of decision-making is necessary in order to quickly respond to security
breaches and incidents in information security monitoring systems. In order to support
decisionmakers and improve analytical activities in this area, the development of a system that supports
decision-making in information security monitoring systems is proposed.</p>
      <p>
        A decision support system is a computer system that allows decision-makers to make more
reasonable and correct decisions based on analytical recommendations provided to them. The decision
support system can be created on the basis of various technologies, including OLAP (Online
Analytical Processing) and Data Warehouse (DW) (Figure 7) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The OLAP concept was described
in 1993 by Edgar Codd, a well-known database researcher and author of the relational data model.
OLAP is a key component of the database. This is a technology that collects, stores, and analyzes
multidimensional data. Performs multidimensional, operational, and analytical data processing in
realtime. For the preparation of reports, the construction of forecast scenarios, and statistical calculations
based on large information systems with a complex structure are intended [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Through OLAP
technology, the original data is converted into information that can be used for decision-making. We
can visualize the results of the analysis and present the data in the form of graphs.
      </p>
      <p>A warehouse is a place where all analytical information is collected for decision-making. ETL
(Extract, Transform, Load) is a three-step process called extraction, conversion, and loading that
collects data from multiple sources in a single parent repository.</p>
      <p>
        • Extraction - extraction of data from external sources in an understandable format;
• Transformation - the conversion of primary data into suitable structures for the establishment
of an analytical system;
• Loading - uploading data to the warehouse. ETL processing is usually done by software, but
can also be done manually by system operators. Unnecessary data is cleaned up on the basis of
statistical or expert methods [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>Figure 7 presents the architectural-technological model of the decision support system for
ISMS.</p>
      <p>At the first level, data sources are identified for ISM. The source of the data can be CERTs
created within an organization, a region, a country, network antiviruses, OS logs, security scanners,
network equipment, and so on.</p>
      <p>At the second level, the process of collecting primary data from various sources should be
carried out for the ISM system. Data can be collected from sources within an organization, a region,
or a country. Data collection can be done with agent programs, without agents, questionnaires (paper
or electronic), or software. To ensure the high quality of the data before it falls into a single Database,
this may be necessary to clean it and delete unnecessary data. Therefore, in the intermediate stage,
during the transition to the third level, the data enters the field of data purification, and the ETL
process is carried out as an intermediate stage.</p>
      <p>Depending on the issue set at the third level, data on security incidents collected from sources
within an organization, region, or country by means of data collection methods (one or some of them
may be) is collected in the form of a separate database (DB) in one DW. Based on the data collected
in each DB, reports are prepared for analysis using OLAP technology.</p>
      <p>On the fourth level, reports prepared for analysis on the basis of a separate database are
collected in DW. OLAP technology prepares reports for analysis by decision-makers on surveys sent
to the data warehouse.</p>
      <p>Analysis of security incidents collected from different sources within one organization, one
region, or one country allow to determine and assess the state of information security within an
organization, one region, or one country, and to identify the sources of threats.</p>
      <p>Inquiry, report, analysis</p>
      <p>OLAP</p>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusion and Future Scope</title>
      <p>The rapid development of the global Internet and ICT, and the impact on all areas of human
activity, raises the information security problems. In the article, the main components of the process
of ensuring information security at the national, regional and corporate levels were studied. ISMS
were analyzed for the purpose of prompt detection of cyber threats and quick response to possible
incidents. A hierarchical structure was proposed to evaluate the results of information security
monitoring. Sources of primary data for İSMS were investigated, and categories of İSMS were
analyzed. As a result of the analysis, to ensure the speed of decision-making for rapid response to
security breaches and incidents was determined. For this purpose, the architectural-technological
model of the decision support system based on OLAP technologies and database was proposed to
support decision-makers.</p>
      <p>Visualization of
analysis results</p>
      <sec id="sec-7-1">
        <title>Decision-makers</title>
        <p>Data Warehouse
Data processing and storage
Inquiry, report, analysis
Inquiry, report, analysis
OLAP
DB1
OLAP
DB2
...</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Special</surname>
            <given-names>report - DIGITAL</given-names>
          </string-name>
          <year>2021</year>
          , URL: https://wearesocial.com/uk/blog/2021/01/digital-2021-uk/
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.S.</given-names>
            <surname>Mahmudova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.Q.</given-names>
            <surname>Dashdamirova Analysis</surname>
          </string-name>
          Of Information Security Problems In The Information Society Environment, Problems of Information Society, №
          <volume>2</volume>
          , 2021 pp.
          <fpage>83</fpage>
          -
          <lpage>94</lpage>
          . DOI :
          <volume>10</volume>
          .25045/jpis.v12.
          <year>i2</year>
          .
          <fpage>06</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Дашдамирова</surname>
            <given-names>К. Г.</given-names>
          </string-name>
          <article-title>Система поддержки принятия решений в области мониторинга информационной безопасности / XXI Международная научно-техническая конференция "Развитие информатизации и государственной системы научно-технической информации" (РИНТИ-</article-title>
          <year>2022</year>
          ), Минск, Беларусь,
          <year>2022</year>
          , с.
          <fpage>95</fpage>
          -
          <lpage>99</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.M.</given-names>
            <surname>Alguliyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>İmamverdiyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sh</surname>
          </string-name>
          .
          <string-name>
            <surname>Mahmudov</surname>
          </string-name>
          .
          <article-title>Information security as a national security component</article-title>
          ,
          <source>Problems of Information Society</source>
          ,
          <year>2020</year>
          , №
          <volume>1</volume>
          , p.
          <fpage>3</fpage>
          -
          <lpage>25</lpage>
          . DOI :
          <volume>10</volume>
          .25045/jpis.v11.
          <year>i1</year>
          .
          <fpage>01</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] В. Сердюк, HP ArcSight - эффективный инструмент для мониторинга событий ИБ "InformationSecurity</article-title>
          .
          <source>Информационная безопасность" №1</source>
          ,
          <year>2013</year>
          , c.
          <fpage>32</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Littlewort</surname>
          </string-name>
          et al.
          <article-title>The computer expression recognition toolbox (CERT)</article-title>
          .
          <source>IEEE International Conference on Automatic Face &amp;amp; Gesture Recognition (FG)</source>
          .
          <source>IEEE</source>
          .
          <year>2011</year>
          , P.
          <fpage>298</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Software</given-names>
            <surname>Engineering</surname>
          </string-name>
          <article-title>Institute</article-title>
          . URL: https://www.sei.cmu.edu/about/divisions/cert/index.cfm
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y. K.</given-names>
            <surname>Yazov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Solovyov</surname>
          </string-name>
          .
          <article-title>Protection of information in information systems from unauthorized access</article-title>
          .
          <source>Kvarta</source>
          .
          <year>2015</year>
          , pp.
          <fpage>357</fpage>
          -
          <lpage>440</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Barringer</surname>
          </string-name>
          et al.
          <article-title>Formal analysis of log files //Journal of aerospace computing, information, and communication</article-title>
          .
          <source>2010. Т. 7. №. 11</source>
          . pp.
          <fpage>365</fpage>
          -
          <lpage>390</lpage>
          . doi:
          <volume>10</volume>
          .2514/1.49356
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>H.</given-names>
            <surname>Holm</surname>
          </string-name>
          .
          <article-title>Performance of automated network vulnerability scanning at remediating security issues</article-title>
          .
          <source>Computers &amp;amp; Security. Т. 3. No. 2</source>
          .
          <year>2012</year>
          , pp.
          <fpage>164</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>H. M. Cortes</surname>
            ,
            <given-names>P. E.</given-names>
          </string-name>
          <string-name>
            <surname>Santos</surname>
            ,
            <given-names>J. I. da Silva</given-names>
          </string-name>
          <string-name>
            <surname>Filho</surname>
          </string-name>
          .
          <article-title>Monitoring electrical systems data-network equipment by means of Fuzzy and Paraconsistent Annotated Logic //Expert Systems with Applications</article-title>
          .
          <year>2022</year>
          . Т.
          <volume>187</volume>
          . pp.
          <volume>115865</volume>
          . doi.org/10.1016/j.eswa.
          <year>2021</year>
          .115865
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Lethbridge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Sim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Singer</surname>
          </string-name>
          <article-title>Studying software engineers: Data collection techniques for software field studies //Empirical software engineering</article-title>
          .
          <source>2005.Т. 10. №. 3</source>
          . pp.
          <fpage>311</fpage>
          -
          <lpage>341</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>H. Karlzen</surname>
          </string-name>
          <article-title>An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management</article-title>
          and Analysis :
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bernaschina</surname>
          </string-name>
          et al.
          <article-title>A big data analysis framework for model-based web user behavior analytics</article-title>
          //International Conference on Web Engineering. Springer, Cham,
          <year>2017</year>
          . pp.
          <fpage>98</fpage>
          -
          <lpage>114</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shashanka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Shen</surname>
          </string-name>
          and
          <string-name>
            <surname>J. Wang,</surname>
          </string-name>
          <article-title>User and entity behavior analytics for enterprise security</article-title>
          ,
          <source>2016 IEEE International Conference on Big Data (Big Data)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1867</fpage>
          -
          <lpage>1874</lpage>
          , doi: 10.1109/BigData.
          <year>2016</year>
          .
          <volume>7840805</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kufel</surname>
          </string-name>
          .
          <article-title>Security event monitoring in a distributed systems environment</article-title>
          .
          <source>IEEE security &amp;amp; privacy. Т. 11. No. 1</source>
          .
          <year>2012</year>
          , P.
          <fpage>36</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>E. F.</given-names>
            <surname>Codd Providing Olap</surname>
          </string-name>
          .
          <article-title>On-line Analytical Processing to User-Analists: An IT Mandate</article-title>
          . Associates,
          <year>1993</year>
          . Т.
          <volume>19</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J.</given-names>
            <surname>Krzysztof</surname>
          </string-name>
          .
          <article-title>Data Mining: A Knowledge Discovery Approach</article-title>
          . Springer.
          <year>2007</year>
          , pp.
          <fpage>123</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Nabibayova</surname>
          </string-name>
          .
          <article-title>About an application of OLAP-technology in decision making support systems</article-title>
          .
          <source>5th International Conference on Application of Information and Communication Technologies (AICT)</source>
          .
          <year>2011</year>
          , IEEE. pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>