Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment
Abstract
:1. Introduction
2. Materials and Methods
- The building of a typical user request.
- Implementation of an access control system with the means for data flow control, generated by a typical request.
- Creation of a virtual experimental stand that simulates an environment for using architecture components.
- Formation of a random signal with a given distribution law based on typical user requests.
- Obtaining estimates of the values of the resources required to use the access control system.
- In the case of solving the problem of choosing options for the implementation of CA means, the selection of options that have lower resource costs.
- Formation of the architecture of the computing complex, taking the obtained values of the costs of computing resources into account.
- CPU—AMD Ryzen 7 3700X 8-Core Processor, 3600 MHz, 8 physical cores, 16 logical cores.
- RAM—32 Gb DDR4, frequency 1600 MHz, Dual Channel Mode.
- Disk Subsystem—Samsung SSD 970 EVO Plus.
3. Results
4. Data Description
- File with input data (initial-dataset.json), which is used by the client to send requests.
- File with the results of monitoring virtual machine resources for the experiment without logging (monitoring-data_wo-logging.json).
- File with the results of monitoring virtual machine resources for the experiment with logging (monitoring-data_w-logging.json).
- the user with the userId identifier is found;
- an ActionLog document is created and written to the database.
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Parameter | Value |
---|---|
–node-args | “--max_old_space_size = 1024” |
–i | max |
–restart-delay | 5 |
–max-restarts | 1000 |
Appendix B
- _id—unique document identifier.
- sessionId—session identifier serving for client-server interaction.
- login—pre-generated user login.
- researcherId—identifier serving as foreign key for other document collection.
- alias—user login substitute.
- privateResearchSampleId—identifier serving as foreign key for other document collection.
- createdAt—date and time when the action log entry was created.
- updatedAt—date and time when the action log entry was updated for the last time.
- privateResearchResults—array of ResearchResult documents.
- _id—unique document identifier.
- embeddedPsychotestId—identifier serving as foreign key for other document collection.
- embeddedPsychotestId—order number of the document.
- data—JSON object of various structure.
- researcherId—identifier serving as foreign key for other document collection.
- privateResearchSampleId—identifier serving as foreign key for other document collection.
- privateResearchSubjectId—identifier serving as foreign key for other document collection.
- createdAt—date and time when the action log entry was created.
- updatedAt—most recent date and time when the action log entry was updated.
- _id—unique document identifier.
- userId—unique identifier marking the user, which has executed the remote method.
- exists—Boolean flag, marking if the user is present in the database at the moment of action logging.
- request—name of the remote method.
- createdAt—date and time when the action log entry was created.
- updatedAt—most recent date and time when the action log entry was updated.
- Extract HTTP—request body data.
- Pick id and researchSubjectId attributes from the data.
- Set user identifier as researchSubjectId or id if the researchSubjectId is not present.
- If there is no user identifier, then prevent the following code from being executed. It is expected behavior, as such HTTP requests are not processed using the remote method due to access control policies.
- If there is a user identifier, then find the corresponding document in the database and then save an action log entry, containing data, presented in Figure A5.
- client—object, representing the results of monitoring the resources of the client VM.
- server—object, representing the results of monitoring the resources of the server VM.
- mongodb—object, representing the results of monitoring the resources of the DBMS VM.
References
- Sancho, J.C.; Caro, A.; Ávila, M.; Bravo, A. New approach for threat classification and security risk estimations based on security event management. Future Gener. Comput. Syst. 2020, 113, 488–505. [Google Scholar] [CrossRef]
- Miloslavskaya, N. Designing blockchain-based SIEM 3.0 system. Inf. Comput. Secur. 2018, 26, 491–512. [Google Scholar] [CrossRef]
- Coppolino, L.; D’Antonio, S.; Mazzeo, G.; Romano, L. Cloud security: Emerging threats and current solutions. Comput. Electr. Eng. 2017, 59, 126–140. [Google Scholar] [CrossRef]
- Al-Duwairi, B.; Al-Kahla, W.; AlRefai, M.A.; Abdelqader, Y.; Rawash, A.; Fahmawi, R. SIEM-based detection and mitigation of IoT-botnet DDoS attacks. Int. J. Electr. Comput. Eng. 2020, 10, 2182–2191. [Google Scholar] [CrossRef]
- Kim, H.; Ben-Othman, J.; Mokdad, L.; Son, J.; Li, C. Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices. IEEE Netw. 2020, 34, 288–294. [Google Scholar] [CrossRef]
- Miloslavskaya, N.; Tolstoy, A. New SIEM system for the internet of things. In World Conference on Information Systems and Technologies; Springer: Cham, Switzerland, 2019; pp. 317–327. [Google Scholar]
- Lee, J.; Kim, J.; Kim, I.; Han, K. Cyber threat detection based on artificial neural networks using event profiles. IEEE Access 2019, 7, 165607–165626. [Google Scholar] [CrossRef]
- Moukafih, N.; Orhanou, G.; El Hajji, S. Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems. Secur. Commun. Netw. 2020, 2020, 3512737. [Google Scholar] [CrossRef]
- Nyame, G.; Qin, Z. Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework. Information 2020, 11, 334. [Google Scholar] [CrossRef]
- Magomedov, S.G.; Kolyasnikov, P.V.; Nikulchev, E.V. Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface. Russ. Technol. J. 2020, 8, 34–46. [Google Scholar] [CrossRef]
- Kim, H.; Ben-Othman, J.; Cho, S.; Mokdad, L. A Framework for IoT-Enabled Virtual Emotion Detection in Advanced Smart Cities. IEEE Netw. 2019, 33, 142–148. [Google Scholar] [CrossRef]
- Dilawari, A.; Khan, M.U.G.; Al-Otaibi, Y.D.; Rehman, Z.-U.; Rahman, A.-U.; Nam, Y. Natural Language Description of Videos for Smart Surveillance. Appl. Sci. 2021, 11, 3730. [Google Scholar] [CrossRef]
- Ali, R.F.; Dominic, P.D.D.; Ali, S.E.A.; Rehman, M.; Sohail, A. Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. Appl. Sci. 2021, 11, 3383. [Google Scholar] [CrossRef]
- Machin, J.; Batista, E.; Martínez-Ballesté, A.; Solanas, A. Privacy and Security in Cognitive Cities: A Systematic Review. Appl. Sci. 2021, 11, 4471. [Google Scholar] [CrossRef]
- Torres, N.; Pinto, P.; Lopes, S.I. Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem. Appl. Sci. 2021, 11, 3176. [Google Scholar] [CrossRef]
- Nikulchev, E.; Ilin, D.; Gusev, A. Technology stack selection model for software design of digital platforms. Mathematics 2021, 9, 308. [Google Scholar] [CrossRef]
- Gusev, A.; Ilin, D.; Nikulchev, E. The dataset of software components experimental evaluation for application design selection directed with the artificial bee colony algorithm. Data 2020, 5, 59. [Google Scholar] [CrossRef]
- Magomedov, S.; Lebedev, A. Protected Network Architecture for Ensuring Consistency of Medical Data through Validation of User Behavior and DICOM Archive Integrity. Appl. Sci. 2021, 11, 2072. [Google Scholar] [CrossRef]
- Puntambekar, A.A. Analysis and Design of Algorithms: Conceptual Approach; Technical Publications: Pune, India, 2020. [Google Scholar]
- Zhang, T.; Linguaglossa, L.; Roberts, J.; Iannone, L.; Gallo, M.; Giaccone, P. A benchmarking methodology for evaluating software switch performance for nfv. In Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 24–28 June 2019; pp. 251–253. [Google Scholar]
CPU Cores | RAM (MB) | Maximum Allowed Load of CPU Cores (%) | Input–Output System Bandwidth (MB/sec) | |
---|---|---|---|---|
Client | 4 | 8192 | 100 | – |
Server | 2 | 2048 | 100 | – |
Database | 2 | 2048 | 50 | 25 |
Resource Indicator | Value without Using Logging | Value with Using Logging | Difference in % |
---|---|---|---|
Client VM CPU | 8.498 | 8.217 | 3.3 |
Server VM CPU | 19.710 | 22.230 | 12.7 |
Database VM CPU | 2.859 | 4.371 | 52.9 |
Client VM Free RAM | 1296,828.186 | 1295,666.406 | 0.08 |
Server VM Free RAM | 41,345.797 | 39,147.056 | 5.32 |
Database VM Free RAM | 340,911.115 | 341,359.788 | 0.13 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Magomedov, S.; Ilin, D.; Nikulchev, E. Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment. Appl. Sci. 2021, 11, 4718. https://doi.org/10.3390/app11114718
Magomedov S, Ilin D, Nikulchev E. Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment. Applied Sciences. 2021; 11(11):4718. https://doi.org/10.3390/app11114718
Chicago/Turabian StyleMagomedov, Shamil, Dmitry Ilin, and Evgeny Nikulchev. 2021. "Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment" Applied Sciences 11, no. 11: 4718. https://doi.org/10.3390/app11114718
APA StyleMagomedov, S., Ilin, D., & Nikulchev, E. (2021). Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment. Applied Sciences, 11(11), 4718. https://doi.org/10.3390/app11114718