• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem

    Building a dataset through attack pattern modeling and analysis system

    Autor: 
    Bermejo Higuera, Juan Ramón (1)
    ;
    Bermejo-Higuera, Javier (1)
    ;
    Tébar García, Juan Luis (1)
    ;
    Sicilia, Juan Antonio (1)
    ;
    Sánchez Rubio, Manuel (1)
    Fecha: 
    2021
    Palabra clave: 
    attack pattern detection; attack pattern modeling; cyber situational awareness; dataset; machine learning; Scopus; JCR
    Tipo de Ítem: 
    article
    URI: 
    https://reunir.unir.net/handle/123456789/12785
    DOI: 
    https://doi.org/10.1016/j.compeleceng.2021.107614
    Dirección web: 
    https://www.sciencedirect.com/science/article/pii/S0045790621005474?via%3Dihub
    Open Access
    Resumen:
    The different types of cyber-attacks on information and telecommunications systems are becoming increasingly sophisticated and complex, with several defined phases (attack pattern). Therefore, it is necessary to research and develop new infrastructures to understand and detect them. This work addresses the design and implementation of a system capable of detecting, analyzing, modeling and visualizing attack patterns in real time to build a dataset with labeled events attacks. The system consists of the three subsystems, detection of attack events subsystem; attack events analysis subsystem to model active patterns based on Common Attack Pattern Enumeration and Classification (CAPEC) definitions; and the attack pattern visualization subsystem. The results obtained from the attacks carried out over a period of six months under a series of assumptions are shown. These results have allowed the construction of a dataset with attack events labelled according to the possible attack patterns to which they belong. The developed system can provide an organization with a very real situational awareness of the cybersecurity situation.
    Mostrar el registro completo del ítem
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Artículos Científicos WOS y SCOPUS

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    35
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • MMALE a methodology for malware analysis in linux environments 

      de Vicente Mohino, José Javier (1); Bermejo-Higuera, Javier; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio (1); Sánchez Rubio, Manuel (1); Martínez Herraiz, José-Javier (Computers, materials and continua, 2021)
      In a computer environment, an operating systemis prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have becomemore qualified compared to a fewyears ...
    • Hybrid Security Assessment Methodology for Web Applications 

      Correa, Roddy A.; Bermejo Higuera, Juan Ramón (1); Bermejo-Higuera, Javier (1); Sicilia, Juan Antonio (1); Sánchez Rubio, Manuel (1); Magreñán, Á. Alberto (CMES-Computer Modeling in Engineering & Sciences, 2021)
      This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that allow to perform security assessments ...
    • Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey 

      Montes, F. (1); Bermejo-Higuera, Javier (1); Sanchez, L. E.; Bermejo Higuera, Juan Ramón (1); Sicilia, Juan Antonio (1) (KSII transactions on internet and information systems, 2021)
      Among the scientific literature, it has not been possible to find a consensus on the definition of the limits or properties that allow differentiating or grouping the cyber-physical systems (CPS) and the Internet of Things ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioAutorización TFG-M

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja