Method for Information Security Events Detection in a Cloud Signature Systems
https://doi.org/10.35596/1729-7648-2024-30-2-77-84
Abstract
The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of signed electronic documents, the number of incorrect authentication attempts to access the user’s personal key, the rate of comparing the hash value of the signed documents, and the rate of sending the hash value of the signed data in the signature creation device. It is recommended to base the method on the mechanisms of mathematical statistics in relation to the listed parameters. The description and results of testing the developed method, the number of false positive and false negative results of the analysis of information security events in cloud signature systems are presented. The obtained values turned out to be less than similar indicators typical for the results of analysis carried out using other existing methods. This is the main advantage of the proposed method compared to its analogues.
About the Authors
V. A. GerasimovBelarus
Gerasimov Vyacheslav Alexandrovich, Employee; Master’s Student at the Department of Information Technologies of Automated Systems
220088, Minsk, Pervomayskaya St., 26, build. 2
Tel.: +375 17 302-81-71
O. V. Boyprav
Belarus
Boyprav O. V., Cand. of Sci., Associate Professor, Associate Professor at the Information Security Department
Minsk
References
1. Herasimou V. A., Kazlouski M. A. (2024) Using a Cloud-Based Electronic Signature System for Organizing Electronic Voting. Digital Transformation. 30 (1), 52–62. http://dx.doi.org/10.35596/1729-7648-2024-30-1-52-62 (in Russian).
2. Kochin V. P., Shantsov A. V. (2022) Methodology of Creation and Structure of the Corporate Information Security Unit. Digital Transformation. 28 (3), 65–72. http://doi.org/10.35596/2522-9613-2022-28-3-65-72 (in Russian).
3. Apanasevich M. V. (2022) Development of а Methodology for Assessing the Level of Innovative Potential of an Industrial Enterprise. Digital Transformation. 28 (2), 5–13. http://doi.org/10.35596/2522-9613-2022-28-2-5-13 (in Russian).
4. Performance Evaluation of Machine Learning Algorithms for Intrusion Detection System. Cryptology ePrint Archive. Available: https://eprint.iacr.org/2023/1546 (Accessed 17 December 2023).
Review
For citations:
Gerasimov V.A., Boyprav O.V. Method for Information Security Events Detection in a Cloud Signature Systems. Digital Transformation. 2024;30(2):77-84. (In Russ.) https://doi.org/10.35596/1729-7648-2024-30-2-77-84