Diseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de servicios

dc.contributor.authorRey Sepulveda, Yeison Alexander
dc.contributor.authorGomez Bautista, Fabian Andrés
dc.contributor.cvlacGomez Bautista, Fabian Andrés [0000155175]spa
dc.contributor.researchgateGomez Bautista, Fabian Andrés [Fabian-Gomez-Bautista]spa
dc.contributor.researchgroupSemilleros de Investigación UNABspa
dc.coverage.campusUNAB Campus Bucaramangaspa
dc.coverage.spatialBucaramanga (Santander, Colombia)spa
dc.coverage.temporal2019spa
dc.date.accessioned2023-10-18T22:01:59Z
dc.date.available2023-10-18T22:01:59Z
dc.date.issued2019-11
dc.description.abstractEn este documento se detallan las indicaciones básicas a seguir para la presentación de trabajos de investigación al VI Encuentro de Semilleros de Investigación UNAB. En este documento se detalla la investigación realizada para la presentación de trabajo de investigación de Semilleros de Investigación UNAB con el fin de diseñar el modelo de una red bayesiana para predecir ataques informáticos de secuestro de datos en pymes prestadoras de servicios con el fin de promover la toma de decisiones proactivas dentro de estas organizaciones.spa
dc.description.abstractenglishIn this paper, we detailed the investigation made for the presentation of an investigation work from Semilleros de Investigación UNAB with the enphasis on designing the model of a Bayesian Netowrk to predict ransomware attacks on Pymes Service Providers in order promote the proactive decision regard security information inside this organizations.spa
dc.description.learningmodalityModalidad Presencialspa
dc.format.mimetypeapplication/pdfspa
dc.identifier.instnameinstname:Universidad Autónoma de Bucaramanga - UNABspa
dc.identifier.issnISSN 2344-7079spa
dc.identifier.reponamereponame:Repositorio Institucional UNABspa
dc.identifier.repourlrepourl:https://repository.unab.edu.cospa
dc.identifier.urihttp://hdl.handle.net/20.500.12749/22330
dc.language.isospaspa
dc.publisher.deparmentSistema de Investigación SIUNABspa
dc.publisher.facultyFacultad Ingeniería
dc.publisher.grantorUniversidad Autónoma de Bucaramanga UNABspa
dc.publisher.programPregrado Ingeniería de Sistemas
dc.relation.ispartofseriesGeneración Creativa : Encuentro de Semilleros de Investigación UNABspa
dc.relation.references[1] Barbosa, S. (2010). Bayes Networks and Markov Random Files. Retrieved from https://www.yumpu.com/en/document/read/18745646/lesso n-5-bayes-networks-and-markov-random-fields-infocomspa
dc.relation.references[2] CCN-CERT. (2018). Medidas de seguridad contra ransomware. Retrieved from https://www.ccn- cert.cni.es/informes/informes-ccn-cert-publicos/2877-ccncert-ia-11-18-medidas-de-seguridad-contraransomware/file.htmlspa
dc.relation.references[3] Chockalingam, S., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Bayesian Network Models in Cyber Security: A Systematic Review (pp. 105–122). https://doi.org/10.1007/978-3-319-70290-2_7spa
dc.relation.references[4] Clark, D. D., Pogran, K. T., & Reed, D. P. (1978). An introduction to local area networks. Proceedings of the IEEE, 66(11), 1497–1517. https://doi.org/10.1109/PROC.1978.11152spa
dc.relation.references[5] CONPES 3854. (2016). Política Nacional de Seguridad Digital.spa
dc.relation.references[6] DNP. (2015). La clasificación por tamaño empresarial en Colombia: Historia y limitaciones para una propuesta. Retrieved from https://colaboracion.dnp.gov.co/CDT/Estudios Econmicos/434.pdfspa
dc.relation.references[7] ESET. (2017a). RoT: el ransomware de las cosas, en detalle. We Live Security. Retrieved from https://www.welivesecurity.com/laes/2017/02/03/ransomware-de-las-cosas/spa
dc.relation.references[8] ESET. (2017b). Security Report Latinoamérica 2017spa
dc.relation.references[9] ESET. (2018a). ESET Security Report Latinoamérica 2018 (Vol. 1). Argentina. Retrieved from https://www.welivesecurity.com/la-es/2018/06/19/esetsecurity-report-2018-el-estado-de-la-seguridad-de-lainformacion-en-las-empresas-de-la-region/spa
dc.relation.references[10] ESET. (2018b). Lejos de desaparecer, el ransomware se reinventa. Argentina. Retrieved from https://register.gotowebinar.com/recording/3775545201697 720066spa
dc.relation.references[11] Garcia, P., & Santos, I. (2010). Bayesian Networks for Network Intrusion Detection. In Bayesian Network. Sciyo. https://doi.org/10.5772/10069spa
dc.relation.references[12] Heikkila, M., Rattya, A., Pieska, S., & Jamsa, J. (2016). Security challenges in small- and medium-sized manufacturing enterprises. In 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS) (pp. 25–30). IEEE. https://doi.org/10.1109/SIMS.2016.7802895spa
dc.relation.references[13] Hsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323679spa
dc.relation.references[14] IEEE Computer Society. (1998). 802.3-1985 - IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications. https://doi.org/10.1109/IEEESTD.1984.7508550spa
dc.relation.references[15] IEEE Computer Society. (2017). 802.3-2015/Cor 1-2017 - IEEE Standard for Ethernet - Corrigendum 1: Multi-lane Timestamping. https://doi.org/10.1109/IEEESTD.2017.7907155spa
dc.relation.references[16] ITU. (2011). Ciberseguridad. Actualidades de La UIT, 9, 20– 22. Retrieved from https://www.itu.int/net/itunews/issues/2011/05/38-es.aspxspa
dc.relation.references[17] Jabbar, M. A., Aluvalu, R., & Satyanarayana Reddy, S. S. (2017). Intrusion Detection System Using Bayesian Network and Feature Subset Selection. In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–5). IEEE. https://doi.org/10.1109/ICCIC.2017.8524381spa
dc.relation.references[18] Kao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323681spa
dc.relation.references[19] Ministerio de Tecnologías de la Información y las Comunicaciones. (2017). Impacto de los incidentes de seguridad digital en Colombia 2017 . https://doi.org/10.18235/0000843spa
dc.relation.references[20] Okutan, A., Yang, S. J., & McConky, K. (2017). Predicting cyber attacks with bayesian networks using unconventional signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research - CISRC ’17 (pp. 1–4). New York, New York, USA: ACM Press. https://doi.org/10.1145/3064814.3064823spa
dc.relation.references[21] Peñuela Vasquez, Y. D. (2018). Análisis e identificacióndel estado actual de la seguridad informática dirigido a las organizaciones en Colombia, que brinde un diagnóstico general sobre la importancia y medidas necesarias para proteger el activo de la información. Retrieved from https://repository.unad.edu.co/bitstream/10596/17260/1/35 254395.pdfspa
dc.relation.references[22] Roohparvar, R. (2018). 3 Reasons why cybersecurity is more important that ever. Retrieved from http://www.infoguardsecurity.com/3-reasons-whycybersecurity-is-more-important-than-ever/spa
dc.relation.references[24] Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., & Nakao, K. (2011). Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS ’11 (pp. 29–36). New York, New York, USA: ACM Press. https://doi.org/10.1145/1978672.1978676spa
dc.relation.references[25] Sucar, L. E. (2006). Redes Bayesianas. Retrieved from https://ccc.inaoep.mx/~esucar/Clases-mgp/caprb.pdfspa
dc.relation.references[26] Tanasache, F. D., Sorella, M., Bonomi, S., Rapone, R., & Meacci, D. (2019). Building an emulation environment for cyber security analyses of complex networked systems. In Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN ’19. New York, New York, USA: ACM Press. https://doi.org/10.1145/3288599.3288618spa
dc.relation.references[27] Thomas Bayes. (1763). Bayes Theorem. In An essay towards solving a problem in the doctrine of chances, Philosophical (pp. 370–418).spa
dc.relation.references[28] Xie, P., Ou, X., Levy, R., Li, J. H., & Liu, P. (2010). Using Bayesian Networks for Cyber Security Analysis. https://doi.org/https://doi.org/10.1109/DSN.2010.5544924spa
dc.relation.references[29] Zimba, A., Wang, Z., & Chen, H. (2017). Reasoning crypto ransomware infection vectors with Bayesian networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 149–151). IEEE. https://doi.org/10.1109/ISI.2017.8004894spa
dc.relation.references[30] Zuech, R., Khoshgoftaar, T. M., Seliya, N., Najafabadi, M. M., & Kemp, C. (2015). A New Intrusion Detection Benchmarking System. Retrieved from https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS15/pa per/viewFile/10368/103spa
dc.relation.urihttp://hdl.handle.net/20.500.12749/14243
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.creativecommonsAtribución-NoComercial-SinDerivadas 2.5 Colombia*
dc.rights.localAbierto (Texto Completo)spa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/*
dc.sourceRey, Y. A. & Gomez, F. A. (2019). Diseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de servicios. Recuperado de: http://hdl.handle.net/20.500.12749/22330spa
dc.subject.keywordsInformatics engineeringspa
dc.subject.keywordsInformatic securityspa
dc.subject.keywordsIndustryspa
dc.subject.keywordsInvestigationspa
dc.subject.keywordsInnovationspa
dc.subject.keywordsInfrastructurespa
dc.subject.keywordsSMEs providing servicesspa
dc.subject.keywordsData theftspa
dc.subject.lembIngeniería informáticaspa
dc.subject.lembSeguridad informáticaspa
dc.subject.lembIndustriaspa
dc.subject.lembInvestigaciónspa
dc.subject.proposalInnovaciónspa
dc.subject.proposalInfraestructuraspa
dc.subject.proposalPymes prestadoras de serviciosspa
dc.subject.proposalRobo de datosspa
dc.titleDiseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de serviciosspa
dc.title.translatedBayesian Network Design to Make Proactive Decisions against data hijacking attacks within SMEs service providersspa
dc.typeConferenceeng
dc.type.coarhttp://purl.org/coar/resource_type/c_f744
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.type.driverinfo:eu-repo/semantics/conferenceProceedingsspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersionspa
dc.type.localMemoria de eventosspa
dc.type.redcolhttp://purl.org/redcol/resource_type/EC_AC

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
2019_Articulo_Gomez_Bautista_Fabian_Andres.pdf
Tamaño:
279.54 KB
Formato:
Adobe Portable Document Format
Descripción:
Artículo

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
829 B
Formato:
Item-specific license agreed upon to submission
Descripción: