Architecture for detecting violations of security policies using the ABD method

Authors

  • Mónica Peña Casanova Peña Casanova Universidad de las Ciencias Informáticas, UCI http://orcid.org/0000-0003-2500-4510
  • Yohandra Echeverria Castillo Universidad de las Ciencias Informáticas
  • Bárbara Laborí de la Nuez Universidad de las Ciencias Informáticas

Abstract

Logs are highly relevant in managing computer security because the information recorded in them contributes to auditing and forensic analysis activities. Among the logs associated with safety are those generated by access to network services, specifically the Internet through a proxy. Because of the constant transformation of computer systems and the emergence of automatic tools to manage logs, it is necessary to integrate the functionalities of software architectures with the computer security requirements defined in the organization. This article analyzes the different architectural design methods to determine the structure of its components, their relationships, and the principles and guidelines that make up the architecture. In addition, it will allow the implementation of security mechanisms and functions that will be supported by mechanisms that will determine the quality of the proposed architecture. An architecture is offered for the detection of security breaches from the analysis of internet browsing logs of users, based on the ABD method (Architecture-Based Design Method) and the systems security architecture of information proposed by the SANS Institute for the design and description of the architecture components.

Downloads

Download data is not yet available.

Published

2023-05-04

How to Cite

Peña Casanova, M. P. C., Echeverria Castillo, Y., & Laborí de la Nuez , B. . (2023). Architecture for detecting violations of security policies using the ABD method. Telemática, 21(3). Retrieved from https://revistatelematica.cujae.edu.cu/index.php/tele/article/view/527

Most read articles by the same author(s)