RUS  ENG
Full version
JOURNALS // Russian Journal of Cybernetics // Archive

Russian Journal of Cybernetics, 2022 Volume 3, Issue 4, Pages 41–45 (Mi uk26)

Indirect monitoring of suspicious activity on computer systems

K. I. Bushmeleva, A. V. Gavrilenko, A. V. Nikiforov

Surgut State University, Surgut, Russian Federation

Abstract: This study conspires the drawbacks of the existing fraud detection tools and offers a solution: indirect monitoring of suspicious activity on computer systems. We applied the expected value, variance, and standard deviation concepts to estimate the thresholds of indirect indicators of compromise and derived a solution based on the selective mean, selective variance, and selective standard deviation. The paper also describes a sample size estimation procedure from the computer system's indirect indicator sampling rate and runtime. The thresholds of the indirect indicators, the estimated sample size, and other proposed indicators describe the normal operation of the computer system. With this set of indicators, we can define a piecewise function used to check the indirect indicators against the normal operation conditions. Consequently, the computer system can be represented as a predicate. The predicate and the set of indicators are a template describing the computer system. The resulting template and its application scenarios provide a foundation for developing the architecture of an indirect suspicious activity monitoring tool.

Keywords: methodology, monitoring, suspicious activity, computer systems, indirect indicators of compromise.

DOI: 10.51790/2712-9942-2022-3-4-05



© Steklov Math. Inst. of RAS, 2024