The main topic of the article is the analysis of user actions in a computer system and the development of a monitoring system for anomalous user actions in the information environment. To develop the system, the mathematical apparatus of fuzzy logic was used. The main advantage of information environment monitoring systems based on the theory of fuzzy sets is the ability to take into account most of the development scenarios while describing schemes for analysing flows of the information environment, as well as to track a large number of computer parameters. In the course of the study, it was revealed that the actions of intruders differ from the behaviour of ordinary users. As a result, the authors propose a developed system for monitoring anomalous user actions in the information environment, which is based on the analysis of event logs. A system operation requires an accumulation of information (audit files, data on login time and session duration, data on file deletion, etc.), on the basis of which a standard (template) of normal user behaviour is created. Then, the user’s behaviour is compared with the standard, and when anomalies are detected, the system signals deviations. This algorithm makes it possible to track a large number of user parameters to determine unauthorised access.
The article is devoted to the analysis of user actions in a computer system and the development of a system for monitoring abnormal user actions in the information environment. We used the mathematical apparatus of fuzzy logic for system development. The main advantages of information environment monitoring systems based on fuzzy set theory are the ability to represent arbitrary parameter values in the form of analytics of given values, the ability to take more development scenarios into account, the ability to use this system when making decisions, when describing flow analysis schemes for the information environment, and track a large number of computer parameters. During the research, it was found that the actions of hackers differ from the behavior of ordinary users. As a result, the authors propose a developed system for monitoring abnormal user actions in the information environment, which is based on the analysis of event logs. The operation of the system requires the accumulation of information (audit files, log-in time and session duration data on file deletion, etc.), based on which a standard (template) of normal user behavior is created. Then, the user’s behavior is compared with the standard, and when anomalies are detected, the system signals about deviations. This algorithm allows you to track a large number of user parameters to determine unauthorized access.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.