International Journal of Electronics and Telecommunications (Jun 2024)

Electronic footprint analysis and cluster analysis techniques for information security risk research of university digital systems

  • Valerii Lakhno,
  • Myroslav Lakhno,
  • Kaiyrbek Makulov,
  • Olena Kryvoruchko,
  • Alona Desiatko,
  • Vitalii Chubaievskyi,
  • Dmytro Ishchuk,
  • Viktoriya Kabylbekova

DOI
https://doi.org/10.24425/ijet.2024.149559
Journal volume & issue
Vol. vol. 70, no. No 2
pp. 405 – 412

Abstract

Read online

In the article there are presented results of the study of the state of user competencies for different specialties of the university digital educational environment (UDEE) on issues related to information security (IS). The methods of cluster analysis and analysis of digital (electronic) traces (DT) of users are used. On the basis of analyzing the DTs of different groups of registered users in the UDEE, 6 types of users are identified. These types of users were a result of applying hierarchical classification and k-means method. Users were divided into appropriate clusters according to the criteria affecting IS risks. For each cluster, the UDEE IS expert can determine the probability of occurrence of high IS risk incidents and, accordingly, measures can be taken to address the causes of such incidents. The algorithms proposed in this study enable research during log file analysis aimed at identifying breaches of information security within the university's DEE.

Keywords