Detector de malware mediante funciones hash criptográficas en infraestructuras multiplataforma descentralizadas
Autor:
Rodríguez-Galiano, David
Fecha:
27/08/2015Palabra clave:
Tipo de Ítem:
masterThesisResumen:
Vivimos en una sociedad cada vez más globalizada e interconectada, donde los datos continuamente se intercambian y crecen de forma exponencial.
Junto a las continuas mejoras tecnológicas para dar servicio a todas las demandas, también crece el número de elementos que pueden infringir las políticas de seguridad y consiguen acceder y modificar información sensible o confidencial, pudiendo dañar nuestra fuente de negocio.
Usualmente, con el fin de conseguir dichos objetivos, se utilizan programas conocidos de forma genérica como malware que se infiltran en los equipos y proporcionan una gran capacidad de detección y explotación de las vulnerabilidades de los sistemas.
Internet cada día está más infectada, por lo que es requerimiento indispensable disponer de elementos que protejan todo el parque tecnológico de empresas y organizaciones.
En este trabajo se pretende mostrar una forma en la que cualquier organización, independientemente de su naturaleza y tamaño, puede detectar archivos maliciosos (virus, gusanos, troyanos, rootkits, spyware, adware, etc.) de forma ágil, gratuita y confiable, mediante funciones hash criptográficas.
Descripción:
We live in an increasingly globalized and interconnected society, where data is exchanged continuously and grows exponentially.
Along with the continuous growing technology improvements to service all the needs, so does the number of items that may violate security policies and manage to access and modify sensitive or confidential information that may damage our business.
Usually, in order to achieve these objectives, there are used programs as malware that infiltrate computers and are capable to detect and use the vulnerabilities found in the systems.
Internet is becoming increasingly infected, so it is an indispensable requirement to have elements to protect all the technological park of businesses and organizations.
This paper aims to show a way in which any organization, regardless of its type or size, can detect malicious files (viruses, worms, Trojans, rootkits, spyware, adware, etc.) in a fast, free and reliable way through cryptographic hash functions.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
85 |
74 |
87 |
165 |
81 |
104 |
175 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
293 |
514 |
774 |
1071 |
906 |
1017 |
974 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Learning from the sales conversion rate throughout its product life cycle analysis: A case of study for the Spanish automotive sector
Saco, Manuela; Galiano, Aida ; Rodríguez, Vicente (E a M: Ekonomie a Management, 2020)The scientific literature has not considered that the conversion rate in sales could have an irregular behaviour throughout the Product Life Cycle (PLC). The main contribution of this article is to reveal this unequal ... -
Analysis of the behaviour of the clients assisted and sales variables in the different phases of the product life cycle
Galiano, Aida ; Rodríguez, Vicente ; Saco, Manuela (European Journal of Management and Business Economics, 2018)Purpose - The Bass model was created to analyse the product life cycle (PLC) in order to help sales and marketing departments in their business decision making. The purpose of this paper is to analyse the diferences between ... -
CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations
Daton Medenou, Roumen ; Calzado Mayo, Victor Manuel; Garcia Balufo, Miriam; Páramo Castrillo, Miguel; González Garrido, Francisco José; Luis Martinez, Alvaro; Nevado Catalán, David; Hu, Ao; Sandoval Rodriguez-Bermejo, David; Maestre Vidal, Jorge; Pasqual de Riquelme, Gerardo Ramis; Berardi, Antonio; De Santis, Paolo; Torelli, Francesco; Llopis Sánchez, Salvador (ACM International Conference Proceeding Series, 2020)The lack of suitable datasets and evaluation processes entails one of the most challenging gaps on the digital transformation era, where data-driven solutions like machine learning algorithms constitute a key pillar of the ...