<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-4-0-2</article-id><article-id pub-id-type="publisher-id">3664</article-id><article-categories><subj-group subj-group-type="heading"><subject>AUTOMATION AND CONTROL</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ABOUT BEHAVIORAL ANALYTICS FOR THE SYSTEM&amp;nbsp;FOR PROTECTION AGAINST TARGETED ATTACKS&amp;nbsp;AND ITS APPLICATION FOR OPERATING SYSTEMS&amp;nbsp;OF THE ASTRA LINUX FAMILY&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ABOUT BEHAVIORAL ANALYTICS FOR THE SYSTEM&amp;nbsp;FOR PROTECTION AGAINST TARGETED ATTACKS&amp;nbsp;AND ITS APPLICATION FOR OPERATING SYSTEMS&amp;nbsp;OF THE ASTRA LINUX FAMILY&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Lazarev</surname><given-names>Sergey Alexandrovich</given-names></name><name xml:lang="en"><surname>Lazarev</surname><given-names>Sergey Alexandrovich</given-names></name></name-alternatives><email>lazarev_s@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Rubtsov</surname><given-names>Konstantin Anatolievich</given-names></name><name xml:lang="en"><surname>Rubtsov</surname><given-names>Konstantin Anatolievich</given-names></name></name-alternatives></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/4/ИТ.НР.9_4_2.pdf" /><abstract xml:lang="ru"><p>The article discusses the task of developing a behavioral analytics subsystem for a system of protection against targeted attacks and the application of its work on operating systems of the Astra Linux family. A review of possible types of targeted attacks and typical actions to be assessed when building a protection system against targeted attacks is provided. Various types of security systems and their ranking according to protection technologies are considered. It is proposed to use a multidimensional Gaussian distribution model (GMM) to analyze the behavior of objects of information interaction together with the domestic system of protection against targeted attacks AVSOFT ATHENA running the Astra Linux operating system, which analyzes network activity and analyzes the use of resources.</p></abstract><trans-abstract xml:lang="en"><p>The article discusses the task of developing a behavioral analytics subsystem for a system of protection against targeted attacks and the application of its work on operating systems of the Astra Linux family. A review of possible types of targeted attacks and typical actions to be assessed when building a protection system against targeted attacks is provided. Various types of security systems and their ranking according to protection technologies are considered. It is proposed to use a multidimensional Gaussian distribution model (GMM) to analyze the behavior of objects of information interaction together with the domestic system of protection against targeted attacks AVSOFT ATHENA running the Astra Linux operating system, which analyzes network activity and analyzes the use of resources.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>protection systems against targeted attacks</kwd><kwd>behavioral analytics</kwd><kwd>domestic operating systems</kwd><kwd>multivariate Gaussian distribution model</kwd></kwd-group><kwd-group xml:lang="en"><kwd>protection systems against targeted attacks</kwd><kwd>behavioral analytics</kwd><kwd>domestic operating systems</kwd><kwd>multivariate Gaussian distribution model</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Osipov V.Yu., Yusupov R.M. Information vandalism, crime and terrorism as modern threats to society // Tr. SPIIRAN, 8 (2009). &amp;ndash; pp. 34-45.</mixed-citation></ref><ref id="B2"><mixed-citation>Faleev M.I., Chernykh G.S. Threats to the national security of the state in the information sphere. &amp;ndash; 2014. &amp;ndash; Volume 4. &amp;ndash; No. 1(6). &amp;ndash; URL: https://iee.unn.ru/wp-content/uploads/sites/9/2018/02/2.Inf.ugrozy-vred.programmykomp. prestupleniya.pdf (access date: 10.07.2024).</mixed-citation></ref><ref id="B3"><mixed-citation>Semenenko V.A. Information security // M.: MGIU, 2011. &amp;ndash; 277 p.</mixed-citation></ref><ref id="B4"><mixed-citation>Shangin V.F. Information security and information protection // M.: DMK, 2014. &amp;ndash; 702 p.</mixed-citation></ref><ref id="B5"><mixed-citation>Five styles of advanced threat defense. &amp;ndash; Gartner Research, 2013. URL: https://www.gartner.com/en/documents/2576720 (access date: 04.07.2024).</mixed-citation></ref><ref id="B6"><mixed-citation>User and Entity Behavioral Analytics (UEBA) systems. URL: https://www.anti-malware.ru/security/user-and-entity-behavior-analytics (access date: 06.02.2024).</mixed-citation></ref><ref id="B7"><mixed-citation>How security systems analyze user behavior: pitfalls and specifics of UBA solutions. &amp;ndash; Tadviser, 2019. URL:&amp;nbsp;https://www.tadviser.ru/index.php/Статья:UBA_(User_Behavior _Analytics,_Анализ_поведения_в_сфере</mixed-citation></ref><ref id="B8"><mixed-citation>_систем_обеспечения_безопасности) (access date: 12.02.2024).</mixed-citation></ref><ref id="B9"><mixed-citation>Market overview of behavioral analysis systems &amp;ndash; User and Entity Behavioral Analytics (UBA/UEBA).&amp;nbsp;&amp;ndash; Anti-Malware, 2017. URL: https://www.anti-malware.ru/analytics/Market_Analysis/user-and-entity-behavioral-analytics-ubaueba (access date: 19.07.2024).</mixed-citation></ref><ref id="B10"><mixed-citation>Methodological document. Methodology for assessing threats to information security. &amp;ndash; M.: FSTEC of Russia, 2021. URL: https://fstec.ru/dokumenty/vse-dokumenty/spetsialnye-normativnye-dokumenty/metodicheskij-dokument-ot-5-fevralya-2021-g (access date: 03.07.2024).</mixed-citation></ref><ref id="B11"><mixed-citation>GOST R 50922-96. Data protection. Basic terms and definitions. &amp;ndash; M.: Gosstandart of Russia, 1996. URL: https://docs.cntd.ru/document/1200004674 (access date: 22.07.2024)</mixed-citation></ref><ref id="B12"><mixed-citation>GOST R ISO/IEC 27005-2010. Information technology. Methods and means of ensuring security. Information security risk management. URL: https://docs.cntd.ru/document/1200084141 (access date: 22.07.2024)</mixed-citation></ref><ref id="B13"><mixed-citation>Prokhorenkova L., Gusev G., Vorobev A., Dorogush A.V., Gulin A. CatBoost: unbiased boosting with categorical features. Yandex, Moscow, 2019.</mixed-citation></ref><ref id="B14"><mixed-citation>Siris V.A., Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications. &amp;ndash; 2006. &amp;ndash; 29.</mixed-citation></ref><ref id="B15"><mixed-citation>Ahmed T., Oreshkin B., Coates M. Machine Learning Approaches to Network Anomaly Detection. Second Workshop on Tackling Computer Systems Problems with Machine Learning Techniques. 2007, Cambridge</mixed-citation></ref><ref id="B16"><mixed-citation>Shabtai A., Kanonov U., Elovici Yu., Glezer Ch., Weiss Ya. Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 2010.</mixed-citation></ref><ref id="B17"><mixed-citation>Kou Yu., Lu Ch.-T., Sinvongwattana S., Huang Yo.-P. Survey of Fraud Detection Techniques. International Conference on Networking, 2004.</mixed-citation></ref><ref id="B18"><mixed-citation>Mishra A., Nadkarni K., Patcha A. Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 2004.</mixed-citation></ref><ref id="B19"><mixed-citation>Song Y., Salem M.B., Hershkop S. System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models // IEEE Security and Privacy Workshops. &amp;ndash; New York, USA: IEEE, 2013. &amp;ndash; P. 52-59.</mixed-citation></ref></ref-list></back></article>