Preview

Digital Transformation

Advanced search

Method for Information Security Events Detection in a Cloud Signature Systems

https://doi.org/10.35596/1729-7648-2024-30-2-77-84

Abstract

The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of signed electronic documents, the number of incorrect authentication attempts to access the user’s personal key, the rate of comparing the hash value of the signed documents, and the rate of sending the hash value of the signed data in the signature creation device. It is recommended to base the method on the mechanisms of mathematical statistics in relation to the listed parameters. The description and results of testing the developed method, the number of false positive and false negative results of the analysis of information security events in cloud signature systems are presented. The obtained values turned out to be less than similar indicators typical for the results of analysis carried out using other existing methods. This is the main advantage of the proposed method compared to its analogues.

About the Authors

V. A. Gerasimov
Scientific Research Institute of Technical Protection of Information; Belarusian State University of Informatics and Radioelectronics
Belarus

Gerasimov Vyacheslav Alexandrovich, Employee; Master’s Student at  the  Department  of  Information  Technologies of   Automated  Systems

220088, Minsk, Pervomayskaya St., 26, build. 2

Tel.: +375 17 302-81-71



O. V. Boyprav
Belarusian State University of Informatics and Radioelectronics
Belarus

Boyprav O. V.,   Cand.  of  Sci., Associate  Professor, Associate  Professor  at  the  Information  Security Department

Minsk



References

1. Herasimou V. A., Kazlouski M. A. (2024) Using a Cloud-Based Electronic Signature System for Organizing Electronic Voting. Digital Transformation. 30 (1), 52–62. http://dx.doi.org/10.35596/1729-7648-2024-30-1-52-62 (in Russian).

2. Kochin V. P., Shantsov A. V. (2022) Methodology of Creation and Structure of the Corporate Information Security Unit. Digital Transformation. 28 (3), 65–72. http://doi.org/10.35596/2522-9613-2022-28-3-65-72 (in Russian).

3. Apanasevich M. V. (2022) Development of а Methodology for Assessing the Level of Innovative Potential of an Industrial Enterprise. Digital Transformation. 28 (2), 5–13. http://doi.org/10.35596/2522-9613-2022-28-2-5-13 (in Russian).

4. Performance Evaluation of Machine Learning Algorithms for Intrusion Detection System. Cryptology ePrint Archive. Available: https://eprint.iacr.org/2023/1546 (Accessed 17 December 2023).


Review

For citations:


Gerasimov V.A., Boyprav O.V. Method for Information Security Events Detection in a Cloud Signature Systems. Digital Transformation. 2024;30(2):77-84. (In Russ.) https://doi.org/10.35596/1729-7648-2024-30-2-77-84

Views: 284


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2522-9613 (Print)
ISSN 2524-2822 (Online)