<?xml version="1.0" encoding="UTF-8"?>
<article article-type="research-article" dtd-version="1.3" xml:lang="ru" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://metafora.rcsi.science/xsd_files/journal3.xsd">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">moitvivt</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Моделирование, оптимизация и информационные технологии</journal-title>
        <trans-title-group xml:lang="en">
          <trans-title>Modeling, Optimization and Information Technology</trans-title>
        </trans-title-group>
      </journal-title-group>
      <issn pub-type="epub">2310-6018</issn>
      <publisher>
        <publisher-name>Издательство</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.26102/2310-6018/2021.34.3.024</article-id>
      <article-id pub-id-type="custom" custom-type="elpub">1002</article-id>
      <title-group>
        <article-title xml:lang="ru">Способ прямого синтаксического преобразования данных как средство минимизации объема данных о событиях и инцидентах информационной безопасности</article-title>
        <trans-title-group xml:lang="en">
          <trans-title>A method of direct syntactic transformation of data as a means of minimizing the amount of data on information security events and incidents</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author" corresp="yes">
          <contrib-id contrib-id-type="orcid">0000-0003-3102-4323</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Королев</surname>
              <given-names>Игорь Дмитриевич</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Korolev</surname>
              <given-names>Igor Dmitrievich</given-names>
            </name>
          </name-alternatives>
          <email>pi_korolev@mail.ru</email>
          <xref ref-type="aff">aff-1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <contrib-id contrib-id-type="orcid">0000-0002-1616-7329</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Маркин</surname>
              <given-names>Денис Игоревич</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Markin</surname>
              <given-names>Denis Igorevich</given-names>
            </name>
          </name-alternatives>
          <email>denismark94@gmail.com</email>
          <xref ref-type="aff">aff-2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <contrib-id contrib-id-type="orcid">0000-0003-1146-7370</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Литвинов</surname>
              <given-names>Евгений Сергеевич</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Litvinov</surname>
              <given-names>Evgeny Sergeevich</given-names>
            </name>
          </name-alternatives>
          <email>litvinoves@rambler.ru</email>
          <xref ref-type="aff">aff-3</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <contrib-id contrib-id-type="orcid">0000-0002-4455-7535</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Рогозин</surname>
              <given-names>Евгений Алексеевич</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Rogozin</surname>
              <given-names>Evgeny Alekseevich</given-names>
            </name>
          </name-alternatives>
          <email>evgenirogozin@yandex.ru</email>
          <xref ref-type="aff">aff-4</xref>
        </contrib>
      </contrib-group>
      <aff-alternatives id="aff-1">
        <aff xml:lang="ru">Краснодарское высшее военное орденов Жукова и Октябрьской Революции Краснознаменное училище им. С.М. Штеменко</aff>
        <aff xml:lang="en">Krasnodar Higher Military School</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-2">
        <aff xml:lang="ru">Краснодарское высшее военное орденов Жукова и Октябрьской Революции Краснознаменное училище им. С.М. Штеменко</aff>
        <aff xml:lang="en">Krasnodar Higher Military School</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-3">
        <aff xml:lang="ru">Краснодарское высшее военное орденов Жукова и Октябрьской Революции Краснознаменное училище им. С.М. Штеменко</aff>
        <aff xml:lang="en">Krasnodar Higher Military School</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-4">
        <aff xml:lang="ru">Военный учебно-научного центр Военно-воздушных сил «Военно-воздушной академии имени профессора Н.Е. Жуковского и Ю.А. Гагарина»</aff>
        <aff xml:lang="en">Military Training and Research Center of the Air Force "Air Force Academy named after Professor N. E. Zhukovsky and Yu. A. Gagarin"</aff>
      </aff-alternatives>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <elocation-id>10.26102/2310-6018/2021.34.3.024</elocation-id>
      <permissions>
        <copyright-statement>Copyright © Авторы, 2026</copyright-statement>
        <copyright-year>2026</copyright-year>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://moitvivt.ru/ru/journal/article?id=1002"/>
      <abstract xml:lang="ru">
        <p>Актуальность исследования обусловлена необходимостью повышения скорости и качества информационного обмена в информационных инфраструктурах, защищаемых средствами центров информационной защиты (security operation centers) в период активного вредоносного воздействия на канал связи, использовании высоконагруженных или низкоскоростных (нестабильных) каналов связи. В связи с этим, данная статья направлена на выявление способа (или метода) компрессии передаваемых данных в режиме реального времени (или с минимальными задержками), работающего с минимальными требованиями к привлекаемым ресурсам и позволяющего добиться максимально-возможного уровня сжатия данных. Методом к исследованию данной проблемы является сравнение возможностей и характеристик различных способов и методов компрессии данных в задаваемых условиях. Такой подход позволяет комплексно рассмотреть достоинства и недостатки каждого из предлагаемых способов и методов, а также осуществить выбор и оценку наиболее подходящего из них. В статье представлено большое количество различных способов и методов компрессии данных, раскрыты основные достоинства выбранного способа компрессии данных прямой синтаксической заменой, выявлены его достоинства и недостатки, обоснована необходимость использования именно этого способа для компрессии передаваемых данных о выявленных событиях и инцидентах информационной безопасности. Материалы статьи представляют практическую ценность для специалистов и разработчиков, работающих в области информационной безопасности, а также теоретическую ценность для учетных, осуществляющих свои исследования как в области информационной безопасности, так и в области информационных технологий в целом.</p>
      </abstract>
      <trans-abstract xml:lang="en">
        <p>The relevance of the study is due to the need to improve the speed and quality of information exchange in information infrastructures protected by means of information security centers (security operation centers) during the period of active malicious impact on the communication channel, the use of high-load or low-speed (unstable) communication channels. In this regard, this article is aimed at identifying a method (or method) for compressing transmitted data in real time (or with minimal delays), working with minimal requirements for the resources involved and allowing you to achieve the highest possible level of data compression. The method to study this problem is to compare the capabilities and characteristics of various methods and methods of data compression under specified conditions. This approach allows you to comprehensively consider the advantages and disadvantages of each of the proposed methods and methods, as well as to select and evaluate the most appropriate one. The article presents a large number of different methods and methods of data compression, reveals the main advantages of the chosen method of data compression by direct syntactic replacement, identifies its advantages and disadvantages, and justifies the need to use this method for compressing transmitted data about identified events and incidents of information security. The materials of the article are of practical value for specialists and developers working in the field of information security, as well as theoretical value for researchers conducting their research both in the field of information security and in the field of information technology in general.</p>
      </trans-abstract>
      <kwd-group xml:lang="ru">
        <kwd>база данных</kwd>
        <kwd>кодирование</kwd>
        <kwd>компрессия</kwd>
        <kwd>система управления базой данных</kwd>
        <kwd>события и инциденты информационной безопасности</kwd>
        <kwd>каналы связи</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <kwd>database</kwd>
        <kwd>coding</kwd>
        <kwd>compression</kwd>
        <kwd>database management system</kwd>
        <kwd>information security events and incidents</kwd>
        <kwd>communication channels</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Исследование выполнено без спонсорской поддержки.</funding-statement>
        <funding-statement xml:lang="en">The study was performed without external funding.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <title>References</title>
      <ref id="cit1">
        <label>1</label>
        <mixed-citation xml:lang="ru">Weissman D., Jayasumana A. Integrating IoT monitoring for security operation center. Global Internet Things Summit (GIoTS). 2020:1-6.</mixed-citation>
      </ref>
      <ref id="cit2">
        <label>2</label>
        <mixed-citation xml:lang="ru">Kwon T., Song J.-S., Choi S., Lee Y. , Park J. VISNU: A novelvisualization methodology of security events optimized for a centralizedSOC. 13th Asia Joint Conf. Inf. Secur. (AsiaJCIS). 2018:1–7.</mixed-citation>
      </ref>
      <ref id="cit3">
        <label>3</label>
        <mixed-citation xml:lang="ru">Plachkinova M., Maurer C. Security Breach at Target. Journal of Information Systems Education. 2018;29:11-20.</mixed-citation>
      </ref>
      <ref id="cit4">
        <label>4</label>
        <mixed-citation xml:lang="ru">Choong-Hee H., Soon-Tai P., Sang-Joonc L. The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system. International Journal of Critical Infrastructure Protection. 2019;24:3-12.</mixed-citation>
      </ref>
      <ref id="cit5">
        <label>5</label>
        <mixed-citation xml:lang="ru">David Janos F., HuuPhuoc Dai N. Security concerns towardssecurity operations centers inProc. IEEE 12th Int. Symp. Appl.Comput. Intell. Informat. (SACI). 2018;273–278.</mixed-citation>
      </ref>
      <ref id="cit6">
        <label>6</label>
        <mixed-citation xml:lang="ru">Mihaela Oprea A., Li Z., Norris R., D Bowers K., MADE: Security Analytics for Enterprise Threat Detection. Proceedings of the 34th Annual Computer Security Applications ConferenceDecember. 2018:124–136.</mixed-citation>
      </ref>
      <ref id="cit7">
        <label>7</label>
        <mixed-citation xml:lang="ru">Achmadi D., Suryanto Y., Ramli K. On developing information security management system (isms) framework for iso 27001-based data center. 2018 International Workshop on Big Data and Information Security (IWBIS). 2018:149-157.</mixed-citation>
      </ref>
      <ref id="cit8">
        <label>8</label>
        <mixed-citation xml:lang="ru">Petrenko S. Security Operations Center (SOC) Key Role. Cyber security innovation for the digital economy. 2018:150-162.</mixed-citation>
      </ref>
      <ref id="cit9">
        <label>9</label>
        <mixed-citation xml:lang="ru">Miloslavskaya N. Developing a Network Security Intelligence Center. Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2018 (Ninth Annual Meeting of the BICA Society). 2018:359-364.</mixed-citation>
      </ref>
      <ref id="cit10">
        <label>10</label>
        <mixed-citation xml:lang="ru">Alali M., Almogren A., Mehedi Hassan M., Rassan I.A.L., BhuiyanMd.Z.A. Improving risk assessment model of cyber security using fuzzy logic inference system. Computers &amp; Security. 2018:323-339.</mixed-citation>
      </ref>
      <ref id="cit11">
        <label>11</label>
        <mixed-citation xml:lang="ru">Ganesan R., Shah A. A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. 2018:206-226.</mixed-citation>
      </ref>
      <ref id="cit12">
        <label>12</label>
        <mixed-citation xml:lang="ru">Mutemwa M., Mtsweni J., Zimba L. Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). 2018:1-6.</mixed-citation>
      </ref>
      <ref id="cit13">
        <label>13</label>
        <mixed-citation xml:lang="ru">Kuypers M.A., Maillart T., Pate-Cornell E. An empirical analysis of cyber security incidents at a large organization. Department of Management Science and Engineering. 2016:231-236.</mixed-citation>
      </ref>
      <ref id="cit14">
        <label>14</label>
        <mixed-citation xml:lang="ru">Танэнбаум Э., Уэзэролл Д. Компьютерные сети. 2012:555-559.</mixed-citation>
      </ref>
      <ref id="cit15">
        <label>15</label>
        <mixed-citation xml:lang="ru">Ватолин Д.С.. Методы сжатия данных. 2003:57-114.</mixed-citation>
      </ref>
      <ref id="cit16">
        <label>16</label>
        <mixed-citation xml:lang="ru">K.R. Rao, P.X. Yip. The Transform and Data Compression Handbook. 2001:234-237.</mixed-citation>
      </ref>
      <ref id="cit17">
        <label>17</label>
        <mixed-citation xml:lang="ru">Rissanen, J. A universal data compression system. IEEE Trans. Inform. TheoryI. 1983;29:656-664.</mixed-citation>
      </ref>
      <ref id="cit18">
        <label>18</label>
        <mixed-citation xml:lang="ru">Iri N., Kosut O. Universal coding with point type classes. 51st Annual Conference on Information Sciences and Systems. 2017:1-6.</mixed-citation>
      </ref>
      <ref id="cit19">
        <label>19</label>
        <mixed-citation xml:lang="ru">Abdulmunem A.A., Mohammed D.J., Hassan A.K. Non-linear data structure for data coding for size compression. 1st International Conference of Pure and Engineering Sciences, ICPES 2020. 2020.</mixed-citation>
      </ref>
      <ref id="cit20">
        <label>20</label>
        <mixed-citation xml:lang="ru">Zhang Y., Lieven N.A.J., Nunez-Yanez J., Hutchinson P. Optimal compression of vibration data with lifting wavelet transform and context-based arithmetic coding. 25th EuropeanSignalProcessingConference, EUSIPCO 2017. 2017;25:1996-2000.</mixed-citation>
      </ref>
      <ref id="cit21">
        <label>21</label>
        <mixed-citation xml:lang="ru">He L., Dai B., Zhang D. Data compression for optical spectrum-encoding imaging system. QiangjiguangYuLizishu. 2018;30(9):99002.</mixed-citation>
      </ref>
      <ref id="cit22">
        <label>22</label>
        <mixed-citation xml:lang="ru">Shurigin V.A., Makarov V.V., Vavrenyuk A.B., Starikovskiy A.V. Use of universal coding with binary thirds for information compression and its security. International Journal of Soft Computing. 2015;10(6):383-390.</mixed-citation>
      </ref>
    </ref-list>
    <fn-group>
      <fn fn-type="conflict">
        <p>The authors declare that there are no conflicts of interest present.</p>
      </fn>
    </fn-group>
  </back>
</article>